What's going on

Stay up-to-date with the latest industry news, blog posts, and insights.

Placeholder for Students universityStudents university

Press release

Belgian national research network Belnet signs multi-million euro contract with Nomios / Infradata

Belnet enters into an agreement with Nomios / Infradata for the support and expansion of its high-end network infrastructure. It concerns a contract of 13 million euro.

1 min. read
Placeholder for Closeup young man holding smartphoneCloseup young man holding smartphone

Juniper Networks Mist AI

First and only AI-controlled WLAN

Juniper and Mist's AI-driven WLAN provides deep insights and analytics for end-to-end networks and can deliver an exceptional user experience.

1 min. read
Placeholder for Engineer behind screen dark roomEngineer behind screen dark room

Company update Juniper Networks

AI-supported network infrastructure home office solution

Juniper Mist provides the optimal solution to effectively combine telemetry data, machine learning and artificial intelligence to securely connect enterprises, remote offices, home offices and cloud applications.

1 min. read
Placeholder for Juniper networks elevate award 2020Juniper networks elevate award 2020

Juniper Networks

Nomios UK recognised as 2020 EMEA Commercial Partner of the Year by Juniper Networks

We are hugely excited to announce that we have won the Juniper Networks EMEA Commercial Partner of the Year Award! Juniper Networks recognises us for our commitment to delivering exceptional customer outcomes and innovation during a period of huge business transformation.

1 min. read
Placeholder for Junos 10 tipsJunos 10 tips

Juniper Networks

Ten tips for Junos troubleshooting

Junos OS is used by hundreds of thousands of organisations across the world to run their networking operations in a reliable, secure and flexible way. We give you 10 practicle tips.

Alex Walker

2 min. read
Placeholder for Night city streetNight city street

5 reasons to consider a managed SOC service provider

When dealing with security threats, organisations could opt for a managed SOC (Security Operations Center). We provide five managed SOC service provider benefits.

8 min. read
Placeholder for Wind power clouds greenWind power clouds green

OT security

How can you secure your OT environment?

OT security in focus. The factors you need to consider when securing your OT environment. We provide individual, customised approaches and solutions and offer professional and expert support for your project.

7 min. read
Placeholder for F5 networksF5 networks

F5 Networks

F5 State of Application Strategy Report 2021

Digital transformation has raced forward in the last year. F5 has published its report 2021 State of Application Strategy Report for the 7th time.

1 min. read
Placeholder for Datacenter hall blue light 1Datacenter hall blue light 1

Network automation Juniper Networks

Juniper Networks acquires Apstra

Last year Juniper Networks, a leader in secure AI-driven networks, announced an agreement to acquire Apstra, a leader in intent-based networking and automated closed-loop assurance.

1 min. read
Placeholder for Aerial view highway flyoversAerial view highway flyovers

Enterprise networking

What is enterprise networking?

Enterprise networking may seem complicated but it's essential for businesses to operate. We explain the basics and introduce you to a few vendors.

Hilmar Burghgraaff
Placeholder for Hilmar burghgraaffHilmar burghgraaff

Hilmar Burghgraaff

7 min. read
Placeholder for SASE Journey Part TwoSASE Journey Part Two

SASE

Next stop on the SASE journey: Establishing a plan and team for success

SASE is a technology shift and consumption model that promises to change how we view and access our digital environments.

Mike Spanbouer
Placeholder for Mike spanbauer juniper networksMike spanbauer juniper networks

Mike Spanbouer

5 min. read
Placeholder for Engineer focused on taskEngineer focused on task

VPN

Are you still satisfied with your remote working solutions?

Last March, everyone started working from home en masse and remote working licences were purchased a lot. Mostly Pulse Secure. These are about to expire.

1 min. read
Placeholder for Building skyBuilding sky

SASE

Architectural choice: The key to a successful SASE journey

An organisation’s choice in architecture is critical because it can directly impact their SASE objectives. Choices made at the architecture definition stage will dictate how each service component supports current business needs.

3 min. read
Placeholder for Road blue skyRoad blue sky

SASE

The road to SASE is a journey, not a sprint

You don't just implement SASE one day, it takes time and effort. One of the reasons is because nearly all organisations already have some degree of investment in technologies, making a quick adoption difficult. That is why the road to SASE is a journey, not a sprint.

4 min. read
Placeholder for Windmills cityWindmills city

Anti-DDoS

Top 6 DDoS protection solutions that should be on your radar

Overview of DDoS protection solutions to protect enterprises against these bigger, smarter and more diverse DDoS-attacks. These 6 should be on your radar! Find out more.

9 min. read
Placeholder for Managed SOC security engineer - MSSPManaged SOC security engineer - MSSP

Security Managed services

8 major benefits of having a Managed Security Services Provider (MSSP)

Managed Security Services Providers (MSSPs) provide structural security solutions against cyberattacks, including always up-to-date expertise in the latest cyber threats and appropriate solutions. Here's 8 benefits of the best MSSP to prevent cyberattacks and save costs.

9 min. read
Placeholder for Woman smartphone at nightWoman smartphone at night

Broadforward

Global network operator Truphone goes live with new DSC from BroadForward and Nomios

We have been selected by Truphone to replace their legacy diameter routers with the BroadForward Diameter Signalling Controller (DSC).

3 min. read
Placeholder for Ransomware aanval socRansomware aanval soc

Ransomware

Ransomware with Data Leak Extortion

As data leak extortion swiftly became the new norm for big game hunting (BGH) ransomware operators since late 2019, various criminal adversaries began innovating in this area. This includes collaboration between ransomware groups, auctioning leaked data and demanding not just one ransom for the ransomware decryptor but also a second ransom to ensure stolen data is deleted.

7 min. read

Sign up for our newsletter

Get the latest security news, insights and market trends delivered to your inbox.