Claranet | Blog

The latest blogs from Claranet.

  • Blog | What do flexible working practices mean for your network infrastructure?

    Curious to see what flexible working practices mean for your IT? Here are three top things you need to watch for.

    Read Article
  • Blog | 5 emerging modern workplace network security threats and risks to avoid in 2022

    Blog | 5 emerging modern workplace network security threats and risks to avoid in 2022

    With IT security threats on the rise, now is the time to take a closer look at the specific dangers your company needs to know about.

    Read Article
  • Blog | Can You Cut the Cost of Penetration Testing to Match Your Budget?

    Blog | Can You Cut the Cost of Penetration Testing to Match Your Budget?

    Can you reduce the cost of pen testing? We answer that questions and more in our blog.

    Read Article
  • Go there now
  • Blog | What is Penetration Testing?

    Blog | What is Penetration Testing?

    Penetration testing (otherwise known as pen testing) is a security exercise where cyber-security experts run tests across an IT ecosystem to find and exploit vulnerabilities that may exist.

    Read Article
  • Blog | Can Penetration Testing Be Automated?

    Blog | Can Penetration Testing Be Automated?

    We investigate whether penetration testing can be automated, and discuss how it can complement human-led approaches.

    Read Article
  • ×

    First Name
    Last Name
    Thank you!
    Error - something went wrong!
  • Blog | 3 Compelling Reasons Why You Need Automated Penetration Testing

    Blog | 3 Compelling Reasons Why You Need Automated Penetration Testing

    We've come up with three compelling reasons for automated pen testing—but only when it's deployed, handled, and interpreted by experts. Read more in our blog.

    Read Article
  • Blog | Cyber Essentials Update (Evendine)

    Blog | Cyber Essentials Update (Evendine)

    A major change to Cyber Essentials is coming and any Cyber Essentials Self-Assessment certifications started after this date will be assessed under the new scheme 'Evendine'.

    Read Article
  • Blog | Detecting Log4Shell Vulnerabilities

    Blog | Detecting Log4Shell Vulnerabilities

    An easily exploitable, critical impact remote code execution vulnerability has been discovered in a widely used logging package in Java - log4j. Find out more from our Research Lead, Rob Jepson.

    Read Article
  • Blog | What is Zero Trust and why should you care?

    Blog | What is Zero Trust and why should you care?

    Zero Trust works on the basis that you shouldn't trust users outside or inside your network, asking each request to be verified first. Read our blog for more.

    Read Article
  • Learn more
  • Blog | 3 ways you can boost communication across your distributed teams

    Blog | 3 ways you can boost communication across your distributed teams

    If you have distributed teams, ensuring efficient communication should be a top priority.

    Read Article
  • Blog | 10 Reasons why every business needs SentinelOne security

    Blog | 10 Reasons why every business needs SentinelOne security

    Why should your business adopt SentinelOne security? Here are ten reasons why the XDR platform is a no-brainer.

    Read Article
  • Blog | Top tips for securing your new hybrid office

    Blog | Top tips for securing your new hybrid office

    Forty percent of employers claim more than half of their workforce will continue regularly working from home even when the pandemic is over.

    Read Article
  • Sustainable IT Infographic

    Sustainable IT Infographic

    Futureproof your business in the right way.

    Read Article
  • Blog | Microsoft's New Commerce Experience (NCE) for CSP - what you need to know

    Blog | Microsoft's New Commerce Experience (NCE) for CSP - what you need to know

    Microsoft’s Cloud Solution Provider (CSP) program continues to mature and adapt to match the continuous shifting demands of today’s modern businesses.

    Read Article
  • Blog | A new attack on cloud: economic denial on sustainability

    Blog | A new attack on cloud: economic denial on sustainability

    While security in the Cloud becomes ever more bulletproof, it will always be a game of cat and mouse with the hackers out there.

    Read Article
  • Blog | Does hybrid working require more bandwidth?

    Blog | Does hybrid working require more bandwidth?

    Hybrid working is the future, one that many of us are ready to embrace.

    Read Article
  • Blog | SentinelOne vs. Crowdstrike

    Blog | SentinelOne vs. Crowdstrike

    SentinelOne, in our view, offers higher levels of protection across a broader range of platforms than CrowdStrike.

    Read Article
  • Blog | SentinelOne Review

    Blog | SentinelOne Review

    SentinelOne is a 2021 Gartner Magic Quadrant for Endpoint Protection Platforms Leader.

    Read Article
  • Blog | What is SentinelOne?

    Blog | What is SentinelOne?

    SentinelOne's Singularity Platform is a unified, AI-powered XDR platform that uses data to analyse security threats, manage vulnerabilities, protect endpoints, and support IT operations.

    Read Article
  • Blog | How to build a successful unified communications strategy

    Blog | How to build a successful unified communications strategy

    It can be difficult to find cohesion, particularly in the new hybrid working norm. That's where a unified communications (UC) strategy can come in handy.

    Read Article
  • loading
    Loading More...