How does multicloud work?
Connect and secure applications across many clouds, as simply as in one cloud.
What is an application layer attack?
An application layer attack, or 'DDoS Attack', targets an application and specific vulnerabilities or issues, so the application is not able to communicate and or deliver content to its user(s).
What is hybrid cloud?
Hybrid cloud infrastructures allow you to maintain and control dedicated platforms for key systems while benefitting from the flexibility that public cloud solutions offer.
What is VoWiFi?
VoWiFi stands for voice over (Evolved Packet Core-integrated) WiFi and is a complementary technology to VoLTE.
What is LockerGoga ransomware?
LockerGoga is a malicious ransomware program that was made to encrypt data stored on computers and to blackmail users by demanding ransom payments in return for decryption tools.
What is private cloud
You get the agility, scalability and efficiency of the public cloud, with the greater levels of control and security of a single-tenant, dedicated environment.
What is network slicing
Network slicing is a virtual networking architecture type that belongs to the software-defined networking (SDN) family and network functions virtualisation (NFV).
What is the SS7 firewall?
The SS7 firewall is a ‘signalling firewall’ used to protect mobile operators from SS7 Attacks. The SS7 firewall protects legacy networks (SS7 based) specifically against potential attacks, unauthorised senders, malformed messages, stolen mobile identities and more.
What is OT security?
OT security is the full stack of hardware and software being used to monitor, detect and control changes to devices, processes and events. OT security is commonly used to protect industrial systems and networks from attacks.
What is Zero Touch Provisioning?
Zero Touch Provisioning (ZTP) is a networking device feature that aims to deliver installation of a networking appliance without needing someone to configure the device locally.
What is CASB?
A Cloud Access Security Broker (CASB) protects cloud-hosted data and provides enterprise-class security controls so that organizations can incorporate SaaS and IaaS into their existing security architecture.
What is SamSam ransomware?
SamSam is ransomware that 'spies' for a long time after its initial infection, without being detected. It uses vulnerabilities to attack specific organisations.
Intrusion Detection Prevention (IDP and IPS)
IDS stands for Intrusion Detection System and IPS stands for Intrusion Prevention System. Together they form an Intrusion Detection Prevention System (IDP).
What is SD-WAN?
A software-defined wide area network (SD-WAN) is an approach to software-defined networking (SDN) technology being extended to wide area network (WAN) connections.
What is edge cloud?
An edge cloud architecture is used to decentralise (processing) power to the edges (clients/devices) of your networks.
What is white box switching?
A white box switch or white label switch is a network switch that is assembled from standardised commodity parts.
What is Zero-Trust architecture?
A Zero-Trust architecture is an architecture based on the principle that nothing can be trusted. Under this philosophy, no device, user or application attempting to interact with your architecture can be considered to be secure.
Software-Defined Secure Networks (SDSN)
Software-Defined Secure Networks (SDSN) protects your business using real-time intelligence and machine learning.