An overview of security and networking definitions, cybersecurity concepts explained and more resources.

Placeholder for Aerial view new york streetsAerial view new york streets

What is DDI?

DDI is a combination of DNS, DHCP and IPAM. It describes the integration of these three core components of networking into one management solution.

Placeholder for What is EDR?What is EDR?

What is EDR?

Endpoint Detection and Response (EDR) is an integrated endpoint security solution that combines real-time monitoring and the collection of endpoint data with rule-based automated response and analysis capabilities.

Placeholder for Cybersecurity engineer coffee breakCybersecurity engineer coffee break

Whitepaper: Understanding the basics of cybersecurity

By understanding the basics of cybersecurity you will be comfortable in a security conversation. Get your 70+ pages to learn more about cybersecurity.

Placeholder for Cybersecurity engineers project desktopCybersecurity engineers project desktop

What is cyberdefence?

Cyberdefence is the ability to prevent cyberattacks from infecting a network, computer system or device. It involves taking active steps and responding to intrusions, all while preventing them as much as possible.

Placeholder for Managed SOC security engineer - MSSPManaged SOC security engineer - MSSP

What is a managed SOC?

Every organisation wants to be protected against cyber attacks. Protection against cyber attacks gets harder every day, as the attacks become more complex, are ever-evolving, and are increasing in numbers.

Placeholder for Engineer focused behind laptopEngineer focused behind laptop

What is Kaseya ransomware?

On July 2nd 2021 a massive supply-chain ransomware attack on the software company Kaseya took place. The group REvil was behind this attack.

Placeholder for Woman smiling holding tabletWoman smiling holding tablet

ZTNA - What is it and why do you want it?

ZTNA stands for Zero Trust Network Access. It ensures that you give secure access to private applications without giving the user access to the enterprise network.

Placeholder for Business woman with laptopBusiness woman with laptop

How to work from home safely?

Recommendations and precautions that are necessary to work from home safely, including secure remote access and what employees can do to improve security when working from home.

Placeholder for Car parking from aboveCar parking from above

What is ransomware?

Ransomware is malicious software used to encrypt computer systems, files and personal information. Once infected by ransomware, a message or ‘ransom note’ is displayed demanding payment for decryption.

Placeholder for Support engineer smilingSupport engineer smiling

What is SOAR?

SOAR (Security Orchestration, Automation and Response) enables organisations to streamline security operations in three key areas: Threat and vulnerability management, incident response and security operations automation.

Placeholder for Woman going up stairwayWoman going up stairway

What is SASE (Secure Access Service Edge)?

SASE or Security Access Service Edge addresses the model of the data centre as the key element in enterprise security that has become obsolete.

Placeholder for Datacenter colocationDatacenter colocation

Next-generation data centre

Simplify IT operations with a next-generation data centre. Important aspects of new cloud infrastructure are agility, simplicity, automation and security.

Placeholder for Developers behind screensDevelopers behind screens

What is REvil ransomware?

REvil ransomware is a file blocking virus considered a serious threat that encrypts files after infection and discards a ransom request message.

Placeholder for Aerial view new york streetsAerial view new york streets

Network switch versus router: What is the difference?

Routers and switches are both computer networking devices that allow one or more computers to be connected to other computers, networked devices, or to other networks.

Placeholder for Remote work video call meetingRemote work video call meeting

What is secure cloud connect

Discover Secure Cloud Connect Solutions. Securely connected to the public cloud.

Placeholder for Shadow ITShadow IT

What is social engineering?

Social engineering is the practice of duping or tricking people into breaking standard security practices. This non-technical strategy is heavily used by cyber criminals in both targeted and widespread attacks.

Placeholder for Industrial datacenter hallwayIndustrial datacenter hallway


Ethernet VPN-Ethernet Virtual Extensible LAN (EVPN-VXLAN) gives large organisations a common framework used to manage their campus and data centre networks.

Placeholder for Two young engineers officeTwo young engineers office

What is the shared responsibility model?

The shared responsibility model is a framework for cloud security dictating the security obligations of a cloud computing provider and its users to ensure accountability.