What's going on
Stay up-to-date with the latest industry news, blog posts, and insights.
Company update Support
In November 2020 we informed you of some upcoming changes to the way you raise support cases as we move to a new Infradata Support Portal. Most importantly we will no longer accept tickets being raised via email as we are unable to provide comprehensive SLA reporting based on email delivery.
What to do against a ransomware attack?
As a company, you can already do a lot to counter ransomware attacks. One of the measures is the deployment of a Security Operations Center (SOC). Find out why and how!
BICS selects Nomios to deliver next generation Signalling Transfer Point
Enabling intelligent routing with centralized configuration, management and provisioning for SS7 signaling traffic.
Juniper Networks Award
Juniper Networks Elevate Awards 2020
The Juniper Networks Elevate Awards 2020 have been presented. We congratulate all winners on receiving this award and also the nominees on their honourable mention. Only real network innovators have a chance to win this award.
What is your cloud migration strategy?
At first glance, cloud migration can seem like a mere technical decision, but it is very much business-related. Thus, the right question is: what are the business needs that are driving your organisation to migrate to the cloud?
Why Telcos are Exploring ‘Best of Suite’ over ‘Best of Breed’ Solutions
In the past, when operators first contemplated virtualising infrastructures and adopting software-defined networks (SDNs), many were tempted to pursue a ‘best of breed’ strategy whereby they deployed standalone systems (with independent software modules) to manage each function. It was an idealistic approach, but one that now seems out of step with the times.
The history of ransomware and the new trends
As organisations improve their capabilities to rebound from ransomware attacks and security researchers continue to create decryptors for ransomware, there is less incentive for victims to pay the ransom in order to reclaim files. However, criminal actors have found a way to thwart these defensive measures.
Exploring EVPN-VXLAN Overlay Architectures – Bridged Overlay
A bridged overlay is a basic approach to an EVPN-VXLAN overlay. Just as the name suggests, it provides Ethernet bridging in an EVPN network and really just extends VLANs between the leaf devices across VXLAN tunnels.
Assuring Quality of Service Experience for Differentiated Customer Outcomes
Netrounds complements Juniper’s existing automation capabilities to make network operators’ lives easier and to ensure end users are having an awesome assured service experience.
Juniper Networks WLAN
Juniper Mist recognised as a Leader in Magic Quadrant for Wired and Wireless LAN Access Infrastructure
We are happy to announce that our partner Juniper Networks is a leader in the Gartner Magic Quadrant for Wired and Wireless LAN Access Infrastructure.
New EU Regulations on Inbound Roaming - Are you Compliant?
A recent EU regulation has required mobile operators in the whole of Europe to be compliant to the new rules on inbound roaming. This has posed several challenges into the network of these telecom.
Why most Zero Trust Network Access solutions are too trusting
When evaluating ZTNA providers, it’s important to make sure they don’t implicitly trust users once they’ve connected. Organizations need to fully commit to embracing the Zero Trust concept of explicit identity-based trust.
Juniper Networks Success story
Juniper Mist showcase with VolkerWessels
In this Juniper Mist showcase with VolkerWessels different aspects of Mist are shown live. Infradata and VolkerWessels have formed a partnership to ensure the success of this project.
Improving Security Outcomes with F5 SSLO in Equinix
The benefits of using BIG-IP SSLO in Equinix to enforce centralized security policies include optimized cost efficiency, simplified operations and improved security outcomes.
Security survey says: Don’t wait until it’s broken to fix it
In the report, “Network security in the spotlight: Understanding why it can go wrong is key to making the right investment decisions”. The Register conducted a survey of network and security professionals examining what drives organizations to excel in the delivery of information security.
NGINX App Protect: Advanced F5 Application Security for NGINX Plus
NGINX App Protect is a new application security solution that combines the efficacy of advanced F5 WAF technology with the agility and performance of NGINX Plus.
The importance of multi-factor authentication
Ethical hacker Victor Gevers reached news headlines this week as he managed to access president Donald Trump’s Twitter account for the second time.
Network security Network infrastructure
Viabuild selects Nomios as their guide towards an optimal security infrastructure
Nomios deploys a next generation endpoint protection solution at Viabuild enabling more visibility for remote workers.
Sign up for our newsletter
Get the latest security news, insights and market trends delivered to your inbox.