Resources

An overview of security and networking definitions, cybersecurity concepts explained and more resources.

Placeholder for Suburban streets and housesSuburban streets and houses

How does multicloud work?

Connect and secure applications across many clouds, as simply as in one cloud.

Placeholder for Facade modern buildingFacade modern building

What is an application layer attack?

An application layer attack, or 'DDoS Attack', targets an application and specific vulnerabilities or issues, so the application is not able to communicate and or deliver content to its user(s).

Placeholder for Aerial view highway flyoversAerial view highway flyovers

What is hybrid cloud?

Hybrid cloud infrastructures allow you to maintain and control dedicated platforms for key systems while benefitting from the flexibility that public cloud solutions offer.

Placeholder for Woman riding bus smartphoneWoman riding bus smartphone

What is VoWiFi?

VoWiFi stands for voice over (Evolved Packet Core-integrated) WiFi and is a complementary technology to VoLTE.

Placeholder for Engineer behind screenEngineer behind screen

What is LockerGoga ransomware?

LockerGoga is a malicious ransomware program that was made to encrypt data stored on computers and to blackmail users by demanding ransom payments in return for decryption tools.

Placeholder for Wind power clouds greenWind power clouds green

What is private cloud

You get the agility, scalability and efficiency of the public cloud, with the greater levels of control and security of a single-tenant, dedicated environment.

Placeholder for Business man walking streetsBusiness man walking streets

What is network slicing

Network slicing is a virtual networking architecture type that belongs to the software-defined networking (SDN) family and network functions virtualisation (NFV).

Placeholder for Warehouse ceiling roof structureWarehouse ceiling roof structure

What is the SS7 firewall?

The SS7 firewall is a ‘signalling firewall’ used to protect mobile operators from SS7 Attacks. The SS7 firewall protects legacy networks (SS7 based) specifically against potential attacks, unauthorised senders, malformed messages, stolen mobile identities and more.

Placeholder for Manufacturing factory worker laptopManufacturing factory worker laptop

What is OT security?

OT security is the full stack of hardware and software being used to monitor, detect and control changes to devices, processes and events. OT security is commonly used to protect industrial systems and networks from attacks.

Placeholder for 2022 cybersecurity trends to look out for2022 cybersecurity trends to look out for

What is Zero Touch Provisioning?

Zero Touch Provisioning (ZTP) is a networking device feature that aims to deliver installation of a networking appliance without needing someone to configure the device locally.

Placeholder for Modern metro stationModern metro station

What is CASB?

A Cloud Access Security Broker (CASB) protects cloud-hosted data and provides enterprise-class security controls so that organizations can incorporate SaaS and IaaS into their existing security architecture.

Placeholder for Barcelona streets from aboveBarcelona streets from above

What is SamSam ransomware?

SamSam is ransomware that 'spies' for a long time after its initial infection, without being detected. It uses vulnerabilities to attack specific organisations.

Placeholder for Developers behind screensDevelopers behind screens

Intrusion Detection Prevention (IDP and IPS)

IDS stands for Intrusion Detection System and IPS stands for Intrusion Prevention System. Together they form an Intrusion Detection Prevention System (IDP).

Placeholder for Security engineer desktopSecurity engineer desktop

What is SD-WAN?

A software-defined wide area network (SD-WAN) is an approach to software-defined networking (SDN) technology being extended to wide area network (WAN) connections.

Placeholder for Man using smartphone bus stopMan using smartphone bus stop

What is edge cloud?

An edge cloud architecture is used to decentralise (processing) power to the edges (clients/devices) of your networks.

Placeholder for Close up fibre optic cablesClose up fibre optic cables

What is white box switching?

A white box switch or white label switch is a network switch that is assembled from standardised commodity parts.

Placeholder for Engineer focused behind laptopEngineer focused behind laptop

What is Zero-Trust architecture?

A Zero-Trust architecture is an architecture based on the principle that nothing can be trusted. Under this philosophy, no device, user or application attempting to interact with your architecture can be considered to be secure.

Placeholder for Suburban streets and housesSuburban streets and houses

Software-Defined Secure Networks (SDSN)

Software-Defined Secure Networks (SDSN) protects your business using real-time intelligence and machine learning.