Digital Experience Monitoring (DEM)
DEM - Components, benefits and 10 best practices for implementation
By monitoring, measuring, and analysing user experiences in real-time, DEM enables organisations to optimise their digital platforms and provide seamless customer experiences.
Juniper Networks AI-driven enterprise
What is an AI-driven enterprise?
The growing maturity and availability of artificial intelligence (AI) enables the creation of an AI-driven enterprise. Read how Nomios and Juniper can help you build one.
Palo Alto Networks
5 benefits of Palo Alto Prisma
Palo Alto Networks Prisma is a comprehensive suite of cloud security products designed to protect organisations' cloud environments, including public, private, and hybrid clouds.
Digital Experience Monitoring (DEM) E-commerce
Digital Experience Monitoring (DEM) and its benefit for e-commerce organisations
Digital Experience Monitoring (DEM) is a critical process that enables organisations to measure, track, and analyse user interactions with their digital services and applications.
SIEM EDR
How SIEM, EDR and NDR complement each other
We will take a closer look at SIEM, EDR and NDR and show you how the three solutions have the potential to effectively complement each other.
Anti-DDoS
Top DDoS protection solutions that should be on your radar
Overview of DDoS protection solutions to protect enterprises against these bigger, smarter and more diverse DDoS attacks. These should be on your radar!
NIS2
NIS2 advice to CISOs
As a CISO, it is important to understand the requirements of the NIS2 Directive and ensure that your company is compliant in a timely manner.
Company
Nomios Group expands in Southern Europe with leading Italian cybersecurity expert Aditinet
The acquisition of Aditinet strengthens Nomiosā European position as one of the leading cybersecurity service companies.
SĆ©bastien Kher
Network automation
Automation now: Why the silicon shortage is an opportunity, not a crisis
While itās easy to view the silicon chip shortage as a massive headache, long production waiting times could actually be a significant opportunity for your business to innovate.
Adam Kirchberger
Juniper Networks Award
Nomios wins Juniper Networks Worldwide Partner of the Year award
On 2 February 2023, during the Juniper Networks Partner Executive Summit in Madrid, Nomios was named Juniper Networks Partner of the Year award for 2022.
SASE Juniper Networks
Simplifying the SASE experience with Juniper Networks
With the addition of Cloud Access Security Broker (CASB) and Data Loss Prevention (DLP), Juniper Secure Edge now provides full-stack SSE capabilities, simplifying the SASE experience for customers.
Samantha Madrid
Juniper Networks
Juniper Networks Leader in Gartner's MQ for enterprise wired and wireless LAN infrastructure
We are proud to say that our partner Juniper Networks is positioned furthest in both ability to execute and completeness of vision in the MQ for enterprise wired and wireless LAN infrastructure.
MDR
Why MDR services are essential to modern cybersecurity efforts
Want to counter cybersecurity threats, have an intel agency at your disposal, and do all of this at a predictable cost? Then MDR security services are the solution for you.
Erik Biemans
API security
API security, are you prepared?
The use of APIs has evolved in recent years, especially through smartphone use, making API security essential.
Matthieu Millot
Network management
Top 5 reasons to outsource network management
Network management is probably one of the most important components when mapping your organisation's IT infrastructure. Outsourcing is a great way to free up your internal IT team to focus on day-to-day operations and strategic goals.
Alix Ingram
Network automation
Wifi networks and the rise of ai
Wi-Fi has been undergoing major changes recently, partly due to working from home. We compare 4 major Wi-Fi vendors and the use of AI.
Cyber attacks Cloud security
Top cybersecurity threats to be aware of
Cybersecurity threats are part of everyday life, such as attacks on IoT, phishing scams and ransomware attacks. Make sure your business is safe from these threats.
Zero-Trust
The password problem
What do these numbers and letters have in common? 123456, 123456789, picture1, password, 12345678, 111111.
Rachid Groeneveld
Sign up for our newsletter
Get the latest security news, insights and market trends delivered to your inbox.