What's going on

Stay up-to-date with the latest industry news, blog posts, and insights.

Placeholder for Managed SOC security engineer - MSSPManaged SOC security engineer - MSSP

Security Managed services

8 major benefits of having a Managed Security Services Provider (MSSP)

Managed Security Services Providers (MSSPs) provide structural security solutions against cyberattacks, including always up-to-date expertise in the latest cyber threats and appropriate solutions. Here's 8 benefits of the best MSSP to prevent cyberattacks and save costs.

9 min. read
Placeholder for Woman smartphone at nightWoman smartphone at night
BroadForward

Broadforward

Global network operator Truphone goes live with new DSC from BroadForward and Nomios

We have been selected by Truphone to replace their legacy diameter routers with the BroadForward Diameter Signalling Controller (DSC).

3 min. read
Placeholder for Ransomware aanval socRansomware aanval soc
CrowdStrike

Ransomware

Ransomware with Data Leak Extortion

As data leak extortion swiftly became the new norm for big game hunting (BGH) ransomware operators since late 2019, various criminal adversaries began innovating in this area. This includes collaboration between ransomware groups, auctioning leaked data and demanding not just one ransom for the ransomware decryptor but also a second ransom to ensure stolen data is deleted.

7 min. read
Placeholder for Support engineer smilingSupport engineer smiling

Company update Support

Support Update

In November 2020 we informed you of some upcoming changes to the way you raise support cases as we move to a new Infradata Support Portal. Most importantly we will no longer accept tickets being raised via email as we are unable to provide comprehensive SLA reporting based on email delivery.

1 min. read
Placeholder for Security engineer desktopSecurity engineer desktop

Ransomware

What to do against a ransomware attack?

As a company, you can already do a lot to counter ransomware attacks. One of the measures is the deployment of a Security Operations Center (SOC). Find out why and how!

7 min. read
Placeholder for Rodion kutsaev 0 VGG7cq Tw Co unsplashRodion kutsaev 0 VGG7cq Tw Co unsplash
BroadForward

Broadforward

BICS selects Nomios to deliver next generation Signalling Transfer Point

Enabling intelligent routing with centralized configuration, management and provisioning for SS7 signaling traffic.

3 min. read
Placeholder for Juniper networks elevate award 2020Juniper networks elevate award 2020
Juniper Networks

Juniper Networks Award

Juniper Networks Elevate Awards 2020

The Juniper Networks Elevate Awards 2020 have been presented. We congratulate all winners on receiving this award and also the nominees on their honourable mention. Only real network innovators have a chance to win this award.

1 min. read
Placeholder for Steep white rocksSteep white rocks

Cloud

What is your cloud migration strategy?

At first glance, cloud migration can seem like a mere technical decision, but it is very much business-related. Thus, the right question is: what are the business needs that are driving your organisation to migrate to the cloud?

5 min. read
Placeholder for Business people walkingBusiness people walking
F5

Telecommunications

Why Telcos are Exploring ‘Best of Suite’ over ‘Best of Breed’ Solutions

In the past, when operators first contemplated virtualising infrastructures and adopting software-defined networks (SDNs), many were tempted to pursue a ‘best of breed’ strategy whereby they deployed standalone systems (with independent software modules) to manage each function. It was an idealistic approach, but one that now seems out of step with the times.

1 min. read
Placeholder for Close up laptopClose up laptop
CrowdStrike

Ransomware

The history of ransomware and the new trends

As organisations improve their capabilities to rebound from ransomware attacks and security researchers continue to create decryptors for ransomware, there is less incentive for victims to pay the ransom in order to reclaim files. However, criminal actors have found a way to thwart these defensive measures.

14 min. read
Placeholder for Street by night2Street by night2
Juniper Networks

Juniper Networks

Exploring EVPN-VXLAN Overlay Architectures – Bridged Overlay

A bridged overlay is a basic approach to an EVPN-VXLAN overlay. Just as the name suggests, it provides Ethernet bridging in an EVPN network and really just extends VLANs between the leaf devices across VXLAN tunnels.

2 min. read
Placeholder for Manager with laptop and smart phoneManager with laptop and smart phone
Juniper Networks

Juniper Networks

Assuring Quality of Service Experience for Differentiated Customer Outcomes

Netrounds complements Juniper’s existing automation capabilities to make network operators’ lives easier and to ensure end users are having an awesome assured service experience.

1 min. read
Placeholder for Pexels thiago matos 2610059Pexels thiago matos 2610059
Juniper Networks

Juniper Networks WLAN

Juniper Mist recognised as a Leader in Magic Quadrant for Wired and Wireless LAN Access Infrastructure

We are happy to announce that our partner Juniper Networks is a leader in the Gartner Magic Quadrant for Wired and Wireless LAN Access Infrastructure.

1 min. read
Placeholder for Aerial view city streetsAerial view city streets

Network infrastructure

New EU Regulations on Inbound Roaming - Are you Compliant?

A recent EU regulation has required mobile operators in the whole of Europe to be compliant to the new rules on inbound roaming. This has posed several challenges into the network of these telecom.

1 min. read
Placeholder for Ztna solutions too trustingZtna solutions too trusting
Palo Alto Networks

Zero-Trust ZTNA

Why most Zero Trust Network Access solutions are too trusting

When evaluating ZTNA providers, it’s important to make sure they don’t implicitly trust users once they’ve connected. Organizations need to fully commit to embracing the Zero Trust concept of explicit identity-based trust.

1 min. read
Placeholder for ConstructionConstruction
Juniper Networks

Security

Security survey says: Don’t wait until it’s broken to fix it

In the report, “Network security in the spotlight: Understanding why it can go wrong is key to making the right investment decisions”. The Register conducted a survey of network and security professionals examining what drives organizations to excel in the delivery of information security.

1 min. read
Placeholder for F5 sslo in equinixF5 sslo in equinix
F5

F5 Networks

Improving Security Outcomes with F5 SSLO in Equinix

The benefits of using BIG-IP SSLO in Equinix to enforce centralized security policies include optimized cost efficiency, simplified operations and improved security outcomes.

1 min. read
Placeholder for Nginx app protect f5Nginx app protect f5
F5

F5 Networks

NGINX App Protect: Advanced F5 Application Security for NGINX Plus

NGINX App Protect is a new application security solution that combines the efficacy of advanced F5 WAF technology with the agility and performance of NGINX Plus.

1 min. read

Sign up for our newsletter

Get the latest security news, insights and market trends delivered to your inbox.