Webinar Recording: Why Phishing Attacks Work and What You Can Do About Them

View our recent webinar on Phishing, hosted by one of our senior technical security experts and find out what you can do to significantly reduce the risk of a user unknowingly installing malware in your organisation.

The Exinda Technical Boot Camp – Snap Shot

HMS_Belfast_from_the_RiverWonderful turn out yesterday on our technical boot camp with Exinda on the HMS Belfast in London. With the sun threatening to make an appearance and in the shadow of tower-bridge and opposite the gherkin the ship makes a great location.

We were delighted to have been joined by IT & Network managers from a range of different organisations facing issues from visibility & bandwidth usage to the increase in social media utilisation & the challenges faced in organisations with offices in multiple locations. The boot camp is designed to give invaluable hints and tips on how to immediately transform your network and tackle these complex network challenges.

DavidSilsbyDavid Silsby, Sales and Marketing Director here at Network Utilities kicked off the introductions, giving some brief background to Network Utilities, you’ll find more about us on our website here, but in short we are premier Exinda partners working with organisations in multiple industries supporting their networking, visibility and optimisation challenges.

Juan Lyall, from Exinda Networks was next up and gave us a brief overview and introduction to the Exinda organisation.

Malcolm Orekoya Senior Technical Consultant here at Network Utilities was up next, outlining the challenges in today’s networks and the pressures now placed on the network due to changing trends.

MalcolmSome mind boggling stats for you

  • Every minute Facebook users share nearly 2.5 million pieces of content
  • Every minute email users send over 200 million messages
  • The global internet population grew 14.3% from 2011 – 2013 and now represents 2.4 BILLION people

Changing trends are also placing pressure on your network:

Increase in size and power of apps and the amount of digital content being consumed on various devices.

In addition to the increased network consumption, there’s been a change in the use of laptops and tablets on the network, with users increasingly favouring mobile devices like tablets.

Here we see the effect that the BYOD trend is having on the network with more users accessing more content through more devices.

The challenge is separating the business critical from the non-business critical applications and being able to control your network traffic.

We then invited our guests to tell us about the challenges they are facing today on their networks. This helps Malcolm when delivering his hands-on demo of the Exinda device. Following a short coffee break we dived straight into the Exinda appliance demonstrating the interface – with insight into the dashboard, visibility, control and optimization modules. Here’s a snapshot…

The innovative dashboards allow you to see network activities across all users, applications, devices and locations. You can analyse and inspect application traffic at layer 7 so you can troubleshoot issues quickly when they arise, in addition you can interact with data to better understand the health of your network and appliances.

dashboardThe solution centre gives you a library of reports designed to address specific issues faced by network managers including WAN planning, Application Performance, Network Governance and Critical IT projects.

Recommendation Engine studies patterns and changes in your network, it delivers potential problems before they occur and automatically makes suggestions to repair issues and optimize network performance.


Policy based shaping lets you prioritise how and when users, applications and web sites consume bandwidth, allowing you to control bandwidth by user, group, time and location.

Application Acceleration makes sure your business critical applications are fast and prioritized.

Central Management lets you control your entire network estate from a central console.

In short Exinda’s WAN Orchestration focuses on making your network more reliable, more productive and faster.

All delegates who attended our boot camp were offered a free network health check – where an Exinda device is deployed on site for 30 days.

If you would like to know more about how Exinda’s WAN Orchestration can help you solve the network challenges you now face in your organisation then please get in touch today to arrange a demo with a solutions expert from our team.

ChangeGear – The Best Value Service Desk

ChangeGear® is a fully-integrated Service Desk Platform. The product suite enables companies to gain greater visibility into their IT infrastructure, eliminate system downtime, reduce operational costs and ensure regulatory compliance. Watch our event video from this year’s SITs show at Olympia for more on ChangeGear  – the best value service desk.

Your DNS is Under Attack – Find Out How to Protect Your DNS with Infoblox

The Domain Name System (DNS) is a mission-critical network infrastructure. It needs to be secure, highly available, and trustworthy. Watch our event video with our partner Infoblox at this year’s Infosec and find out how to protect your DNS with Infoblox.

Webinar Recording: The Leap to Token Free What to Consider When Evaluating Multi-Factor Authentication

With the rise in systems being breached and major brands falling victim to hackers, it is clear that the need for strong multi-factor authentication has never been more urgent. Companies of all sizes are increasingly adopting modern SMS based technology instead of hard tokens to authenticate their users. Is it time for you to evaluate the benefits as well?   View our webinar for a 30 min overview of SMS Passcode a real-time and location aware, much more secure upgrade alternative to tokens.

Infoblox at Infosec – How Secure is Your DNS?

IMG_0696We spent a great few days with our partners Infoblox at Infosecurity Europe last week. Many thanks to everyone who visited us on stand P60 at the show for help and advice on how to secure their DNS.

The Domain Name System (DNS) is a mission-critical network infrastructure. It needs to be secure, highly available, and trustworthy.

With DNS increasingly under attack, do you know if your DNS is secure?

IMG_0691Infoblox are the market leader in DNS. Their approach to DNS security combines their enterprise grade DNS with advanced threat intelligence, discovery and port control to deliver visibility, protection and response to DNS threats.

In spite of using the latest firewall and intrusion prevention devices, many organisations have malware or advanced persistent threats (APTs) in their networks and don’t even know it.

Infoblox, a market leader in DNS, provides the industry’s first true DNS security solution for protection against inside-out threats caused by malware and APTs. Infoblox DNS Firewall can detect DNS-based malware/APT activity inside the network and disrupt the ability of infected clients to communicate with botnet master controllers.

Infoblox are offering a new assessment tool that analyzes your DNS traffic for Malware activity.

Request Your Free DNS Security Assessment >

Survey Says… Zero-Day Attacks and Evasive Malware are Biggest Risks

We thought you’d be interested in some initial findings from the recent Palo Alto survey of Ignite attendees. The survey uncovered the cybersecurity pain points these event attendees face, what keeps them up at night, and what specific concerns they have for their organisations.

The majority of respondents reported zero-day attacks and evasive malware represent the biggest risks. Social engineering attacks and insider threats are close behind.

Palo_Alto_Bog_ImagePalo Alto emphasised that with so many attacks detection in itself is not enough – prevention is key – stopping these attacks before they damage your brand or steal your valuable customer and corporate data.

Palo Alto deliver…

 ‘…a tightly integrated enterprise security platform that delivers automated prevention against known and unknown threats at every point in the kill chain.’

Download a copy of Cyber Security for Dummies here for hints and tips on the cybersecurity landscape, why traditional security solutions fail and best practices on how to control APTs.