An overview of security and networking definitions, cybersecurity concepts explained and more resources.
Network switch versus router: What is the difference?
Routers and switches are both computer networking devices that allow one or more computers to be connected to other computers, networked devices, or to other networks.
What is secure cloud connect
Discover Secure Cloud Connect Solutions. Securely connected to the public cloud.
What is social engineering?
Social engineering is the practice of duping or tricking people into breaking standard security practices. This non-technical strategy is heavily used by cyber criminals in both targeted and widespread attacks.
What is EVPN-VXLAN?
Ethernet VPN-Ethernet Virtual Extensible LAN (EVPN-VXLAN) gives large organisations a common framework used to manage their campus and data centre networks.
What is the shared responsibility model?
The shared responsibility model is a framework for cloud security dictating the security obligations of a cloud computing provider and its users to ensure accountability.
How does multicloud work?
Connect and secure applications across many clouds, as simply as in one cloud.
What is an application layer attack?
An application layer attack, or 'DDoS Attack', targets an application and specific vulnerabilities or issues, so the application is not able to communicate and or deliver content to its user(s).
What is hybrid cloud?
Hybrid cloud infrastructures allow you to maintain and control dedicated platforms for key systems while benefitting from the flexibility that public cloud solutions offer.
What is VoWiFi?
VoWiFi stands for voice over (Evolved Packet Core-integrated) WiFi and is a complementary technology to VoLTE.
What is LockerGoga ransomware?
LockerGoga is a malicious ransomware program that was made to encrypt data stored on computers and to blackmail users by demanding ransom payments in return for decryption tools.
What is private cloud
You get the agility, scalability and efficiency of the public cloud, with the greater levels of control and security of a single-tenant, dedicated environment.
What is network slicing
Network slicing is a virtual networking architecture type that belongs to the software-defined networking (SDN) family and network functions virtualisation (NFV).
What is the SS7 firewall?
The SS7 firewall is a ‘signalling firewall’ used to protect mobile operators from SS7 Attacks. The SS7 firewall protects legacy networks (SS7 based) specifically against potential attacks, unauthorised senders, malformed messages, stolen mobile identities and more.
What is OT security?
OT security is the full stack of hardware and software being used to monitor, detect and control changes to devices, processes and events. OT security is commonly used to protect industrial systems and networks from attacks.
What is Zero Touch Provisioning?
Zero Touch Provisioning (ZTP) is a networking device feature that aims to deliver installation of a networking appliance without needing someone to configure the device locally.
What is CASB?
A Cloud Access Security Broker (CASB) protects cloud-hosted data and provides enterprise-class security controls so that organizations can incorporate SaaS and IaaS into their existing security architecture.
What is SamSam ransomware?
SamSam is ransomware that 'spies' for a long time after its initial infection, without being detected. It uses vulnerabilities to attack specific organisations.
Intrusion Detection Prevention (IDP and IPS)
IDS stands for Intrusion Detection System and IPS stands for Intrusion Prevention System. Together they form an Intrusion Detection Prevention System (IDP).