TO, THROUGH AND TOGETHER: HOW MARKETING ADDS SIGNIFICANT VALUE-Mention marketing and it’s highly likely that first thoughts centre on rather generic aspects such as advertising, PR, and generally creatively angled communications. Mention marketing to Exclusive Networks’ marketing director, Jennie Rogers, and whilst in her unassuming words it may not be “rocket science”, there is certainly a lot more science than art these days,
EXPORT EXPERTISE & EXPERIENCE EQUALS EXTRA VALUE-Consider this. International aspects of security technology deals are on the rise in a climate of international uncertainty. Such a scenario means it is essential to understand the ins and outs of export and import controls the world over. After all, business success is not just measured by sales; it’s about the smooth and successful
RANSOM EVERY WHERE-The increased sophistication and attack velocity of ransomware has grown at an alarming rate over the last couple of years to the point where it represents the most immediate and potentially debilitating threat for organisations (and individuals). For the security sector it’s been known about for a decade or more, but given its increased availability,
GDPR: FORCES A WHOLESALE SHIFT IN INFORMATION SECURITY THINKING-The new European General Data Protection Regulation is now adopted and, following the two year transition period, will be in force come May 2018. Jason Hart, ex ‘ethical’ hacker and CTO at Gemalto Identity & Data Protection, reasons that a whole new mindset is needed around information security for organisations to understand the point of
IN SHAPE FOR THE LONG RUN-To be able to run multiple marathons you need to know that getting into shape is more than pounding the streets, just doing the same over and over again. It’s appreciating the value of planning, understanding how best to use the time available, what resources are needed to step training up to the next level,
SURVIVAL OF THE FITTEST-As security becomes a more central business issue, and one that features in the public consciousness, the demand for ever more effective, agile and vigilant solutions increases. This growth in the market inevitably attracts funding and fuels innovation However, just like a typical ‘gold rush’, the number of start-ups will not equate to those who
IP EXPO – A Security Purple Patch-Exclusive Networks made its presence felt at IP EXPO, held in early October at ExCel London and not just due to its strong visible presence with the colour purple. The show itself attracted over 15,000 visitors, of which nearly half were top tier management in their organisations and well over half had current projects and
Staying active and healthy is more than just a flu jab.-Annually millions of people get a seasonal flu jab, cost the country millions, believe they’re protected from the nasty viruses and get on with their lives, only for hundreds of thousands, possibly running into low millions, to fall ill. The consequences for some, more vulnerable people, is even worse. Sound familiar? The fit, agile, healthy
THE AGE OF THE ANTIVIRUSAURUS IS COMING TO AN END-Next generation endpoint protection solutions represent a significant change opportunity for the IT channel It wasn’t that long ago when traditional firewalls became surpassed by next-generation technology. Now it’s legacy endpoint antivirus (AV) products that are soon to be swept away by a vastly superior alternative. Why? A more aggressive threat landscape and the enterprise
Unknown Unknowns – The Ultimate Test for Cybersecurity-I’ve realised that, over the last couple of years in cyber, the threats that get deeper, quicker and hide longer inside companies’ IT infrastructures, are the stuff we don’t know about. That doesn’t worry cybersecurity experts all that much, as the very fact of ‘knowing that you don’t know’ about a new virus or malware
Pre-sales doesn’t mean free-sales-Most sales guys sell FREE sales, not PRE sales… sound familiar? Well it’s the same story all over the world. On a recent trip to Sweden I heard someone really talking my language when he said: “I hate it when these salespeople think pre-sales means free-sales.” I’m lucky that English is the main language in
Hexis end-point device security is a cool solution for a hot topic-This, the second in our series of blogs outlining the NewTECH teams’ exciting plans for 2016, shines a spotlight on Gold Vendor, Hexis. The newest vendor to join the stable, Hexis’ strength lies in its’ automated security capabilities for end point devices. Already a very hot topic this year, as growth in the BYOD and
Accelerating Sales with NewTECH-Here at Exclusive Networks, we believe that our success, and the success of our partners, is fuelled by our ability to discover, support and propel some of the smartest new technologies into the market. It’s so fundamental to who we are, that we have an entire team dedicated to this process. They are the NewTECH
The Brat-Attack-How to nip cyber-crime tantrums in the bud When was our children’s excitement at the latest Redstone release from Minecraft no longer enough? When did trying to bring down one of Europe’s largest network providers become the new fun thing to do after completing your homework and before eating dinner? And, in this latest highly
Our regular #Twitterchat feature gets underway with @Fortinet-The power of Twitter as an immediate way to get access to the latest business, sport, politics and entertainment news is not to be underestimated. Whilst we’re regular users of Twitter ourselves, last week we hosted the first in a regular series of Twitter chats on a range of security, mobility and infrastructure topics with
IPExpo Busy Bees-This year’s IPExpo event at London’s Excel exhibition centre was an interesting event with many more visitors than I had expected, (accounting for the Rugby World Cup effect). The Exclusive Networks stand was busy pretty much from the moment the doors opened on the show and we had a stream of visitors constantly throughout the
What we’re up to at IP Expo Europe-As a partner, or a security specialist looking to buy, trade shows and exhibitions are one of the most efficient ways of discovering new products, services and methodologies. With a wealth of knowledge and experience in one location, it’s always time well spent. As a vendor, shows are a great way to connect with both
Are You Really in Control of your Data #DataSecurityUK-With over 84% of CIO’s believing cloud has really increased their security risk, we hosted a Twitter Chat on Tuesday the 9th of September, we were joined by Richard Foulkes and the twitter community to talk about the 5 Pillars of disrupted mobility, with the growth of BOYD we discussed how we can lessen the
Visibility: You can’t cure what you can’t diagnose-In our last blog we covered the five pillars that make up the complex mobile security landscape and which clearly set out the challenge for the connected enterprise. This time UK Vendor Alliances Director, Stuart Clark, looks at the importance of getting accurate visibility of application and data use across in-house and cloud based IT
Let’s secure the mobile enterprise together-You may have seen the press coverage this week of our new Disruptive Enterprise Mobility initiative, for which we have brought together some of the best mobile technology and security tools and products. Its purpose is to enable you, our channel partners, to create tailorable solutions for your enterprise customers’ unique mobile working challenges. So,
Security and the CIA-Here’s a question – just what are we talking about when we use the word ‘security’? Take a look at the Oxford English Dictionary definition – in fact the word has a lot of different but related meanings depending upon context but the primary meaning is ‘The state of being free from danger or threat’.
Don’t Stop Us Now!-Well that was a busy and fun weekend! As I’m writing this, I’m sitting in the Starbucks at Heathrow Terminal 5 on the way from Budapest to the FireEye Momentum conference in Las Vegas. Just at this moment, I’m wishing I’d been more sensible last night. But hindsight is not much help.
Je Suis Charlie!-Given the horrific event in Paris last week, I find myself breaking my self-imposed rule of not talking about politics or religion. But some acts are so barbaric and contradictory to the basic standards that we should all govern our lives by, I have to comment. Why?
Time Off for Good Behaviour-In the complex world of modern information systems, what passes for ‘good behaviour’? What I mean is, how can I see the difference between what my real users are doing and what an attacker might be up to? It’s a complex topic that deserves some consideration.
Could Do Better-Did you ever get ‘could do better’ on one of your school reports? I know I did. The question is, would that be the comment written on the review report of your organisation’s security? Or, worse, it could be in the conclusion section of a post-breach analysis. If we look at the cyber security breaches
The Internet of Things (IoT) and Security-New buzzwords, phrases and TLAs (Three Letter Acronyms) pop-up continuously in our industry. In fairness, they are a feature of any rapidly growing and changing industry but we do seem to generate more than our fair proportion. IoT (The Internet of Things) is something that has been creeping up on us in the background in
Intelligence Feeds – How Useful Are They?-With a global network filled with huge quantities of traffic, working out what’s good and what’s bad is problematic. To start with, there’s perspective. What’s ‘good’ to one person may well be considered ‘bad’ by another. This means that intelligence feeds have a major problem filtering the information to ensure it has usefulness to the
Outsourcing is not a dangerous word-You’ve taken the brief for a new security solution, you’ve confirmed the requirement, and you’ve checked the budget is there. Everything looks set for a great sale. You’ve proved the technology works; the pre-sales process couldn’t have gone any better and the price you’re offering is very competitive but still gives you a handsome margin.
Being the Bearer of Bad News-“Don’t shoot the messenger!” How many times have you had to say that (or at least think it) when you’re presenting a case for a security improvement? Or perhaps you were informing the board of an actual breach that has been identified. In either case, to one extent or another, you are the bearer of
The Retail Onslaught-Looking through the online news, it’s clear that the retail sector continues to be a major target for the cyber thieves. In the last month, we’ve seen articles that show several big name retailers in the USA have fallen victim to Point of Sale (POS) attacks aimed at harvesting credit card data. The most recent
IPExpo at ExCel – ExCellent!-What a busy couple of days! With the IPExpo show moving from Earls’ Court to ExCel in Docklands, London this year, it was with some trepidation that I set out to work at the show. My concerns where that the venue move would put off many attendees and the show would be a bit of