What's going on

Stay up-to-date with the latest industry news, blog posts, and insights.

Placeholder for What is EDR?What is EDR?

5G

Tying 5G benefits to the service provider business strategy

Obviously 5G brings about business opportunities and an unprecedented increase in performance, which enables many businesses to offer innovative and faster service.

1 min. read
Placeholder for Warm clouds sunshineWarm clouds sunshine

Arista introduces 7360X series open cloud switch platform

Arista Networks, supplier of software-based cloud networking solutions, introduces the 7360X series open cloud switch platform.

1 min. read
Placeholder for Digital identityDigital identity
McAfee

Effective Endpoint Security Strategy 101

Balancing your business’ objectives while ensuring your organization’s data is secure can be a challenge for many. But that challenge can be assuaged by addressing cyberthreats at the start – the endpoint. Adopting an effective endpoint protection strategy is crucial for a modern-day organization

1 min. read

SD-WAN

Managed SD-WAN: Buy or DIY?

Managed SD-WAN as a service versus Do it Yourself, what are the differences and benefits to consider? Jan-Willem Keinke shares his thoughts in his expert blog 'SD-WAN: Buy or DiY?'

1 min. read
Placeholder for Bridge seaBridge sea

SD-WAN Cloud

Cloud-delivered branch - Simplicity now surpasses SD-WAN

Juniper Networks’ new SD-WAN as-a-service solution joins the company’s expanding portfolio of cloud-delivered networking products while simultaneously overtaking rival SD-WAN solutions by including branch universal CPE, LAN and Wi-Fi.

5 min. read
Placeholder for Juniper networks nxtJuniper networks nxt
Juniper Networks

Juniper Networks introduces SD-WAN as a Service solution

Juniper’s Contrail Service Orchestration now manages the full enterprise branch, campus and cloud SD-WAN, now adding branch security, LAN and Mist Learning WLAN

1 min. read
Placeholder for Northern lightNorthern light

Establishing the Zero-Trust Cybersecurity Framework

The principle 'Zero-Trust' is one of the most integral security frameworks in recent times. Its crux lies in simplicity - a default deny for all flows and concept of minimal access. To effectively realize 'Zero Digital Trust' in your ecosystem here's what it entails.

1 min. read
Placeholder for Student using computerStudent using computer
Arista Networks

Cognitive WiFi is here

Last August 2019, Arista made its first acquisition, Mojo Networks, to transform the future of WiFi and campus networks.

1 min. read
Placeholder for River and road helicopterviewRiver and road helicopterview

How to secure your online brand

How adversaries impersonate an organization’s online brand to target customers or employees. As we outlined in our Practical Guide to Reducing Digital Risk, the integrity of brand and identity is essential in protecting a business.

1 min. read

Juniper Networks Announces Intent to Acquire Mist Systems to Bring AI to IT

Juniper Networks announced that they've has entered into a definitive agreement to acquire Mist Systems, a pioneer in cloud-managed wireless networks powered by Artificial Intelligence (AI).

1 min. read

A day in the life of a Presales Consultant

As Head of Technology & Solutions I have a large remit within the business but I am often asked what I and my team 'do'... And sometimes I struggle to explain it to my family and friends too so I thought I'd take some time to explain the pre-sales role in particular. Here's an actual day in the life of a presales consultant!

1 min. read
Placeholder for Power plantPower plant

Ransomware 'LockerGoga' wreaks havoc on Norway's Norsk Hydro

What is 'LockerGoga' ransomware and how did it infect Norway's Norsk Hydro? Read all about it in this blog.

4 min. read
Placeholder for F5 networks big ipF5 networks big ip
F5

F5 Networks

F5 Acquires NGINX

F5 and NGINX announced a definitive agreement under which F5 will acquire all issued and outstanding shares of privately held NGINX for a total enterprise value of approximately $670 million.

1 min. read
Placeholder for Juniper networks switchingJuniper networks switching
Juniper Networks

Juniper Networks

Juniper announces end of life of popular EX Switches

Juniper Networks has announced the End of Life (EOL) of some of their most popular, but older, switches including: EX2200, EX3300, EX4220, EX4550.

1 min. read
Placeholder for Power plantPower plant
Fortinet

Half of top 12 global exploits targeted IoT devices

Fortinet announced the findings of its latest quarterly Global Threat Landscape Report. The research reveals that half of the top 12 global exploits targeted IoT devices, and four of the top 12 were related to IP-enabled cameras.

5 min. read
Placeholder for Lily flower macroLily flower macro

5G

5G security: Challenges to overcome enabling new business models

As the world is about to start rolling out 5G networks, the question arises what the challenges will be to address 5G security and privacy concerns. In this blog René shares his thought on 5G security challenges and potential business benefits.

7 min. read
Placeholder for People crossing streetPeople crossing street

ETSI releases IoT security standard

The European Telecommunications Standardisation Institute (ETSI) has released their initial standard for securing IoT devices.

1 min. read
Placeholder for Street by night2Street by night2

5G

Why network slicing will lead to 5G readiness

Blog on 5G Network Slicing and the three categories: 1) Enhanced Mobile Broadband (eMBB), 2) Ultra-reliable and Low-latency Communications (uRLLC), and 3) Massive Machine Type Communications (mMTC).

1 min. read

Sign up for our newsletter

Get the latest security news, insights and market trends delivered to your inbox.