An overview of security and networking definitions, cybersecurity concepts explained and more resources.
What is OT security?
OT security is the full stack of hardware and software being used to monitor, detect and control changes to devices, processes and events. OT security is commonly used to protect industrial systems and networks from attacks.
What is Zero Touch Provisioning?
Zero Touch Provisioning (ZTP) is a networking device feature that aims to deliver installation of a networking appliance without needing someone to configure the device locally.
What is CASB?
A Cloud Access Security Broker (CASB) protects cloud-hosted data and provides enterprise-class security controls so that organizations can incorporate SaaS and IaaS into their existing security architecture.
What is SamSam ransomware?
SamSam is ransomware that 'spies' for a long time after its initial infection, without being detected. It uses vulnerabilities to attack specific organisations.
Intrusion Detection Prevention (IDP and IPS)
IDS stands for Intrusion Detection System and IPS stands for Intrusion Prevention System. Together they form an Intrusion Detection Prevention System (IDP).
What is SD-WAN?
A software-defined wide area network (SD-WAN) is an approach to software-defined networking (SDN) technology being extended to wide area network (WAN) connections.
What is edge cloud?
An edge cloud architecture is used to decentralise (processing) power to the edges (clients/devices) of your networks.
What is white box switching?
A white box switch or white label switch is a network switch that is assembled from standardised commodity parts.
What is zero trust architecture?
A zero trust architecture is an architecture based on the principle that nothing can be trusted. Under this philosophy, no device, user or application attempting to interact with your architecture can be considered to be secure.
Software-Defined Secure Networks (SDSN)
Software-Defined Secure Networks (SDSN) protects your business using real-time intelligence and machine learning.
DDoS attack world map
An overview of the top daily DDoS attacks worldwide.
Interworking Function (IWF)
The Interworking Function (IWF) bridges 2G, 3G, 4G/LTE, Fixed and Wi-Fi network technologies.
GPRS Tunneling Protocol Proxy (GTP proxy)
GPRS Tunnelling Protocol (GTP) is a group of IP-based communications protocols used to carry general packet radio service (GPRS) within GSM, UMTS and LTE networks.
Diameter Signalling Controller (DSC)
A Diameter Signaling Controller (DSC) is a key element for managing and securing diameter signalling, a protocol used for control signalling in LTE networks and IP Multimedia Systems (IMS).
What is SDN?
Software-defined networking (SDN) is an approach to network virtualisation that seeks to optimise network resources and quickly adapt networks to changing business needs, applications, and traffic.
What is network automation?
Intelligently automate your core network with data-driven insights.