5 tips for securing your network

16 May 2024

Jon Taylor, director and principal of security, Versa Networks

Jon Taylor, director and principal of security, Versa Networks

Organisations face significant challenges when securing their digital transformation initiatives as traditional perimeter boundaries are dissolving due to cloud and hybrid work, leaving the edge network wherever users and devices exist.

Find out more
Enhancing workplace security through mobile device management solutions

08 May 2024

VimalRaj Sampathkumar, technical head - UK & Ireland, ManageEngine

In today’s fast-paced digital landscape, mobile devices have become indispensable tools. That’s particularly true in the workplace, with employees even relying on their mobile devices to access apps such as WhatsApp to communicate about work.

For IT teams, keeping track of these devices and everything on them poses a cybersecurity challenge. And businesses that follow a bring your own device (BYOD) policy, where employees can access private work data and channels from their own devices, are especially vulnerable.

Find out more
What do managers need to know about DCIM?

09 April 2024

Alison Matte, sustainability lead, EcoStruxure IT, Secure Power Division, Schneider Electric

Alison Matte, sustainability lead, EcoStruxure IT, Secure Power Division, Schneider Electric

Data centres continue to see unprecedented growth and the IDC forecasts a steep climb in data centre energy consumption, partially driven by generative AI, anticipating a growth to 803TWh by 2027, which marks a compound annual growth rate (CAGR) of 16%.

In context, the growth represents the total energy consumption of France in 2022, and it is this growth which is causing countries to create regulations to manage the impact that IT and data centres are having on the grid. For new regulatory requirements to be achieved, Data Centre Infrastructure Management (DCIM) tools have never been more important.

Find out more
Securing the network in the face of modern challenges

05 April 2024

Paul McHugh, area director UK, Cradlepoint

The cybersecurity landscape is no stranger to change. With the onslaught of new threats and the increasing sophistication of cyber-attacks, security strategies must adapt. The emergence of 5G as a primary WAN technology creates new opportunities and corresponding security challenges requiring comprehensive, customisable security.

A major area that 5G technology will affect is the expansion of IoT devices as many of these devices will be added to 5G networks. Ericsson predicts the number of IoT-connected devices will reach 34.7 billion by 2028, up from 13.2 billion in 2022. As the number of IoT devices continues to grow, the attack surface also grows, increasing the risk of attack from bad actors. This is why we have seen a rise in cyber-attacks targeting IoT devices, with some reporting an increase of 400% of IoT malware in 2023 alone.

Find out more
UPS – let’s make it modular

07 March 2024

Stuart Dealing, sales, service and project execution leader, ABB Power Protection

When choosing a power protection scheme for a data centre, the first thing to consider is the total cost of ownership (TCO).

Operators typically want a 20-year lifetime for a UPS nowadays. So, investing in a more energy efficient model will result in significant overall cost and emissions savings, especially with energy prices surging. Similarly, specifying a UPS with better quality components, that only need replacing once rather than two or three times over the lifetime of the UPS, drastically reduces TCO.

Find out more