Cloud & Hosted

Are your end-users and servers safe from the next cyber attack? Legacy anti-virus is no longer enough to respond effectively to a detected threat. Watch this video to find out how to protect against and automatically eliminate all threats including advanced malware, exploits & insider attacks.

Data Compliance – Delete vs Erase Explained

Due to a misunderstanding of required data removal methods, many organisations are leaving large volumes of sensitive, confidential and compromising…

LEGAL WEBINAR: Watch Forcepoints Secure SD-WAN

As a successful legal firm, your staff could be working from either the office, remotely or whilst travelling – which…

DEMO: Allied Telesis Enterprise Networking for Schools

Networking specialist, Allied Telesis, provide high-speed wired and wireless access that enables a continuous and uninterrupted connection between your school’s…

Dictation & Voice Recognition Technology – FREE TRIAL

Diktamen is NETprotocol’s preferred dictation technology, offering a bespoke solution which can be accessed anytime, anywhere and helps clients improve…

Cost Comparison: Purchase vs Subscription Network

For clients who are looking to maintain maximum network flexibility, without restrictive terms AND with manageable monthly subscription payments, Extreme…

Top 5 Most Common Myths About Enterprise SD-WAN

By now, most law firms have heard about SD-WAN. Otherwise known as software-defined wide area networking. SD-WAN is getting a…

E-BOOK: Secure Your Passwords for GDPR

With advanced threats being a genuine reality for law firms, the world of Privileged Account Management (PAM) has become an…

Win 15 free users for private cloud storage platform

To celebrate 15 years of working in Legal IT, NETprotocol are exclusively offering 15 free users for 15 months on…