Nomios Group expands in Southern Europe with leading Italian cybersecurity expert Aditinet Read article

What's going on

Stay up-to-date with the latest industry news, blog posts, and insights.

Placeholder for Security engineer desktopSecurity engineer desktop


What to do against a ransomware attack?

As a company, you can already do a lot to counter ransomware attacks. One of the measures is the deployment of a Security Operations Center (SOC). Find out why and how!

7 min. read
Placeholder for Rodion kutsaev 0 VGG7cq Tw Co unsplashRodion kutsaev 0 VGG7cq Tw Co unsplash


BICS selects Nomios to deliver next generation Signalling Transfer Point

Enabling intelligent routing with centralized configuration, management and provisioning for SS7 signaling traffic.

3 min. read
Placeholder for Juniper networks elevate award 2020Juniper networks elevate award 2020

Juniper Networks Award

Juniper Networks Elevate Awards 2020

The Juniper Networks Elevate Awards 2020 have been presented. We congratulate all winners on receiving this award and also the nominees on their honourable mention. Only real network innovators have a chance to win this award.

1 min. read
Placeholder for Steep white rocksSteep white rocks


What is your cloud migration strategy?

At first glance, cloud migration can seem like a mere technical decision, but it is very much business-related. Thus, the right question is: what are the business needs that are driving your organisation to migrate to the cloud?

5 min. read
Placeholder for Business people walkingBusiness people walking


Why Telcos are Exploring ‘Best of Suite’ over ‘Best of Breed’ Solutions

In the past, when operators first contemplated virtualising infrastructures and adopting software-defined networks (SDNs), many were tempted to pursue a ‘best of breed’ strategy whereby they deployed standalone systems (with independent software modules) to manage each function. It was an idealistic approach, but one that now seems out of step with the times.

1 min. read
Placeholder for Close up laptopClose up laptop


The history of ransomware and the new trends

As organisations improve their capabilities to rebound from ransomware attacks and security researchers continue to create decryptors for ransomware, there is less incentive for victims to pay the ransom in order to reclaim files. However, criminal actors have found a way to thwart these defensive measures.

14 min. read
Placeholder for Street by night2Street by night2

Juniper Networks

Exploring EVPN-VXLAN Overlay Architectures – Bridged Overlay

A bridged overlay is a basic approach to an EVPN-VXLAN overlay. Just as the name suggests, it provides Ethernet bridging in an EVPN network and really just extends VLANs between the leaf devices across VXLAN tunnels.

2 min. read
Placeholder for Manager with laptop and smart phoneManager with laptop and smart phone

Juniper Networks

Assuring Quality of Service Experience for Differentiated Customer Outcomes

Netrounds complements Juniper’s existing automation capabilities to make network operators’ lives easier and to ensure end users are having an awesome assured service experience.

1 min. read
Placeholder for Pexels thiago matos 2610059Pexels thiago matos 2610059

Juniper Networks WLAN

Juniper Mist recognised as a Leader in Magic Quadrant for Wired and Wireless LAN Access Infrastructure

We are happy to announce that our partner Juniper Networks is a leader in the Gartner Magic Quadrant for Wired and Wireless LAN Access Infrastructure.

1 min. read
Placeholder for Aerial view city streetsAerial view city streets

Network infrastructure

New EU Regulations on Inbound Roaming - Are you Compliant?

A recent EU regulation has required mobile operators in the whole of Europe to be compliant to the new rules on inbound roaming. This has posed several challenges into the network of these telecom.

1 min. read
Placeholder for Ztna solutions too trustingZtna solutions too trusting

Zero-Trust ZTNA

Why most Zero Trust Network Access solutions are too trusting

When evaluating ZTNA providers, it’s important to make sure they don’t implicitly trust users once they’ve connected. Organizations need to fully commit to embracing the Zero Trust concept of explicit identity-based trust.

1 min. read
Placeholder for F5 sslo in equinixF5 sslo in equinix

F5 Networks

Improving Security Outcomes with F5 SSLO in Equinix

The benefits of using BIG-IP SSLO in Equinix to enforce centralized security policies include optimized cost efficiency, simplified operations and improved security outcomes.

1 min. read
Placeholder for ConstructionConstruction


Security survey says: Don’t wait until it’s broken to fix it

In the report, “Network security in the spotlight: Understanding why it can go wrong is key to making the right investment decisions”. The Register conducted a survey of network and security professionals examining what drives organizations to excel in the delivery of information security.

1 min. read
Placeholder for Nginx app protect f5Nginx app protect f5

F5 Networks

NGINX App Protect: Advanced F5 Application Security for NGINX Plus

NGINX App Protect is a new application security solution that combines the efficacy of advanced F5 WAF technology with the agility and performance of NGINX Plus.

1 min. read
Placeholder for Network security engineers meetingNetwork security engineers meeting

Security MFA

The importance of multi-factor authentication

Ethical hacker Victor Gevers reached news headlines this week as he managed to access president Donald Trump’s Twitter account for the second time.

1 min. read
Placeholder for Modern architectureModern architecture

Network security Network infrastructure

Viabuild selects Nomios as their guide towards an optimal security infrastructure

Nomios deploys a next generation endpoint protection solution at Viabuild enabling more visibility for remote workers.

1 min. read
Placeholder for Building architectureBuilding architecture

Juniper Networks

Juniper Networks Announces Intent to Acquire 128 Technology

Together Juniper Networks and 128 Technology will accelerating the industry transformation from network-centric SD-WANs to user-centric AI-driven WANs.

1 min. read
Placeholder for Sky view circleSky view circle

Palo Alto Networks

Palo Alto Networks is a Forrester ZTX Wave Leader

Our partner Palo Alto Networks has been named a leader in The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q3 2020. As Forrester states in their recent report, “Palo Alto Networks has a complete toolkit for Zero Trust,”.

1 min. read

Sign up for our newsletter

Get the latest security news, insights and market trends delivered to your inbox.