Smarter Network Monitoring

Smarter Network Monitoring

Is your current network management platform holding you back? With rising subscription costs, limited automation, and complex renewal terms, many IT leaders are now re-evaluating their legacy NMS tools.

Catch up on our webinar where we discuss how organisations are making the move to StableNet® — a mature, fully-integrated platform that delivers automation, visibility, and long-term cost transparency.

Why catch up?

  • See what a modern, automated NMS can do.
  • Understand the migration path step-by-step.
  • Take advantage of Kedron’s exclusive Year 1 price-match offer and guaranteed savings beyond.

August 2025 Industry Insights

August 2025 Industry Insights

Throughout this blog post, we have put together some of the latest industry insights from us and our vendors in KedronUK’s monthly Techbrief! This month we share with you information on our latest Webinar discussing Smarter Network Management, the 5 Most Common Operational Technology Security Issues, Shaping Sustainable and Resilient Communication Networks, and much more.

KedronUK
Smarter Network Management – Migrating from Legacy NMS to StableNet®. (Webinar)
Is your current network management platform holding you back? Join KedronUK on Tuesday 14th October at 11am for a 45-minute live webinar, where we’ll show you how organisations are making the move to StableNet® – a mature, fully-integrated platform that delivers automation, visibility, and long-term transparency.

Register here.

Forescout Technologies
5 Most Common Operational Technology Security Issues. (Blog Post)
Operational technology (OT) systems control and monitor industrial processes in sectors, including energy, manufacturing, water treatment, transportation, and more. As these systems become increasingly interconnected with information technology (IT) networks, their exposure to cyber threats grows. Protecting OT environments requires a keen understanding of their unique vulnerabilities and challenges.

Find out more here.

Infosim
Shaping Sustainable and Resilient Communication Networks. (Blog Post)
The reliability of communication is not only essential for everyday interpersonal interaction, but also for critical infrastructure such as energy supply, healthcare, and public safety. The importance of robust, fail-safe communication networks becomes particularly apparent in times of crisis such as natural disasters, cyberattacks, terrorist attacks, and similar events. These networks are essential for coordinating rescue teams and relief efforts, maintaining basic supply functions, and ensuring a reliable information flow. At the same time, the sustainability of these networks is becoming increasingly important due to rising energy requirements. The key here is to minimise energy consumption while maintaining reliable, high-quality communication.

Read the full blog post here.

SenseOn
Identity is the New Perimeter. (Whitepaper)
Over 80% of breaches now involve compromised credentials, not malware. Attackers don’t need to break in. They log in. Phishing MFA fatigue, and token theft are driving a wave of identity-based threats that most traditional tools weren’t built to catch. Security teams are expected to detect misuse, investigate sign-ins, and respond to identity incidents. But identity data is fragmented across Entra ID, Okta, Google Workspace and others. Most investigations require jumping between tools, hunting for context, and reacting late.

Download the Whitepaper here.

Rapid7
New Infographic Showcases How Rapid7 MDR Stops Threats Fast. (Blog Post)
In cybersecurity, the first few minutes of an attack can define the rest of the story. Will it be a minor event swiftly contained with no data loss, or the beginning of a full-blown incident that leads to costly remediation, reputational damage, and lasting business disruption?

The difference often comes down to how fast and how well your organisation can detect, understand, and respond to the threat.

Read more & view the infographic here.

BullWall
The Cyber Assessment Framework. (Blog Post)
The UK’s new Cyber Assessment Framework (CAF) 4.0 has raised the bar for cyber resilience. It asks executives of essential service providers to demonstrate not only that they understand today’s attacker behaviours, but they can detect, stop, and recover from them before critical operations are disrupted.

There’s one attacker behaviour that consistently tops the threat landscape and regulator concerns: ransomware-drive mass encryption. And this is exactly where BullWall adds unique, measurable value to your security stack.

Find out more here.

ExtraHop
Unmasking Threats Across the Network with Real-time Identity Insights. (Blog Post)
In today’s complex digital landscape, where hybrid networks, remote work, and SaaS growth are the norm, understanding “who” is behind network activity is paramount. Identity is no longer solely an IT concern: it’s the cornerstone of modern security.

Identity is the new battleground, and attackers are having a field day. With so many user accounts, devices, and services in the cloud, there are endless opportunities for compromise. A user (customers, employees, partners, and vendors) can be a weak point for attackers to get in and move around, stealing data or spreading ransomware.

Find out more here.

Allegro Packets
Allegro Network Multimeter Release 4.5. (Blog Post)
The new firmware version 4.5 is available for the Allegro Network Multimeter. This firmware contains numerous improvements and enhancements compared to version 4.4.3 and can be installed on all devices with support.

Read about the highlights of the release here.

DBmarlin
DBmarlin 5.8.0 is now available! (Blog Post)
DBmarlin are excited to share thier latest updates, including a brand-new DB Versions screen, improvements to DBmarlin Co-Pilot, and a number of performance and upgrade enhancements.

View all the new and improved features here.

Kirsty Jones

Kirsty Jones

Marketing and Brand Development Lead

Spreads the word further and wider about how we can help connect and visualise your IT Ops and Sec Ops data.

SenseOn Survey Report

SenseOn Survey Report

In Collaboration with SenseOn, an AI-driven cybersecurity platform, we conducted this survey to better understand how organisations are navigating current security challenges. The goal was to capture real, practical insights into: 

  • The most pressing cybersecurity pain points today.
  • The impact of tool sprawl and data cost models (e.g. in traditional SIEM solutions).
  • How organisations are using, evaluating, or planning for AI and automation in their security stack. 
  • Evolving attitudes toward vendor geography and trust, particularly in light of recent geopolitical shifts. 

The insights gathered aim to inform not only our understanding of the market, but also support organisations in benchmarking their current strategies and identifying areas for improvement, simplification, or innovation. 

July Industry Insights

July Industry Insights

Throughout this blog post, we have put together some of the latest industry insights from us and our vendors in KedronUK’s monthly Techbrief! This month we share with you information on Navigating Cybersecurity Challenges, Improving Operational Resilience, Insights into the 2025 Ransomware Economy, and much more.

KedronUK
Navigating Cybersecurity Tool Choices in the Age of AI. (Report)
In collaboration with SenseOn, an AI-driven cybersecurity platform, we conducted a survey to better understand how organisations are navigating cybersecurity challenges.

We wanted to hear directly from security practitioners and decision-makers to learn what’s working, what’s not, and where they see the greatest opportunities and risks in today’s cybersecurity environment.

Read the full survey report here.

Forescout Technologies
Improve Operational Resilience with Harm Reduction. (Blog Post)
Data can drive smart decisions. It tells a truth. You can pay attention to what it’s saying and reprioritise. Or it can be recognised and put aside. But putting it aside in business doesn’t mean ignoring it. It means finding a defensible risk model. One that works for you, your board, your shareholders, your customers, and employees.

You always need to understand your operational resilience – and you need to get agreement on acceptable and unacceptable security, cyber-physical, and OT security tolerances.

Find out more here.

Infosim
Developments in the Fiber Optic and Telecommunications Industry in Germany. (Blog Post)
Increasing global connectivity through new technologies such as the Internet of Things (IoT) and 5G is generating growing demand for high-speed internet access and more reliable wireless networks. The expansion of the fiber optic infrastructure is of central importance for Germany’s digital transformation. The current expansion rate at the end of 2024 is 48.8%. The government, network operators and industry associations such as the German Broadband Association (BREKO) are actively committed to achieving a nationwide fiber coverage as fast as possible.

Read the full blog post here, where Infosim examine the dynamic changes in the telecommunications industry in Germany, analyses the resulting challenges for network service providers (NSPs) and outlines key solutions.

Keysight Technologies
What the EU Cyber Resilience Act means for Digital Product Makers. (Blog Post)
The EU Cyber Resilience Act (CRA) is set to become a defining regulation for all manufacturers and developers of digital products that touch the EU market. It introduces strict requirements for cybersecurity practices, risk management, and compliance procedures, affecting a wide range of stakeholders from software developers to hardware vendors. This article unpacks what the CRA is, who it affects, and how to get ready.

Find out more here.

Rapid7
Inside the Ransomware Economy in 2025. (Blog Post)
Building on insights from Rapid7’s Q1 and Q2 2025 ransomware trend reports, it’s clear that the ransomware economy continues to evolve – and not just in volume, but also in business maturity. As threat actors shift tactics, tools, and partnerships, defenders face a complex landscape shaped by affiliate churn, rising ransom demands, and increasingly sophisticated social engineering campaigns.

This blog explores the latest ransomware trends 2025, threat intelligence, and practical takeaways to help security teams stay ahead of the threat.

Read more here.

BullWall
Securing VMware Environments in an Era of Escalating Cyber Threats. (Blog Post)
Ransomware has evolved into one of the most disruptive threats in cybersecurity, and virtualised environments have become an increasingly frequent target. Organisations running VMware vSphere and ESXi platforms are now prime targets, facing not just financial losses but the potential collapse of critical business operations. With cybercriminals continuously innovating their attack strategies, security leaders must rethink their defences and adopt a proactive, automated approach to safeguarding their virtual infrastructures.

Find out more here.

ExtraHop
From Potential to Performance: Maximising AI’s Impact with Modern NDR. (Blog Post)
Artificial intelligence (AI) and machine learning have become foundational components for effective network detection and response (NDR), fundamentally reshaping how organisations defend against modern threats.

According to the 2024 Global Cyber Confidence Index, 38% of security decision-makers said using AI and machine learning to help manage and mitigate cyber risk is a top priority for their organization this year.

Despite this clear priority, enterprises are only just beginning to really understand the transformational benefits that intelligent NDR solutions can offer.

Find out more here.

Kirsty Jones

Kirsty Jones

Marketing and Brand Development Lead

Spreads the word further and wider about how we can help connect and visualise your IT Ops and Sec Ops data.

Rethinking SecOps: A Smarter Way Without Traditional SIEMs

Rethinking SecOps: A Smarter Way Without Traditional SIEMs

Watch our latest webinar, in collaboration with our newest partner, SenseOn, where we explore how traditional SIEMs are increasingly falling short for modern security teams, too costly, too complex, and generating too much noise. 

What was discussed? 

In the webinar we explore how AI-driven security operations can deliver SIEM-like outcomes without the overhead.

1. Chris Booth, Solution Architect at KedronUK shares insights into the evolving challenges faced by security teams, and why it’s time to rethink the traditional SIEM approach

2. Brad Freeman, Director of Technology and Co-founder of SenseOn, discusses how technologies like agentic AI and root cause triangulation empower lean security teams to detect, investigate, and respond to threats faster – while enhancing the performance of your existing security investments. 

Kirsty Jones

Kirsty Jones

Marketing and Brand Development Lead

Spreads the word further and wider about how we can help connect and visualise your IT Ops and Sec Ops data.