Webinar recording: Network Security in the Cloud – Join the Revolution

Cato Networks is rethinking network security from the ground up and bringing it into the Cloud. Cato connects your branch locations, mobile users, physical and Cloud infrastructure into a secure and optimised global network in the Cloud.

Cato is making Network Security Simple Again.

Watch this recording to learn how Cato’s Cloud-based Secure Network offers a simple and affordable platform to securely connect all parts of your business.

Find out more about Cato Networks here.

Exinda: The Business Case for WAN Orchestration

Do you need improved visibility & control of your WAN traffic to maximise user experience & network performance? Watch our short video blog on the key features of Exinda’s WAN Orchestration. The webinar referenced in this video will be available on this blog shortly.

Video : Juniper Networks & Netutils Deliver Innovation

[vimeo vimeo.com/http://vimeo.com/78640657]

Hosted at Mercedes Benz World, Juniper Networks’ and Netutils’ recent workshop on Innovative Transitions in Networking & Security provided an opportunity for our customers to learn about Juniper Network’s latest innovations in networking & security. Watch the video from the day here.

Don’t ignore the hype: IT trends deliver security with access

By Malcolm Orekoya, Technical Specialist, Netutils

Views expressed in this post are original thoughts posted by Malcolm Orekoya, Technical Specialist, Netutils. These views are his own and in no way do they represent the views of the company.

How do we enhance security but allow users access to the data and resources they need seamlessly and improve enterprise productivity, while still keeping up with the trends in mobility, consumerisation and cloud? The answer is by following those trends.

Look beyond the technology and look at the people that use the technology. This tells us two things: users do not prioritise security, and your enterprise productivity is directly related to the ability of your users to perform their tasks efficiently. So companies cannot adopt a “lock everything down” mentality. It is effectively a denial of service attack against yourself, because you are essentially denying access to the essential services needed by your users. So security, and enforcement of it, is solely the responsibility of the enterprise. It may sound harsh, but it is the reality; employees are accountable for the procedures, guidelines and policies to which they are required to adhere to.

The only viable way to build a secure network that moves with CoIT is to use existing corporate user identity systems (such as Active Directory, LDAP, SQL) to integrate with evolving ideas to automatically provision context-aware applications and resources.

So how to secure data and the network while still allowing seamless access and speedy resource allocation? Don’t ignore the trends in the IT industry. Cloud and hosted applications are continually increasing in adoption because they guarantee a certain level of security of access, ease of access, flexibility, automated provisioning, ease of upgrades, cross platform compatibility and reduced CAPEX, while maintaining compliance and security standards. The providers of these solutions are themselves heavily regulated and required to adhere to high standards of data and network security.

If you prefer to retain in-house control of applications, then virtual desktop infrastructure (VDI) means you benefit from reduced costs over time of purchasing user endpoint machines by moving to thin clients. But also these VDI platforms allow control of what applications employees have access to, and provide much more granular control on what tasks users can perform. Because a lot of the VDI platforms allow “hot-desking”, as user profiles are maintained on centralised servers, they provide access flexibility and remote access, which fit with CoIT needs.

Zero-Day protection is also another useful trend; the means by which an enterprise can protect its data and resources from threats and vulnerabilities that are currently unknown, so consequently do not have a fix. Zero-Day application exploits, targeted attacks, advanced information stealing malware and Advanced Persistent Threats (APTs) all pose a serious security threat to enterprises, but as these threats evolve, so does the approach to effective and manageable protection. Active defence, which discourages attacks by focusing on raising costs and risks to attackers, is slowly creeping into enterprise strategy. Proactive protection – including advanced Web Application Firewalls (WAF), counterstrike and intrusion deception techniques – are all protection methods that have seen a revival. For example, in 2012 Juniper Networks acquired Mykonos Software’s intrusion deception software (Junos WebApp Secure) to enhance its web application security portfolio. It places deception points along the way. When an attacker trips one of those tripwires, we are alerted to the fact they are there and can watch them.

The reality is that vulnerabilities and threats exist, and come from inside as well as outside the network. The biggest insider threats are the employees, but we can only educate staff on how to handle sensitive corporate data and how to use corporate resources. For outsider threats, innovation brings assistance.

Webinar Recording: Wi-Fi Guest Access Always On, Always Connected

[vimeo vimeo.com/http://vimeo.com/70541790]

The rise of user expectations for anytime, anywhere wireless access places increasing pressures on the IT team. To meet this demand today’s organisations are required to offer guest Wi-Fi services throughout the communal areas of their head and branch offices for visitors, contractors and staff. View our webinar recording here on our Cloudutils Guest Access solution.

Webinar Recording: Guarantee Application Performance

[vimeo vimeo.com/http://vimeo.com/61334559]

Are you moving or planning to move business applications to the cloud? If so, you may share some of the following concerns:
• The time & costs involved in resolving application performance problems
• Having the information visibility you need in order to make QoS decisions
• Ensuring business critical applications take preference over resource hungry social and non- critical applications
If your role includes responsibility for cloud application performance and delivery and you identify with one or more of these issues then watch our webinar here.

iPad mini winner announced!

Meet Janusz Naks, Information Security Manager and winner of our iPad mini prize draw at JanuszIPadmini3BLOGCloud Expo Europe. Janusz was a visitor to our stand at the event in January 2013 where we launched Cloudutils, our range of cloud services.

I’m thrilled to have won the iPad mini, it came as an unexpected but very welcome surprise! In the higher education sector we are looking at BYOD as part of on-going strategy. In HE students, staff & visiting lecturers are already using tablets, laptops, and smart phones, as are some of the IT team, so winning the iPad mini will support our BYOD initiatives and will be instrumental in defining policies aimed at securing the BYOD environment. I am sure that the iPad will become an essential working tool for me day to day. Thanks Netutils!

 We will be keeping in touch with Janusz to find out how he’s getting on. In the meantime many congratulations from all the team here at Netutils. (And no… we’re not jealous .. well, maybe a little bit.)