Post date: 02/03/2020 - 14:05

Current VPN architectures fall short of meeting application performance expectations of remote users, and the use of shadow IT by remote users to work around VPN issues poses a security risk for IT departments. Other limitations and issues for employees and remote users include slow VPM access and application performance, and frequent disconnection and confusion while on the go and travelling. As a result, IT departments are lumbered with a high number of complaints, difficulties ensuring security and compliance, lack of network visibility and high costs and complexity.

Post date: 18/03/2019 - 09:51
We're exhibiting at Networkshop47 - Visit us at stand 20!
Post date: 20/10/2017 - 16:25

New user demands and technology advances are increasingly putting pressure on campus networks requiring them to scale to support more devices and deliver more bandwidth.

The rapid growth in wireless traffic, accelerated by the adoption of 802.11ac and 802.11ax Wi-Fi, is propelling the migration from 1GbE to Multi-gigabit at the network edge and, driving the need for faster aggregation and core solutions.

The Ruckus® ICX® 7850 is designed to meet these new challenges:

Post date: 13/10/2017 - 14:51

By Russell Bristow, Group Sales Director

In a fast-evolving market like IT, it is always tempting to focus on The Hype and The Sizzle. And Vanix has plenty to offer on this front. Exciting, disruptive technology in SD-WAN, IoT, cyber protection, machine learning…the list goes on.

But sometimes big changes in a market, prompted by innovation or plain old economics, can mean that well-established tech can rise to the top of ‘most talked about’ lists.

Post date: 14/07/2017 - 11:55

As companies and organisations reassess the need for adequate protection against cyber threats, Ampito Group Sales Director, Russell Bristow, shares the six key things IT teams must consider.

1. Education, education, education
No matter how sophisticated your security defences, user behaviour is always a key vulnerability, and one that is often overlooked. Over 90% of malware is delivered by email and, using services such as PhishMe, Ampito can help educate your workforce to be more cyber-smart.

Post date: 03/05/2017 - 09:27

A lot can happen in seven hours. You can fly from London to New York, binge-watch half a season of Suits, drive from LA to San Francisco (California traffic allowing!) or even simply get a good night’s sleep. If all that can happen in seven hours, imagine what can happen in seven days, seven weeks or seven months.

Especially in your network.

Pages