TechDay New Zealand - Aotearoa's technology news network

Network Management stories - Page 80

Fundamental to the wellbeing of the networks relied upon for everything from home internet to enterprise connectivity, Network Management is a broad category of applications, tools and processes which underpin the reliable operation of network infrastructure. This includes tools for provisioning, operating, maintaining, administering and securing networks of every kind. Network Management keeps network resources available, efficient and safe for all users.
Story image
Equinix: Realizing the true potential of NFV
Wed, 15th Mar 2017
#
network infrastructure
#
hyperscale
#
sdn
Equinix champions flexible networks via NFV, unlocking rapid, cost-effective service delivery for enterprise digital transformation.
Story image
AI, the end of cloud, intelligent everything - Cisco's top trends to watch this year
Tue, 14th Mar 2017
#
ddos
#
network infrastructure
#
digital transformation
Cisco's CTO Kevin Bloch heralds AI's rise as the harbinger of tech trends set to revolutionise business and infrastructure in 2017.
Story image
Unit 42 reports 'Blank Slate' malspam campaign pummels hosting providers in 'cycle of abuse'
Tue, 14th Mar 2017
#
malware
#
firewalls
#
network infrastructure
Unit 42 has provided an inside look at how a malicious spam campaignis using double-zipped Word files to spread ransomware on Windows computers.
Story image
WatchGuard's global reseller survey finds ransomware top customer fear for 2017
Mon, 13th Mar 2017
#
firewalls
#
network infrastructure
#
malware
A global survey by WatchGuard has shown that more than 80% of resellers believe their customers are most worried about ransomware and its effects.
Story image
WatchGuard reveals why defence is never enough in the fight against ransomware
Mon, 13th Mar 2017
#
firewalls
#
network infrastructure
#
malware
Ransomware. It is a deadly form of computer malware that can cripple your systems, drain your bank accounts and wipe all your critical business data.
Story image
Advanced Threat Protection – Preventing unknown risks
Mon, 13th Mar 2017
#
firewalls
#
network infrastructure
#
network security
APTs compromise their target system with advanced code techniques to circumvent security barriers - and stay under the radar as long as possible.
Story image
Telstra unveils SDN partnership with US-based VeloCloud
Wed, 8th Mar 2017
#
network infrastructure
#
sd-wan
#
sdn
Telstra announces partnership with VeloCloud Networks, with investment by Telstra Ventures to enhance network flexibility and agility for enterprise customers.
Story image
Cisco and Optus collaboration to drive AU digital transformation
Wed, 8th Mar 2017
#
uc
#
network infrastructure
#
digital transformation
Optus Business and Cisco firmly believe a smart network is fundamental to the business transformation journey.
Story image
Digital transformation in the spotlight as Cisco Live kicks off in Melbourne
Wed, 8th Mar 2017
#
network infrastructure
#
digital transformation
#
sdn
The Cisco Live convention in Melbourne kicks off with Optus as lead sponsor, covering key themes of intelligence, automation, and security.
Story image
Fortinet asks: Planning a merger? It’s time for a cybersecurity upgrade
Wed, 8th Mar 2017
#
firewalls
#
network infrastructure
#
network security
M&A activity can offer CFOs a unique opportunity to ramp up cybersecurity levels with greater investment and integration.
Story image
Bankrupt Avaya enters asset purchase agreement - ANZ MD assures partners
Wed, 8th Mar 2017
#
uc
#
network infrastructure
#
sdn
Avaya earlier this year filed for bankruptcy and has now announced it has entered into an asset purchase agreement with Extreme Networks.
Story image
Unit 42 discovers apps compromised by iFrames on Google Play
Tue, 7th Mar 2017
#
smartphones
#
firewalls
#
network infrastructure
A number of apps appearing on Google Play contained IFrames infections that link to malicious domains in their HTML pages. Unit42 gives details.
Story image
Fortinet targets MSSPs with new partner program
Mon, 6th Mar 2017
#
firewalls
#
network infrastructure
#
network security
Fortinet has launched a new program for MSSPs which it says will help partners accelerate profitability and increase leadership.
Story image
Weekly NZ security roundup: RedShield, Palo Alto Networks, non-malware attacks and firewalls
Fri, 3rd Mar 2017
#
firewalls
#
ddos
#
network infrastructure
NZ's cyber-front tackles evolving threats: Insights on non-malware attacks, innovative defenses like Palo Alto's tech, and data breach laws.
Story image
How to automate business intent with an SD-WAN
Thu, 2nd Mar 2017
#
network infrastructure
#
sd-wan
#
sdn
Revolutionising enterprise connectivity with SD-WAN, businesses embrace automation, streamlining WANs to champion cloud applications.
Story image
HPE & Tata Communications to build world’s biggest IoT network in India
Thu, 2nd Mar 2017
#
network infrastructure
#
sdn
#
iot
HPE teams with Tata Communications for India's IoT revolution, targeting 400 million in massive network build.
Story image
Palo Alto Networks snaps up LightCyber for automated behaviour analytics prowess
Thu, 2nd Mar 2017
#
firewalls
#
network infrastructure
#
network security
Palo Alto Networks has paid $105 million for cybersecurity provider LightCyber, so it can fuse automated behavioural analytics into its own platform.
Story image
Palo Alto Networks deploys next-gen security for King Country electricity provider
Wed, 1st Mar 2017
#
firewalls
#
network infrastructure
#
network security
The Lines Company deployed Palo Alto Networks Next-Generation Security Platform as part of a massive upgrade to its IT infrastructure.
Story image
Sophos launches new suite for cloud security and IoT management
Tue, 28th Feb 2017
#
uc
#
firewalls
#
network infrastructure
Sophos Mobile 7 is available now for on-site installation and will be available through cloud-based Sophos Central in mid-March 2017.
Story image
Could deception methods be the new answer to cybersecurity?
Mon, 27th Feb 2017
#
firewalls
#
network infrastructure
#
network security
Firms are unable to detect attackers for almost five months once they are inside systems, but deceiving attackers along the way can slow them down.