What's going on

Stay up-to-date with the latest industry news, blog posts, and insights.

Placeholder for Mountain viewMountain view

Endpoint security EDR

Top 5 Endpoint Security Solutions 2020

A cyber security strategy that does not address endpoint security, is no strategy. We select the 5 best endpoint security vendors to watch in 2020.

8 min. read
Placeholder for FortinetFortinet
Fortinet

Infradata Poland Participates in Europe's Biggest Fortinet project

Infradata Poland has been honoured by Fortinet for participating in the biggest European Fortinet solutions project of 2019.

1 min. read
Placeholder for F5 networksF5 networks
F5

F5 Networks

Infradata Poland named EMEA's Platinum F5 Networks partner

Infradata Poland is the only independent company in the EMEA region that has been granted with this F5 Networks partner status.

1 min. read
Placeholder for Juniper networks routingJuniper networks routing
Juniper Networks

Juniper Networks

Juniper Universal Services Framework for Security = Operational Consistency

Juniper announces the SPC3 security services card for MX240, MX480 and MX960 routers and Universal Services Framework.

1 min. read
Placeholder for Shark fish schoolShark fish school
Juniper Networks

Bait and Tackle: What Can Be Done About Phishing?

What are the key factors that allow phishing attacks to keep happening? And what phishing security measures can be effective?

1 min. read
Placeholder for Macro eyeMacro eye
Forcepoint

Implementing zero trust: Time to think beyond identity

Digital transformation and multi-cloud adoption by enterprises are forcing organizations to re-think the traditional network perimeter

1 min. read
Placeholder for F5 networks big ipF5 networks big ip
F5

Why application delivery should look more like a factory (and less like an artisan’s shop)

In the long-ago pre-cloud era, application delivery looked very different than it does today. That’s because nothing moved faster than the speed at which IT could procure and provision the servers on which the applications ran. Planning for new applications or major application updates took many months or years.

3 min. read
Placeholder for Green snakeGreen snake

NGFW

Cybercrime soars in the first month of 2020

Would or should you pay a ransom? 2020 has begun and already multiple companies have fallen victim to ransomware and featured in the headlines as a result. Infradata discusses cybercrime as-a-service as a growing business model.

1 min. read
Placeholder for Sky roofSky roof
A10 Networks

A10 Networks Extends Carrier-class Firewall Product line with Container Solution and New 5G Network Ready Features

The Thunder CFW includes functionality that helps ensure the security, reliability and availability of 5G networks as they transition from physical network functions to be completely cloud native.

1 min. read
Placeholder for Leave green macroLeave green macro
Cumulus Networks

Prevent lateral compromise with micro-segmentation

Why network micro-segmentation matters for network security and how it helps mitigate the spread of lateral compromise.

11 min. read
Placeholder for Close up tabletClose up tablet
BroadForward

Telenet selects Infradata and BroadForward to deliver Location Based Services

The Location Based Services (LBS) solution delivered by Infradata at Telenet, provides access to location information of devices across legacy and next generation mobile networks.

1 min. read
Placeholder for Fortinet firewallFortinet firewall
Fortinet

Fortinet Acquires SOAR provider CyberSponse

"With the integration of CyberSponse’s powerful SOAR platform into the Fortinet Security Fabric, we will offer customers accelerated incident response and the ability to standardize and scale processes"

1 min. read
Placeholder for Feather macroFeather macro
Palo Alto Networks

Cloud security

7 guiding principles to selecting the right cloud security solution

Here are 7 essential principles to guide you to evaluate and select the best cloud security solution for your multi-cloud environments, spanning AWS, Azure, and Google Cloud Platform.

1 min. read
Placeholder for Metal dark surfaceMetal dark surface

Ransomware: The Digital Plague that Still Persists

Ransomware began its reign of cyber terror in 1989 and remains a serious and dangerous threat today. In layman’s terms, ransomware is malware that employs encryption to lock users out of their devices or block access to critical data or files.

1 min. read
Placeholder for Barcelona streets from aboveBarcelona streets from above

Why 5G Security and Interoperability must not be optional extras

Mobile Solutions Architect Ditri Trio elaborates on 5G Security and Interoperability challenges with existing 3G and 4G networks.

1 min. read
Placeholder for Mcafee backgroundMcafee background
McAfee

McAfee Introduces CASB-Integrated Cloud Security Platform for Container-Based Applications

McAfee MVISION Cloud for Containers provides: Cloud Security Posture Management (CSPM), “Shift Left” DevOps Integration, Vulnerability Scanning of container images.

1 min. read
Placeholder for Juniper networks mx seriesJuniper networks mx series
Juniper Networks

Routing Juniper Networks

Juniper incorporates Security Intelligence to MX Series Routers

Juniper Networks incorporates Juniper Networks’ security intelligence onto the MX Series routers. Security can be extended to routing infrastructure to turn connectivity layers into automated defense layers at scale.

1 min. read
Placeholder for Glass architectureGlass architecture
McAfee

Cloud security

19 cloud security best practices for 2019

Mitigate risks to using any cloud service with these Cloud Security Best Practices. Cloud computing has become near-ubiquitous, with roughly 95 percent of businesses reporting that they have a cloud strategy.

11 min. read

Sign up for our newsletter

Get the latest security news, insights and market trends delivered to your inbox.