Resources

An overview of security and networking definitions, cybersecurity concepts explained and more resources.

Placeholder for Aerial view new york streetsAerial view new york streets

Network switch versus router: What is the difference?

Routers and switches are both computer networking devices that allow one or more computers to be connected to other computers, networked devices, or to other networks.

Placeholder for Remote work video call meetingRemote work video call meeting

What is secure cloud connect

Discover Secure Cloud Connect Solutions. Securely connected to the public cloud.

Placeholder for Engineer behind screen dark roomEngineer behind screen dark room

What is social engineering?

Social engineering is the practice of duping or tricking people into breaking standard security practices. This non-technical strategy is heavily used by cyber criminals in both targeted and widespread attacks.

Placeholder for Industrial datacenter hallwayIndustrial datacenter hallway

What is EVPN-VXLAN?

Ethernet VPN-Ethernet Virtual Extensible LAN (EVPN-VXLAN) gives large organisations a common framework used to manage their campus and data centre networks.

Placeholder for Two young engineers officeTwo young engineers office

What is the shared responsibility model?

The shared responsibility model is a framework for cloud security dictating the security obligations of a cloud computing provider and its users to ensure accountability.

Placeholder for Suburban streets and housesSuburban streets and houses

How does multicloud work?

Connect and secure applications across many clouds, as simply as in one cloud.

Placeholder for Facade modern buildingFacade modern building

What is an application layer attack?

An application layer attack, or 'DDoS Attack', targets an application and specific vulnerabilities or issues, so the application is not able to communicate and or deliver content to its user(s).

Placeholder for Aerial view highway flyoversAerial view highway flyovers

What is hybrid cloud?

Hybrid cloud infrastructures allow you to maintain and control dedicated platforms for key systems while benefitting from the flexibility that public cloud solutions offer.

Placeholder for Woman riding bus smartphoneWoman riding bus smartphone

What is VoWiFi?

VoWiFi stands for voice over (Evolved Packet Core-integrated) WiFi and is a complementary technology to VoLTE.

Placeholder for Engineer behind screenEngineer behind screen

What is LockerGoga ransomware?

LockerGoga is a malicious ransomware program that was made to encrypt data stored on computers and to blackmail users by demanding ransom payments in return for decryption tools.

Placeholder for Wind power clouds greenWind power clouds green

What is private cloud

You get the agility, scalability and efficiency of the public cloud, with the greater levels of control and security of a single-tenant, dedicated environment.

Placeholder for Business man walking streetsBusiness man walking streets

What is network slicing

Network slicing is a virtual networking architecture type that belongs to the software-defined networking (SDN) family and network functions virtualisation (NFV).

Placeholder for Warehouse ceiling roof structureWarehouse ceiling roof structure

What is the SS7 firewall?

The SS7 firewall is a ‘signalling firewall’ used to protect mobile operators from SS7 Attacks. The SS7 firewall protects legacy networks (SS7 based) specifically against potential attacks, unauthorised senders, malformed messages, stolen mobile identities and more.

Placeholder for Manufacturing factory worker laptopManufacturing factory worker laptop

What is OT security?

OT security is the full stack of hardware and software being used to monitor, detect and control changes to devices, processes and events. OT security is commonly used to protect industrial systems and networks from attacks.

Placeholder for 2022 cybersecurity trends to look out for2022 cybersecurity trends to look out for

What is Zero Touch Provisioning?

Zero Touch Provisioning (ZTP) is a networking device feature that aims to deliver installation of a networking appliance without needing someone to configure the device locally.

Placeholder for Modern metro stationModern metro station

What is CASB?

A Cloud Access Security Broker (CASB) protects cloud-hosted data and provides enterprise-class security controls so that organizations can incorporate SaaS and IaaS into their existing security architecture.

Placeholder for Barcelona streets from aboveBarcelona streets from above

What is SamSam ransomware?

SamSam is ransomware that 'spies' for a long time after its initial infection, without being detected. It uses vulnerabilities to attack specific organisations.

Placeholder for Developers behind screensDevelopers behind screens

Intrusion Detection Prevention (IDP and IPS)

IDS stands for Intrusion Detection System and IPS stands for Intrusion Prevention System. Together they form an Intrusion Detection Prevention System (IDP).