fbpx

Network Security

Dissecting Aruba ClearPass
Network Security Made Easy: Dissecting Aruba ClearPass

Let’s talk about ClearPass, the family of rock-solid network access control solutions from Aruba, a Hewlett Packard Enterprise company.

Infographic
A history of Aruba ClearPass innovation

One of the best ways to truly understand the power of a solution is to know its history. This is…

IOT is everywhere Blog
IoT is everywhere, use Aruba ClearPass to get on top of security risks

Take a moment to count how many connected devices you use your in home. Beyond smartphones and laptops, think voice-activated…

Webinar: Cloud-delivered network security with SASE
Introducing SASE: Cloud-delivered network security

Discover a new way to secure anywhere workers. In partnership with Palo Alto Networks, Data#3 invites you to watch this…

Video-Card---Gartner-Discussion-Video-What-is-SASE
Gartner Video Discussion: What is SASE?

Coined by Gartner in 2019, Secure Access Service Edge, or SASE, has quickly become a new player in the…

Introducing SASE – the cloud-delivered future of network security

Secure Access Service Edge (SASE – but pronounced ‘Sassy’ for perhaps intriguing reasons!) is the new kid on the block…

Taking the Work out of the School Network

While there’s no consensus on who coined the phrase ‘truth is stranger than fiction’, you’d be hard pressed to find…

A new era of security risks in education

For educators, ensuring the safety and wellbeing of students has always been a critical priority – one that’s been seriously…

Return to campus: 5 digital challenges for education

2020 has been a tumultuous year for Australia’s education sector. The sudden shift to remote learning has placed schools, universities,…

2020 Global Networking Trends Report:
See what’s next in networking

Advances in technology and automation are changing the face of the network model. With 42% annual growth in business mobile…

Solving the print problem now your workforce is remote

As COVID-19 continues on, a large number of Australian workers are rapidly adjusting to working from home. The good…

Customer Story: St Mary’s College

St Mary’s College Safeguards Staff and Students with Next-Generation Firewall Solution Objective As one of Tasmania’s most respected educators, St…

Hobart’s St Mary’s College Safeguards Staff and Students with Next-Generation Cybersecurity Solution from Data#3

March 19, 2020; Brisbane, Australia: Leading Australian technology services and solutions provider, Data#3, today announced that it has worked with…

Feeling insecure about LDAP?

March 2020 will be a critical month for system administrators and this advisory is a must read for anyone involved…

A mobile first network
4 reasons why you need a mobile-first network

We’re all becoming increasingly reliant on digital devices and cloud services in our day-to-day lives, and the workplace is no…

Networking modernisation
3 ways your network can be your competitive advantage

Think about the last time you ordered a cab, or booked accommodation, chances are you used one of the many…

The Renaissance of the Data Centre

The why and how of modernising your data centre for digital transformation. Digital transformation is placing an overwhelming demand on…

Mobile Cybersecurity
Protecting GenMobile: the need for adaptive trust in cybersecurity

For better or worse we are all dependant on our mobile devices these days. This is especially true for the…

Aruba eBook
The five essentials for building a next-generation campus network

Today, 9 out of 10 Australian students have access to a computer on campus1 and 75% of teachers believe digital…

Executive Guide | CASB 2.0 the next generation of cloud app security

More and more of our critical data, applications and infrastructure are moving from behind the firewall to the cloud –…

The shift of workloads into the cloud continues at an unprecedented pace as organisations seek innovation and productivity gains. However, as more and more apps and services move to the cloud, corporate data is often exposed in ways and places that you never imagined.
Solving the cloud security conundrum

The shift of workloads into the cloud continues at an unprecedented pace as organisations seek innovation and productivity gains. However,…

An Introduction to Symantec CloudSOC

A New Solution for Cloud App Security Symantec CloudSOC is a next generation cloud access security broker (CASB 2.0) solution…

Blog - A Lessons in Network Planning
A lesson in network planning

IT departments in the education sector have long faced a familiar set of challenges when planning, deploying and maintaining campus…

Don’t just discover the cloud, control it!
Don’t just discover the cloud, control it!

End-users move constantly between devices and locations to access data when and where they need it for uninterrupted productivity. There…

Customer Story: Flinders University
Customer Story: Flinders University

Flinders University Introduces Solution to Keep Students and Staff Safer Online Objective To gain the visibility needed to identify advanced…

Software-Defined Access: Networking, But Not As You Know It

Ground-breaking is an overused term in IT, but every now and again something comes along that justifies it. It is…

Video Customer Story - The Southport School
Video Customer Story: The Southport School

Working closely with Data#3, The Southport School deployed a next-generation wireless network solution to provide seamless coverage, improved performance with…

Customer Story - The Southport School
Customer Story: The Southport School

The Southport School benefits from next-generation wireless network Objective To upgrade the school’s wireless network to deliver…

What to look for in a SIEM?

What Is It?  The amount of information generated on your network is the stuff nightmares are made of, but…

ASD Essential Eight Explained – Part 8: Daily Backups

The Essential Eight The Australian Signals Directorate (ASD) Essential Eight has received considerable attention since it included an additional four…

ASD Essential Eight Explained – Part 7: Multi-Factor Authentication

The Essential Eight The Australian Signals Directorate (ASD) Essential Eight has received considerable attention since it included an additional four…

ASD Essential Eight Explained – Part 6: Using Application Hardening

The Essential Eight The Australian Signals Directorate (ASD) Essential Eight has received considerable attention since it included an additional four…

ASD Essential Eight Explained – Part 5: Disabling Untrusted Microsoft Office Macros

The Essential Eight The Australian Signals Directorate (ASD) Essential Eight has received considerable attention since it included an additional four…

ASD Essential Eight Explained – Part 4: Patching Operating Systems

The Essential Eight The Australian Signals Directorate (ASD) Essential Eight has received considerable attention since it included an additional four…

ASD Essential Eight Explained – Part 3: Restricting Administrative Privileges

The Essential Eight The Australian Signals Directorate (ASD) Essential Eight has received considerable attention since it included an additional four…

ASD Essential Eight Explained – Part 2: Patching Applications

The Essential Eight The Australian Signals Directorate (ASD) Essential Eight has received considerable attention since it included an additional four…

ASD Essential Eight Explained – Part 1: Application Whitelisting

The Essential Eight In February of 2017, The Australian Signals Directorate (ASD) published an update to their “Top 4” Strategies…

THE NEW IT SECURITY PARADIGM PART 4 – VMware’s NSX, and its Promise of a New Standard

By Richard Dornhart, National Security Practice Manager, Data#3 [Reading Time – 2:50 minutes] Over my last 3…

THE NEW IT SECURITY PARADIGM PART 3 – Network Virtualisation & Encryption

By Richard Dornhart, National Security Practice Manager, Data#3 [Reading Time – 2:50 minutes] The problem with encryption…

THE NEW IT SECURITY PARADIGM PART 2 – How Network Virtualisation Will Transform IT Security

By Richard Dornhart, National Security Practice Manager, Data#3 [Reading Time – 3 minutes] Neighbourhood Watch When thinking of…

How to tackle human threat through identity management

By Richard Dornhart, National Security Practice Mananger, Data#3 [Reading time: 1 min] I recently came across…

Customer Story: City of Perth

Company Overview: The City of Perth is a dynamic, statutory entity constituted under the Local Government…