Category: Podcasts

The challenge of endpoint device security

During the merger of Heat Software and LANDESK to form Ivanti, Enterprise Times sat down with Matthew Walker, VP Sales to talk about the challenges around endpoint device protection. In this podcast we talk about key issues such as knowing what is on your network, the use of whitelisting and creating policies that are enforceable…

Avast releases “Best defence against Cybercrime”

Software company Avast has launched the latest version of its security software calling it the “Best defence to date against Cybercrime.” This is the first update of the Avast desktop software since it acquired AVG in September 2016. Since then the two companies have been focused on integrating their detection engines. All new versions of the…

Talking OpenStack with SUSE

Recently Mark Smith, Global Product and Solutions Manager, SUSE sat down with Enterprise Times to talk about the future of SUSE and OpenStack. A wide ranging discussion touched on the challenges of making OpenStack the fourth cloud platform behind Amazon, Google and Microsoft. Smith believes that it is on target to be a $5 billion marketplace by…

What goes on at BT’s brains trust?

Enterprise Times recently had the opportunity to visit BT’s brain’s trust at Adastral Park. It is one of the biggest research and development parks in the UK. As well as housing some of BT’s brightest minds, it acts as a clearing house for testing all of BT’s technology. There is so much equipment here that…

Real-time messaging saves time

Flock is a real-time messaging and collaboration app. It is launching in the UK today and has also announced the results of a survey today showing that customers are beginning to quantify the saving of real-time messaging over email. But there are still people who are unconvinced about the wave of apps that are appearing in…

Using maths to solve Cybersecurity

Darktrace are one of the new breed of security vendors. Rather than sit on endpoint devices using signatures to detect an attack, they create a profile of how devices, users and applications behave. This approach allows them to establish what is “normal” for that user, device or application and then react when unexpected things happen. Enterprise…

Cybersecurity and widening the talent pool

Last year at the Cyber Security Challenge UK finals we spoke with Stephanie Daman, CEO, Cyber Security Challenge UK about the goals and aspirations of the competition. Unlike many in this industry Daman has a practical view of what is needed. She accepts that this is not just about building a long term educational programme.…

The benefits of a threat intelligence platform

Security analysts are struggling to utilise the data they have in an effective manner. They get bombarded with alerts about possible threats which are often false flags or inconsequential. They also struggle to build their own business intelligence solutions to extract the value from their data. Enterprise Times met up with Steve Ginty, co-founder of…

Making sense of threat intelligence data

Threat intelligence solutions are the latest “must-have” tool for IT security teams. The problem is that once installed, many struggle to deal with the vast amount of data they suddenly have at their fingertips. Part of the problem is that they lack the business intelligence and analytics skills of other parts of IT. This is…