You've requested...

Vitens Moves to Cloud Security with BloxOne™ ThreatDefense from Infoblox

If a new window did not open, click here to view this asset.

Download this next:

2023 analyst report: Network management market

Given that networking has evolved, so must network management. To evolve their management approaches, many organizations are adopting new tools.

So, what does the market for network management look like? To answer that question, this 44-page analyst report compares 27 tools, including ones by Auvik Networks, Cisco and more.

To find out which tools are leading the landscape, download the report.

These are also closely related to: "Vitens Moves to Cloud Security with BloxOne™ ThreatDefense from Infoblox"

  • Web security: Important but often overlooked

    Businesses increasingly rely on being online, yet web security is often overlooked. This is evidenced by the fact that the top web attack methods, such as SQL injection and cross-site scripting, continue to be effective.

     These well-known vulnerabilities need to be addressed and web security needs to move beyond whitelisting, blacklisting and URL filtering. It needs to be dynamic in response to a dynamic threat. It also needs to take humans into account by responding to users’ needs and providing a working environment that is inherently secure and insulated from common web threats.

     Organisations need to be aware of their exposure to web threats and follow best practice to limit that exposure and mitigate the damage from web-based attacks. This is best achieved by monitoring all web traffic, securing web applications, ensuring data is not exposed to the internet unnecessarily, using good access controls, and implementing multi-factor authentication. The risk is often high, but it can and must be managed.

  • An inside look at AstraZeneca’s IT

    AstraZeneca operates one of the most robust hybrid IT environments in the bio-pharmaceutical industry—however, in an industry where speed is everything, their growing technology bottlenecks were holding them back.

    In this case study, learn how AstraZeneca quickly deployed hybrid cloud automation, provisioned apps 150x faster with self-service, and turned central IT into a business enabler.

    Read the study here.

Find more content like what you just read:

  • MicroScope – February 2023: Opportunities in security

    In this month's issue, we explore the possibilities for the channel to make its mark with security services, and take a closer look at whether the ChatGPT revolution brings more benefits or negatives with it

    Download

  • MicroScope – July 2023: The pressure to deliver

    With technology always changing, it can feel like an impossible feat to keep up – we speak to experts about how the channel handles rapid change and the pressure this places on partners to meet customer expectations. Also read about major themes of the market and how the topic of return on investments needs to stretch beyond economics

    Download

  • Computer Weekly - 7 July 2020: The privacy challenges of easing lockdown

    In this week's Computer Weekly, as pubs in the UK re-open after lockdown, we examine the privacy issues around collecting customer data for contact tracing. We look at how interconnected devices are revolutionising the manufacturing and engineering sectors. And we assess GDPR progress two years after its introduction. Read the issue now.

    Download

  • CW Buyer's Guide: Software-defined networking

    Computer Weekly looks at how SDN can give IT administrators greater control over the network infrastructure and make it more flexible and agile part of the business.

    Download

  • How to tackle information overload

    In this week's Computer Weekly, we hear from Microsoft CEO Satya Nadella about how the firm wants to use cloud, machine learning and innovative datacentre technologies to open up access to information. Our new buyer's guide looks at network function virtualisation. And we examine the role of blockchain in cloud data security. Read the issue now.

    Download

  • Computer Weekly – 6 September 2022: Out with the old at Asda

    In this week's Computer Weekly, we talk to Asda's CIO Carl Dawson about the supermarket's cloud-oriented renovation of its technology stack. We narrate the security woes at Twitter. And we examine best practices for data backup. Read the issue now.

    Download

  • Computer Weekly – 12 March 2013: Will software-defined networking justify the hype?

    In this week's Computer Weekly, we take an in-depth look at one of the hottest emerging technologies – software-defined networking – and what it means for IT departments. We visit Iceland, home of the greenest datacentres, and see what they offer to CIOs. And we look at the growth of governance as a key task for CIOs. Read the issue now.

    Download

  • Security Think Tank: Critical National Infrastructure

    We asked our regular panel of cyber experts, the Computer Weekly Security Think Tank, to consider and highlight the risks posed to industrial control systems (ICS) and other elements of operational technology (OT), and advise on what steps CNI operators should be taking to address them.

    Download

  • CW APAC – Trend Watch: CIO trends

    Organisations have plenty of technologies to keep track of when digitising their operations. In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at IT predictions for 2024, how India's space missions will propel tech and Australia's advances in cyber security.

    Download

  • Top 10 cloud stories of 2021

    There have been plenty of ups and downs in the world of cloud over the course of 2021. The public sector has emerged as a core battleground for both public cloud giants and their smaller rivals, sustainability became more important in the cloud sourcing decisions than ever before and much more. Look at top 10 cloud stories of 2021.

    Download

  • Computer Weekly - 20 April 2021: Shop and go – will Amazon's cashless 'just walk out' store work?

    In this week's Computer Weekly, Amazon has opened its first 'just walk out' grocery store in the UK, but is it the right time to hit the high street? We examine the human and technical issues around email security. And we analyse Microsoft's $19bn purchase of voice recognition supplier Nuance. Read the issue now.

    Download

  • The state of financial institution cyberattacks

    With cyberattacks increasingly targeting financial institutions, modern bank heists can occur without a hint of noise. This annual report aims to shed light on the cybersecurity threats facing the financial sector, focusing on the changing behavior of cybercriminal cartels and the defensive shift of the financial sector. Read on to learn more.

    Download

  • Computer Weekly - 21 September 2021: The cities planning for ethical use of AI

    In this week's Computer Weekly, we talk to tech leaders in Barcelona and London about a collaboration to ensure ethical use of AI in the era of smart cities. The UK government wants to reform data protection law – we assess the implications. And we examine the latest best practice in hybrid cloud. Read the issue now.

    Download

  • Ransomware: How it starts via email & how to prevent it

    Unless Ransomware is stopped before reaching end users, it will continue to cause severe financial losses and reputational damage—and continue to pad the pockets of cybercriminals. Open this guide to explore the ins and outs of ransomware and how to prevent it.

    Download

  • A Computer Weekly buyer's guide to sustainable datacentres

    There is a growing need for datacentres to adapt to modern demands. In this 19-page buyer's guide, Computer Weekly looks at the new ideas coming from IT leaders looking to revamp datacentres, the importance of water usage in sustainability plans and the role uninterruptible power supplies have to play in decarbonisation

    Download

  • A Computer Weekly buyer's guide to sustainable datacentres

    There is a growing need for datacentres to adapt to modern demands. In this 19-page buyer's guide, Computer Weekly looks at the new ideas coming from IT leaders looking to revamp datacentres, the importance of water usage in sustainability plans and the role uninterruptible power supplies have to play in decarbonisation.

    Download

  • Publishing Test

    Publishing Test

    Download

  • Top 10 ANZ IT stories of 2021

    From using machine learning to restore public confidence to startups that are making a dent in the DevOps space, ANZ organisations have been punching above their weight on the global technology stage. In this roundup, we recap the top 10 ANZ IT stories, including the opportunities and challenges that organisations in the region have faced in 2021.

    Download

  • Top ransomware myths and how to best strategize

    When 79% of organizations report that they’ve experienced a ransomware attack in the last year, it has become critical for organizations to have the tools to better protect themselves. However, it can be difficult to know the best way for companies to strategize and build their defenses. Access this report to learn more.

    Download

  • Computer Weekly - 18 January 2022: The race to quantum computing

    In this week's Computer Weekly, researchers are racing to create the first commercially useful quantum computer – we look at one of the European candidates. Cyber security is one of the greatest risks facing the global economy, warns the World Economic Forum. And we examine the role of employee experience in hybrid working. Read the issue now.

    Download

  • 8 actions for stronger OT cybersecurity

    Along with digging into the major cybersecurity threats troubling OT, such as IoT botnets and malware attacks, this e-book outlines 8 actions that organizations can take to defend their OT environments. Review the book and elevate your OT security preparedness.

    Download

  • Top OT cybersecurity risks & how to defend against them

    As cybercriminals continue to target older operational technology (OT) systems, security leaders are pressed to bolster defenses. To help them do so, this e-book details the top risks associated with OT systems and the ways that businesses can strengthen their security stances. Read on to access these insights.

    Download

  • Your guide to the leaders of the 2023 MITRE Engenuity ATT&CK Evaluations

    In this e-book, take a comparative look at how endpoint security solutions performed in the most recent ATT&CK evaluation, and find out how Palo Alto Networks are stepping up to the challenge.

    Download

  • The state of industrial devices: Key findings

    Industrial infrastructure is foundational to modern business, making the scope of damage caused by a potential cyberattack nearly impossible to estimate. In order to better understand the state of security across industrial environments, Cybellum conducted a survey with the help of 200 industrial professionals. Download to learn more.

    Download

  • Computer Weekly – 20 February 2024: Flying into cloud – EasyJet's journey out of the datacentre to AI

    In this week's Computer Weekly, we find out how EasyJet fills an aircraft every 10 seconds while migrating to the cloud and introducing AI. There's only 283 years to go until we have a diverse IT workforce – we find out why. And we examine how the UK anti-trust investigation into the cloud market could hit the big hyperscalers. Read the issue now.

    Download

  • Quick guide to MXDR: Cost, capabilities & more

    Ransomware attacks, phishing scams, supply chain attacks . . . And on and on goes the list of threats flooding the cyber landscape. Because of the overwhelming number and the sophisticated capabilities of these threats, many businesses have adopted a managed detection and response (MXDR) tool. Learn all about MXDR in this e-book.

    Download

  • Computer Weekly – 3 September 2019: From IT disaster to digital innovation at RBS

    In this week's Computer Weekly, we meet the man brought in to turn around the technology at RBS Group after its catastrophic IT outage. We examine the latest best practice in securing mobile devices in the enterprise. And we look at progress towards "passwordless" security. Read the issue now.

    Download

  • Computer Weekly - 23 August 2022: How digital technology rescued Merlin

    In this week's Computer Weekly, we talk to Merlin Entertainments – operator of Legoland and Alton Towers – about how digital saved the company when Covid shut its theme parks. We find out how data analytics can help to track greenhouse gas emissions. And Southern Water explains how data supports vulnerable customers. Read the issue now.

    Download

  • CW ASEAN: Trend Watch – Security

    Artificial intelligence tools are becoming a vital part of the security arsenal for organizations and cyber criminals alike. In this handbook, Computer Weekly looks at how ASEAN firms are using AI to combat cyber threats and experts discuss the latest smart cyber security tools.

    Download

  • Computer Weekly - 17 August 2021: How to choose between SIEM and SOAR

    In this week's Computer Weekly, our buyer's guide examines the use of SIEM and SOAR to improve IT security, and asks which you should use, and when? We look at what you need to know about NVMe over Fabrics, the emerging storage networking technology. And we find out how Oracle customers are introducing its Fusion Cloud suite. Read the issue now.

    Download

  • A case study in critical infrastructure interdependency

    This article in our Royal Holloway Security Series provides a short introduction to Critical Infrastructure Protection.

    Download

  • Top 10 datacentre stories of 2021

    The 2021 datacentre news cycle has been dominated by stories about how demand for hyperscale datacentre capacity is continuing to boom, while market watchers grow increasingly concerned about how all this growth is affecting the environment. With this in mind, here's a look back over Computer Weekly's top 10 datacentre stories of 2021.

    Download

  • In 2017, the insider threat epidemic begins

    Cyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.

    Download

  • Essential Guide to Threat Management

    Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.

    Download

  • Information Security Essential Guide: The Evolution of Threat Detection and Management

    This Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime.

    Download

  • Towards more robust internetworks

    This article in our Royal Holloway Security Series explains how graph theory can be used to model internetworks and improve their resilience against failures and attacks.

    Download

  • Threat prevention techniques: How to build a strong network

    Consult this expert E-Guide to learn how you can develop best practices for threat management and how you can build a strong network. Find out tips from the experts on how you can build a foundation for complete threat protect ion by consulting this guide now.

    Download

  • Innovation Awards APAC 2023 - Public Sector: Andhra Pradesh

    Many parts of rural India depend on uncovered drinking water, which is unsafe for human consumption. To address the challenge, the Andhra Pradesh Space Applications Centre (APSAC) created a digital infrastructure for sourcing data on water assets, and made the data available on a GIS platform.

    Download

  • Expert E-Book: Data Security and the Cloud

    This e-book will cover encryption and key management, infrastructure risks, data integrity, and access control, all in the context of cloud computing.

    Download

  • CW APAC, August 2021: Trend Watch on Datacentre Operations

    In this handbook, focused on datacentre operations in the Asia-Pacific region, Computer Weekly looks at the most innovative methods being adopted to improve datacentre efficiency.

    Download

  • Innovation Awards APAC 2023 - Transportation: Transdev Sydney Ferries

    With public safety a top priority, Transdev Sydney Ferries realised it had to move to a 5G network infrastructure that could better provide the capacity and speed it needed. The decision has enabled the transport operator to shorten the time needed to analyse hours of video footage and resolve at least 70% of feedback within 2 business days.

    Download

  • Computer Weekly – 6 December 2022: Is Twitter still safe, and should you stop using the platform?

    In this week's Computer Weekly, with a litany of security and compliance issues caused by Elon Musk's takeover of Twitter, we ask if it's still safe for enterprises. Our latest buyer's guide examines the technologies and best practices behind data visualisation. And we look at the emerging devices for accessing the metaverse. Read the issue now.

    Download

  • Top IT Predictions in APAC in 2023

    In this round-up, we review some of the key IT trends that are likely to shape the industry across the APAC region in 2023.

    Download

  • The state of the threat landscape

    The advent of AI as a tool has lowered the barrier of entry for hackers, only adding fuel to the fire that is the rapidly expanding threat landscape. With this 2024 Global Threat Report, CrowdStrike’s elite Counter Adversary Operations team delivers actionable intelligence you can use to stay ahead of today’s threats. Read on to learn more.

    Download

  • Expert guide: Reconfigure your anti-malware strategy to combat new cyber-threats

    This expert e-guide explains why reconfiguration of your current antimalware strategy is all it takes to mitigate new trends in cyber-attacks.

    Download

  • The Evolution of Threat Detection and Management

    This e-guide from SearchSecurity.com explores the [evolution of threat detection and management] and offers advice on how to tackle potentially disastrous APTs, detailing multiple mitigation methods, from SIEMs and big data to sandboxing and whitelisting.

    Download

  • Computer Weekly - 12 April 2022: Disney combines digital, data and creativity for ad opportunities

    In this week's Computer Weekly, we talk to Disney Advertising Sales about how it is using data to subserve story-telling excellence. We delve into how rising energy costs negatively impacted the the UK arm of Sungard Availability Services. And we look at the role of infrastructure as code in edge datacentres. Read the issue now.

    Download