What's going on
Stay up-to-date with the latest industry news, blog posts, and insights.
Next stop on the SASE journey: Establishing a plan and team for success
SASE is a technology shift and consumption model that promises to change how we view and access our digital environments.
Are you still satisfied with your remote working solutions?
Last March, everyone started working from home en masse and remote working licences were purchased a lot. Mostly Pulse Secure. These are about to expire.
Architectural choice: The key to a successful SASE journey
An organisation’s choice in architecture is critical because it can directly impact their SASE objectives. Choices made at the architecture definition stage will dictate how each service component supports current business needs.
The road to SASE is a journey, not a sprint
You don't just implement SASE one day, it takes time and effort. One of the reasons is because nearly all organisations already have some degree of investment in technologies, making a quick adoption difficult. That is why the road to SASE is a journey, not a sprint.
Top 6 DDoS protection solutions that should be on your radar
Overview of DDoS protection solutions to protect enterprises against these bigger, smarter and more diverse DDoS-attacks. These 6 should be on your radar! Find out more.
Security Managed services
8 major benefits of having a Managed Security Services Provider (MSSP)
Managed Security Services Providers (MSSPs) provide structural security solutions against cyberattacks, including always up-to-date expertise in the latest cyber threats and appropriate solutions. Here's 8 benefits of the best MSSP to prevent cyberattacks and save costs.
Global network operator Truphone goes live with new DSC from BroadForward and Nomios
We have been selected by Truphone to replace their legacy diameter routers with the BroadForward Diameter Signalling Controller (DSC).
Ransomware with Data Leak Extortion
As data leak extortion swiftly became the new norm for big game hunting (BGH) ransomware operators since late 2019, various criminal adversaries began innovating in this area. This includes collaboration between ransomware groups, auctioning leaked data and demanding not just one ransom for the ransomware decryptor but also a second ransom to ensure stolen data is deleted.
Company update Support
In November 2020 we informed you of some upcoming changes to the way you raise support cases as we move to a new Infradata Support Portal. Most importantly we will no longer accept tickets being raised via email as we are unable to provide comprehensive SLA reporting based on email delivery.
What to do against a ransomware attack?
As a company, you can already do a lot to counter ransomware attacks. One of the measures is the deployment of a Security Operations Center (SOC). Find out why and how!
BICS selects Nomios to deliver next generation Signalling Transfer Point
Enabling intelligent routing with centralized configuration, management and provisioning for SS7 signaling traffic.
Juniper Networks Award
Juniper Networks Elevate Awards 2020
The Juniper Networks Elevate Awards 2020 have been presented. We congratulate all winners on receiving this award and also the nominees on their honourable mention. Only real network innovators have a chance to win this award.
What is your cloud migration strategy?
At first glance, cloud migration can seem like a mere technical decision, but it is very much business-related. Thus, the right question is: what are the business needs that are driving your organisation to migrate to the cloud?
Why Telcos are Exploring ‘Best of Suite’ over ‘Best of Breed’ Solutions
In the past, when operators first contemplated virtualising infrastructures and adopting software-defined networks (SDNs), many were tempted to pursue a ‘best of breed’ strategy whereby they deployed standalone systems (with independent software modules) to manage each function. It was an idealistic approach, but one that now seems out of step with the times.
The history of ransomware and the new trends
As organisations improve their capabilities to rebound from ransomware attacks and security researchers continue to create decryptors for ransomware, there is less incentive for victims to pay the ransom in order to reclaim files. However, criminal actors have found a way to thwart these defensive measures.
Exploring EVPN-VXLAN Overlay Architectures – Bridged Overlay
A bridged overlay is a basic approach to an EVPN-VXLAN overlay. Just as the name suggests, it provides Ethernet bridging in an EVPN network and really just extends VLANs between the leaf devices across VXLAN tunnels.
Assuring Quality of Service Experience for Differentiated Customer Outcomes
Netrounds complements Juniper’s existing automation capabilities to make network operators’ lives easier and to ensure end users are having an awesome assured service experience.
Juniper Networks WLAN
Juniper Mist recognised as a Leader in Magic Quadrant for Wired and Wireless LAN Access Infrastructure
We are happy to announce that our partner Juniper Networks is a leader in the Gartner Magic Quadrant for Wired and Wireless LAN Access Infrastructure.
Sign up for our newsletter
Get the latest security news, insights and market trends delivered to your inbox.