Application performance diagnosis and prevention

The call went something like this. “Hi, I’d like to log a call please”. “Sure, how can I help?” “Well, <insert application name here> is running slow and it’s been like that for a while.” “OK, what is it that you’re trying to do?” “Just my normal work, you know, the usual activity.” “OK, are [...]

By | April 27th, 2017|blogs|0 Comments

A continuous approach to IT security

As the digital world increases criminals are likely to continue to ensure that high profile security breaches stay in the headlines. Technology evolves and so do the threats and motivations developed by hackers targeting business of all sizes. The battle goes on, but as the threats increase, so does the ability of a company to [...]

By | April 24th, 2017|blogs|0 Comments

How to Make a Performance Test Plan

How you make a performance test plan depends on the specific type of tests you’ll run based on the particular questions about your system that you want to answer. Looking to create a performance test plan? Here are some things to consider before you decide to simulate load. Credit for the overview here should be [...]

By | April 5th, 2017|blogs|0 Comments

Verify Solutions appointed as Value Added Reseller for iTrinegy Solutions

London, United Kingdom, April 5, 2017 – iTrinegy, market leaders in mitigating risk associated with application performance over networks, announced today that it has signed an agreement for Verify Solutions, a network and application performance specialist consultancy, to be a Value Added  Reseller (VAR) for iTrinegy’s award-winning network emulation and network profiling technologies. All application [...]

By | April 5th, 2017|blogs, Financial|0 Comments


The General Data Protection Regulation (GDPR) will come into effect on 25 May 2018 and will be the most significant change to the data protection regime in the EU for a generation. Despite the Brexit vote, it is anticipated that the UK will, in the short term at least, continue to implement the GDPR. Regardless, [...]

By | January 30th, 2017|blogs, International|0 Comments

170,000 websites still affected by three year old security weakness

The Heartbleed vulnerability, renowned for allowing hackers anywhere on the internet to access encrypted communication between websites and their users; has been discovered to still be present on nearly 200,000 devices - 85% (170,000) of which, are websites - more than three years after it was originally discovered. A patch for the weakness was released [...]

By | January 25th, 2017|blogs|0 Comments

46% of the world’s top one million sites are “risky”

According to the published State of the Web 2016 report by Menlo Security, 46% of the world’s top one million sites are ”risky”. The report labelled a website or its background sites (that provide active content to the website) as risky if one or more of the following was true: runs software with known [...]

By | December 13th, 2016|blogs|0 Comments

List of data breaches and cyber attacks in 2016

Posting this year’s list of 1.6 billion breaches, we’re already beginning to think about the task of counting up 2017’s.Below, we’ve listed the most significant events of each month. To view the full list for each month, please click that month’s heading. Note: The total number alongside each month is not definitive; please take it [...]

By | December 13th, 2016|blogs|0 Comments

The Challenges of Test Automation

Having been involved in software testing for some 20 years and witnessed the land-grab for customer attention and market share, the varying mathematical ROI calculations, the year 2000 doomsday forecasters and the rise of the dominant players today, I thought it may be helpful to note a few of the key points to watch for. [...]

By | December 13th, 2016|blogs|0 Comments