Are you attending IP EXPO Europe?

Join us and Partners, Savvius and Infoblox at this year’s IP EXPO, 7 – 8 October, ExCeL, London.

Register here.

Make sure to visit Savvius on stand BB1 to learn how:

  • Security attacks are up. Discovery times are long. Data is leaving the building. You finances and reputation are at risk. Effective investigations are key.
  • Savvius can help you troubleshoot security and performance incidents by storing logs and traffic from both before and after events have been detected, providing you with months of intelligence.

Make sure to visit Infoblox on stand A8 to learn how you can:

  • Secure your DNS infrastructure against malware and DNS DDOS attacks
  • Take control of your network by automating your network configuration and change management
  • Address the challenges and hurdles of adopting virtualization and cloud computing

Also, you’ll get a chance to hear from Dr. Malcolm Murphy, speaking on ‘Stop the bad guys exploiting your DNS’ in the Cyber Attack, Remediation & Mitigation Theatre on 07th and 08th October at below times:

Wednesday, 7th Oct 13:00 – 13:30

Thursday, 8th Oct 13:40 – 14:10

Don’t miss out – stop by the Infoblox and Savvius stands or email to schedule a demo with a technical expert on stand.

See you at IP EXPO Europe.

Register here Utilities Team


Stop Phishing Attacks – Harness The Power of Your Human Sensor Network

By Malcolm Orekoya, Senior Technical Consultant at Network Utilities

MalcolmViews expressed in this post are original thoughts posted by Malcolm Orekoya. These views are his own and in no way do they represent the views of the company.

In the security world the ability of any system to proactively or reactively deal with a security threat is highly reliant on the systems sensors, that is, the ability for the systems to detect threats. This detection process can be based on a myriad of characteristics, heuristics, behaviours etc. that make it possible for the system to differentiate between what is normal and what is abnormal in the context of the type of traffic that system processes on a daily basis. Once the threat is detected the system can then react to it by performing some sort of mitigating action.

The success of security initiatives relies on the implementation of layered security defences, and at a high level the major layers of infrastructure networks most widely considered are the endpoint (or host) layer, the application layer and the network layer. All the detection systems such as firewalls, intrusion preventions systems (IPS), distributed denial of services (DDoS) systems, anti-virus, web application firewalls (WAF) etc. deployed at these layers rely on early detection of abnormal activity in order to function optimally. But why is the human layer seldom considered when it comes to detecting abnormal behaviour on the network? Especially when it pertains to the type of threats that specifically target human vulnerabilities, such as malware, advanced persistent threats (APT) and phishing.

The one constant factor that exists at all currently considered layers of security is the human element. It is often said that humans can be the weakest part of any security system and this can be, for example, because people are capable of making configuration mistakes. So to counter this, training is provided to individuals who manage these systems in order to minimise the risk of such mistakes. However training is seldom considered to educate people on how to detect abnormal activities in their interactions with day to day systems such as emails, browsers and websites. How does an employee detect the difference between an email with a legitimate attachment and a malicious one? Or a legitimate website and a phishing website? Education is the answer; or rather Educate, Test, Review, Repeat might be a better sequence of activities to combat this.

The idea here is to educate people on these threats and its various guises, test their understanding and responses to the education, review the results of such tests and then repeat the entire cycle periodically over and over again. Do not simply assume that everyone within your organisation should know how to spot and react to phishing attacks. We assume most people that work within the IT team do but it is easy to fall victim to what are nowadays very sophisticated and deceptive phishing attacks.

From a defence in depth security perspective, the end goal here is to cover all bases by creating a human sensor network within your organisation, where the human element becomes an integrated part of your security systems sensors ability to detect threats. In many cases we already enable people to become part of the organisations security alert system, for example, in offices where an unrecognised person can be stopped by anyone, anywhere within the office premises if they are walking around without an identification badge visibly displaying who they are.

Over the last couple of years there have been numerous publications that have highlighted that the wide spread infection of endpoint devices by malware and growth in cyber espionage have increasingly featured phishing. This is due in part to the lack of effective awareness and training being provided to the humans that are essentially the first point of attack for phishing activity. By transforming this first point of attack into an effective detection sensor you are creating a network of human sensors, which can hugely reduce the number of people that fall victim and subsequently reduce the success percentage of phishing campaigns. Usually in a more cost effective and efficient manner than most other technologies out there.

Want to know more? Please get in touch via and visit to find out how proactive user security training can help you stay protected.

About Malcolm
As Senior Technical Presales Consultant at Network Utilities Malcolm consults and advises on specialist IT Networking, Security and Service Management requirements.

Webinar Recording: Why Phishing Attacks Work and What You Can Do About Them

View our recent webinar on Phishing, hosted by one of our senior technical security experts and find out what you can do to significantly reduce the risk of a user unknowingly installing malware in your organisation.

The Exinda Technical Boot Camp – Snap Shot

HMS_Belfast_from_the_RiverWonderful turn out yesterday on our technical boot camp with Exinda on the HMS Belfast in London. With the sun threatening to make an appearance and in the shadow of tower-bridge and opposite the gherkin the ship makes a great location.

We were delighted to have been joined by IT & Network managers from a range of different organisations facing issues from visibility & bandwidth usage to the increase in social media utilisation & the challenges faced in organisations with offices in multiple locations. The boot camp is designed to give invaluable hints and tips on how to immediately transform your network and tackle these complex network challenges.

DavidSilsbyDavid Silsby, Sales and Marketing Director here at Network Utilities kicked off the introductions, giving some brief background to Network Utilities, you’ll find more about us on our website here, but in short we are premier Exinda partners working with organisations in multiple industries supporting their networking, visibility and optimisation challenges.

Juan Lyall, from Exinda Networks was next up and gave us a brief overview and introduction to the Exinda organisation.

Malcolm Orekoya Senior Technical Consultant here at Network Utilities was up next, outlining the challenges in today’s networks and the pressures now placed on the network due to changing trends.

MalcolmSome mind boggling stats for you

  • Every minute Facebook users share nearly 2.5 million pieces of content
  • Every minute email users send over 200 million messages
  • The global internet population grew 14.3% from 2011 – 2013 and now represents 2.4 BILLION people

Changing trends are also placing pressure on your network:

Increase in size and power of apps and the amount of digital content being consumed on various devices.

In addition to the increased network consumption, there’s been a change in the use of laptops and tablets on the network, with users increasingly favouring mobile devices like tablets.

Here we see the effect that the BYOD trend is having on the network with more users accessing more content through more devices.

The challenge is separating the business critical from the non-business critical applications and being able to control your network traffic.

We then invited our guests to tell us about the challenges they are facing today on their networks. This helps Malcolm when delivering his hands-on demo of the Exinda device. Following a short coffee break we dived straight into the Exinda appliance demonstrating the interface – with insight into the dashboard, visibility, control and optimization modules. Here’s a snapshot…

The innovative dashboards allow you to see network activities across all users, applications, devices and locations. You can analyse and inspect application traffic at layer 7 so you can troubleshoot issues quickly when they arise, in addition you can interact with data to better understand the health of your network and appliances.

dashboardThe solution centre gives you a library of reports designed to address specific issues faced by network managers including WAN planning, Application Performance, Network Governance and Critical IT projects.

Recommendation Engine studies patterns and changes in your network, it delivers potential problems before they occur and automatically makes suggestions to repair issues and optimize network performance.


Policy based shaping lets you prioritise how and when users, applications and web sites consume bandwidth, allowing you to control bandwidth by user, group, time and location.

Application Acceleration makes sure your business critical applications are fast and prioritized.

Central Management lets you control your entire network estate from a central console.

In short Exinda’s WAN Orchestration focuses on making your network more reliable, more productive and faster.

All delegates who attended our boot camp were offered a free network health check – where an Exinda device is deployed on site for 30 days.

If you would like to know more about how Exinda’s WAN Orchestration can help you solve the network challenges you now face in your organisation then please get in touch today to arrange a demo with a solutions expert from our team.

ChangeGear – The Best Value Service Desk

ChangeGear® is a fully-integrated Service Desk Platform. The product suite enables companies to gain greater visibility into their IT infrastructure, eliminate system downtime, reduce operational costs and ensure regulatory compliance. Watch our event video from this year’s SITs show at Olympia for more on ChangeGear  – the best value service desk.

Your DNS is Under Attack – Find Out How to Protect Your DNS with Infoblox

The Domain Name System (DNS) is a mission-critical network infrastructure. It needs to be secure, highly available, and trustworthy. Watch our event video with our partner Infoblox at this year’s Infosec and find out how to protect your DNS with Infoblox.

Webinar Recording: The Leap to Token Free What to Consider When Evaluating Multi-Factor Authentication

With the rise in systems being breached and major brands falling victim to hackers, it is clear that the need for strong multi-factor authentication has never been more urgent. Companies of all sizes are increasingly adopting modern SMS based technology instead of hard tokens to authenticate their users. Is it time for you to evaluate the benefits as well?   View our webinar for a 30 min overview of SMS Passcode a real-time and location aware, much more secure upgrade alternative to tokens.