Joint Standards- NIS2 & CyberScope

The requirement for South African Finance and Insurance institutions to apply "The Joint Standards 2 of 2024 Cybersecurity and Cyber Resilience" is approaching fast. See the standard HERE. The similarity of this standard to the EU NIS2 is clear if you read the two side by side. Hence it is a good idea to understand […]

Continue reading

Zero Trust Security And CyberScope

What is Zero Trust? With the increasingly grim cybersecurity threat landscape, zero trust security and the closely related topics of Zero Trust Network Access (ZTNA), Secure Access Service Edge (SASE), and Security Service Edge (SSE) are gaining heightened interest.  This blog will focus on the zero-trust security specifically, first defining it, then discussing why it […]

Continue reading

CIS Critical Security Controls Tool

Introducing NetAlly's CIS Critical Security Controls Tool for your perimeter! The edge network is an area of escalating challenges for organisations of all sizes —both from cybersecurity and visibility gap perspectives. Because cybersecurity breaches are an enterprise-wide threat, the network perimeter is often forgotten but is  frequently ground-zero for many hackers, serving as the entry […]

Continue reading

CyberScope Improves Vulnerability Manangement

Most organizations depend on vulnerability management and testing tools, utilizing them as a critical component of a comprehensive cybersecurity strategy. However, the foundational step in vulnerability management begins by ensuring all devices are discovered and inventoried. Sounds simple but is (often) notoriously difficult—especially on the dynamic edge network. Many centralized vulnerability management tools and scanners often miss […]

Continue reading

New LinkRunner AT By NetAlly

June 3, 2024 – Today at the Cisco Live! event, NetAlly announced the availability of its next-generation LinkRunner® AT network and cable testers, continuing a twenty-plus year legacy of innovative troubleshooting tools for network engineers and technicians. Please see the NetAlly news release at Next-Gen LinkRunner® We at IoTXperts are excited to summarise the two […]

Continue reading

Wireless Penetration Tester – NetAlly

Are you concerned about pen-testing your wireless-LAN environment? “It’s critical that SecOps teams know which devices are on the network at any one time and be able to identify new devices on-net, as well as all Wi-Fi networks and endpoints,” says Kahkoska. “Every engineer wants to ‘know their network’ but the complexity and scope makes […]

Continue reading

LinkSprinter Is Under-Estimated

If any of these challenges resonate with you? Testing & troubleshooting your installs takes too long, you want answers in seconds not 30 minutes or hours… You just don’t know what you are connecting to is correct You ask yourself. Is the config right? Which VLAN is configured Reports are a pain, you require a […]

Continue reading

CyberScope vs OptiView XG

If you are involved in network testing & cyber security you will remember the OptiView XG. It was definitely famous at the time for being the most comprehensive handheld network tester available. Have a look how it stacks up against the new CyberScope from NetAlly.    

Continue reading

EXG-300 vs CyberScope

If you are involved in testing cyber security you will be very in tune with NMAP. Add the functionality of the EtherScope EXG-300 and you get the NetAlly CyberScope. So that is Wireless and Network discovery and analysis packed in with pen testing. Maybe add NMAP testing to your handheld network test requirements. The award […]

Continue reading

CyberScope – First Handheld Cybersecurity Analyser

Today NetAlly announces the release of CyberScope, a powerful all-in-one tool offering comprehensive site security assessment, analysis, and reporting. CyberScope is the first portable product specifically designed to address a commonly overlooked area of cybersecurity vulnerability: site-based, access layer devices. Existing cybersecurity solutions frequently lack in-depth visibility into this dynamic environment, leaving gaps in an organization’s […]

Continue reading