
Broadforward
Global network operator Truphone goes live with new DSC from BroadForward and Nomios
We have been selected by Truphone to replace their legacy diameter routers with the BroadForward Diameter Signalling Controller (DSC).

Ransomware
Ransomware with Data Leak Extortion
As data leak extortion swiftly became the new norm for big game hunting (BGH) ransomware operators since late 2019, various criminal adversaries began innovating in this area. This includes collaboration between ransomware groups, auctioning leaked data and demanding not just one ransom for the ransomware decryptor but also a second ransom to ensure stolen data is deleted.

Company update Support
Support Update
In November 2020 we informed you of some upcoming changes to the way you raise support cases as we move to a new Infradata Support Portal. Most importantly we will no longer accept tickets being raised via email as we are unable to provide comprehensive SLA reporting based on email delivery.

Ransomware
What to do against a ransomware attack?
As a company, you can already do a lot to counter ransomware attacks. One of the measures is the deployment of a Security Operations Center (SOC). Find out why and how!

Broadforward
BICS selects Nomios to deliver next generation Signalling Transfer Point
Enabling intelligent routing with centralized configuration, management and provisioning for SS7 signaling traffic.

Juniper Networks Award
Juniper Networks Elevate Awards 2020
The Juniper Networks Elevate Awards 2020 have been presented. We congratulate all winners on receiving this award and also the nominees on their honourable mention. Only real network innovators have a chance to win this award.

Cloud
What is your cloud migration strategy?
At first glance, cloud migration can seem like a mere technical decision, but it is very much business-related. Thus, the right question is: what are the business needs that are driving your organisation to migrate to the cloud?

Telecommunications
Why Telcos are Exploring ‘Best of Suite’ over ‘Best of Breed’ Solutions
In the past, when operators first contemplated virtualising infrastructures and adopting software-defined networks (SDNs), many were tempted to pursue a ‘best of breed’ strategy whereby they deployed standalone systems (with independent software modules) to manage each function. It was an idealistic approach, but one that now seems out of step with the times.

Ransomware
The history of ransomware and the new trends
As organisations improve their capabilities to rebound from ransomware attacks and security researchers continue to create decryptors for ransomware, there is less incentive for victims to pay the ransom in order to reclaim files. However, criminal actors have found a way to thwart these defensive measures.

Juniper Networks
Exploring EVPN-VXLAN Overlay Architectures – Bridged Overlay
A bridged overlay is a basic approach to an EVPN-VXLAN overlay. Just as the name suggests, it provides Ethernet bridging in an EVPN network and really just extends VLANs between the leaf devices across VXLAN tunnels.

Juniper Networks
Assuring Quality of Service Experience for Differentiated Customer Outcomes
Netrounds complements Juniper’s existing automation capabilities to make network operators’ lives easier and to ensure end users are having an awesome assured service experience.

Juniper Networks WLAN
Juniper Mist recognised as a Leader in Magic Quadrant for Wired and Wireless LAN Access Infrastructure
We are happy to announce that our partner Juniper Networks is a leader in the Gartner Magic Quadrant for Wired and Wireless LAN Access Infrastructure.

Network infrastructure
New EU Regulations on Inbound Roaming - Are you Compliant?
A recent EU regulation has required mobile operators in the whole of Europe to be compliant to the new rules on inbound roaming. This has posed several challenges into the network of these telecom.

Zero-Trust ZTNA
Why most Zero Trust Network Access solutions are too trusting
When evaluating ZTNA providers, it’s important to make sure they don’t implicitly trust users once they’ve connected. Organizations need to fully commit to embracing the Zero Trust concept of explicit identity-based trust.

Security
Security survey says: Don’t wait until it’s broken to fix it
In the report, “Network security in the spotlight: Understanding why it can go wrong is key to making the right investment decisions”. The Register conducted a survey of network and security professionals examining what drives organizations to excel in the delivery of information security.

F5 Networks
Improving Security Outcomes with F5 SSLO in Equinix
The benefits of using BIG-IP SSLO in Equinix to enforce centralized security policies include optimized cost efficiency, simplified operations and improved security outcomes.

F5 Networks
NGINX App Protect: Advanced F5 Application Security for NGINX Plus
NGINX App Protect is a new application security solution that combines the efficacy of advanced F5 WAF technology with the agility and performance of NGINX Plus.

Security MFA
The importance of multi-factor authentication
Ethical hacker Victor Gevers reached news headlines this week as he managed to access president Donald Trump’s Twitter account for the second time.
Sign up for our newsletter
Get the latest security news, insights and market trends delivered to your inbox.