5G
Tying 5G benefits to the service provider business strategy
Obviously 5G brings about business opportunities and an unprecedented increase in performance, which enables many businesses to offer innovative and faster service.
Arista introduces 7360X series open cloud switch platform
Arista Networks, supplier of software-based cloud networking solutions, introduces the 7360X series open cloud switch platform.
Effective Endpoint Security Strategy 101
Balancing your business’ objectives while ensuring your organization’s data is secure can be a challenge for many. But that challenge can be assuaged by addressing cyberthreats at the start – the endpoint. Adopting an effective endpoint protection strategy is crucial for a modern-day organization
SD-WAN
Managed SD-WAN: Buy or DIY?
Managed SD-WAN as a service versus Do it Yourself, what are the differences and benefits to consider? Jan-Willem Keinke shares his thoughts in his expert blog 'SD-WAN: Buy or DiY?'
SD-WAN Cloud
Cloud-delivered branch - Simplicity now surpasses SD-WAN
Juniper Networks’ new SD-WAN as-a-service solution joins the company’s expanding portfolio of cloud-delivered networking products while simultaneously overtaking rival SD-WAN solutions by including branch universal CPE, LAN and Wi-Fi.
Juniper Networks introduces SD-WAN as a Service solution
Juniper’s Contrail Service Orchestration now manages the full enterprise branch, campus and cloud SD-WAN, now adding branch security, LAN and Mist Learning WLAN
Establishing the Zero-Trust Cybersecurity Framework
The principle 'Zero-Trust' is one of the most integral security frameworks in recent times. Its crux lies in simplicity - a default deny for all flows and concept of minimal access. To effectively realize 'Zero Digital Trust' in your ecosystem here's what it entails.
Cognitive WiFi is here
Last August 2019, Arista made its first acquisition, Mojo Networks, to transform the future of WiFi and campus networks.
How to secure your online brand
How adversaries impersonate an organization’s online brand to target customers or employees. As we outlined in our Practical Guide to Reducing Digital Risk, the integrity of brand and identity is essential in protecting a business.
Juniper Networks Announces Intent to Acquire Mist Systems to Bring AI to IT
Juniper Networks announced that they've has entered into a definitive agreement to acquire Mist Systems, a pioneer in cloud-managed wireless networks powered by Artificial Intelligence (AI).
A day in the life of a Presales Consultant
As Head of Technology & Solutions I have a large remit within the business but I am often asked what I and my team 'do'... And sometimes I struggle to explain it to my family and friends too so I thought I'd take some time to explain the pre-sales role in particular. Here's an actual day in the life of a presales consultant!
Ransomware 'LockerGoga' wreaks havoc on Norway's Norsk Hydro
What is 'LockerGoga' ransomware and how did it infect Norway's Norsk Hydro? Read all about it in this blog.
F5 Networks
F5 Acquires NGINX
F5 and NGINX announced a definitive agreement under which F5 will acquire all issued and outstanding shares of privately held NGINX for a total enterprise value of approximately $670 million.
Juniper Networks
Juniper announces end of life of popular EX Switches
Juniper Networks has announced the End of Life (EOL) of some of their most popular, but older, switches including: EX2200, EX3300, EX4220, EX4550.
Half of top 12 global exploits targeted IoT devices
Fortinet announced the findings of its latest quarterly Global Threat Landscape Report. The research reveals that half of the top 12 global exploits targeted IoT devices, and four of the top 12 were related to IP-enabled cameras.
5G
5G security: Challenges to overcome enabling new business models
As the world is about to start rolling out 5G networks, the question arises what the challenges will be to address 5G security and privacy concerns. In this blog René shares his thought on 5G security challenges and potential business benefits.
ETSI releases IoT security standard
The European Telecommunications Standardisation Institute (ETSI) has released their initial standard for securing IoT devices.
5G
Why network slicing will lead to 5G readiness
Blog on 5G Network Slicing and the three categories: 1) Enhanced Mobile Broadband (eMBB), 2) Ultra-reliable and Low-latency Communications (uRLLC), and 3) Massive Machine Type Communications (mMTC).
Sign up for our newsletter
Get the latest security news, insights and market trends delivered to your inbox.