Endpoint security EDR
Top 5 Endpoint Security Solutions 2020
A cyber security strategy that does not address endpoint security, is no strategy. We select the 5 best endpoint security vendors to watch in 2020.
Infradata Poland Participates in Europe's Biggest Fortinet project
Infradata Poland has been honoured by Fortinet for participating in the biggest European Fortinet solutions project of 2019.
F5 Networks
Infradata Poland named EMEA's Platinum F5 Networks partner
Infradata Poland is the only independent company in the EMEA region that has been granted with this F5 Networks partner status.
Juniper Networks
Juniper Universal Services Framework for Security = Operational Consistency
Juniper announces the SPC3 security services card for MX240, MX480 and MX960 routers and Universal Services Framework.
Bait and Tackle: What Can Be Done About Phishing?
What are the key factors that allow phishing attacks to keep happening? And what phishing security measures can be effective?
Implementing zero trust: Time to think beyond identity
Digital transformation and multi-cloud adoption by enterprises are forcing organizations to re-think the traditional network perimeter
Why application delivery should look more like a factory (and less like an artisan’s shop)
In the long-ago pre-cloud era, application delivery looked very different than it does today. That’s because nothing moved faster than the speed at which IT could procure and provision the servers on which the applications ran. Planning for new applications or major application updates took many months or years.
NGFW
Cybercrime soars in the first month of 2020
Would or should you pay a ransom? 2020 has begun and already multiple companies have fallen victim to ransomware and featured in the headlines as a result. Infradata discusses cybercrime as-a-service as a growing business model.
A10 Networks Extends Carrier-class Firewall Product line with Container Solution and New 5G Network Ready Features
The Thunder CFW includes functionality that helps ensure the security, reliability and availability of 5G networks as they transition from physical network functions to be completely cloud native.
Prevent lateral compromise with micro-segmentation
Why network micro-segmentation matters for network security and how it helps mitigate the spread of lateral compromise.
Telenet selects Infradata and BroadForward to deliver Location Based Services
The Location Based Services (LBS) solution delivered by Infradata at Telenet, provides access to location information of devices across legacy and next generation mobile networks.
Fortinet Acquires SOAR provider CyberSponse
"With the integration of CyberSponse’s powerful SOAR platform into the Fortinet Security Fabric, we will offer customers accelerated incident response and the ability to standardize and scale processes"
Cloud security
7 guiding principles to selecting the right cloud security solution
Here are 7 essential principles to guide you to evaluate and select the best cloud security solution for your multi-cloud environments, spanning AWS, Azure, and Google Cloud Platform.
Ransomware: The Digital Plague that Still Persists
Ransomware began its reign of cyber terror in 1989 and remains a serious and dangerous threat today. In layman’s terms, ransomware is malware that employs encryption to lock users out of their devices or block access to critical data or files.
Why 5G Security and Interoperability must not be optional extras
Mobile Solutions Architect Ditri Trio elaborates on 5G Security and Interoperability challenges with existing 3G and 4G networks.
McAfee Introduces CASB-Integrated Cloud Security Platform for Container-Based Applications
McAfee MVISION Cloud for Containers provides: Cloud Security Posture Management (CSPM), “Shift Left” DevOps Integration, Vulnerability Scanning of container images.
Routing Juniper Networks
Juniper incorporates Security Intelligence to MX Series Routers
Juniper Networks incorporates Juniper Networks’ security intelligence onto the MX Series routers. Security can be extended to routing infrastructure to turn connectivity layers into automated defense layers at scale.
Cloud security
19 cloud security best practices for 2019
Mitigate risks to using any cloud service with these Cloud Security Best Practices. Cloud computing has become near-ubiquitous, with roughly 95 percent of businesses reporting that they have a cloud strategy.
Sign up for our newsletter
Get the latest security news, insights and market trends delivered to your inbox.