Wednesday, 28 February 2018

Helping SMBs Compete on a Level (Wireless) Playing Field

It can be tough for small and medium-sized businesses (SMB). They need to compete with the deep pockets of bigger organizations who can provide top-notch wireless access to customers, vendors and employees alike. But finding cutting-edge wireless network solutions that won’t break the bank, are easy-to-deploy and don’t...

Monday, 26 February 2018

Cisco Crosswork Network Automation: The Industry’s Most Comprehensive Closed-Loop Automation Solution

Cisco announced its latest innovation – Cisco Crosswork Network Automation – a new network automation portfolio for Service Providers.  We are very excited about creating the industry’s most comprehensive closed-loop, mass-scale automation solution that embraces multi-vendor networks.  We are more excited about the transformations we are seeing inside...

Sunday, 25 February 2018

Serverless & Developing Applications Using Multiple Cloud Providers

I’ve been into serverless technologies for a few years now. The thought of not having to care about what platform my code is executing on, or having to manage and operate it, resonated with my developer side that just wants to code. I also saw it as a...

Friday, 23 February 2018

Security Threats – The New Reality for Utilities

Security experts agree: Cyberattacks are the new reality for utility companies. A major power outage hits the Consumer Electronics Show (CES), Las Vegas. For nearly two hours, participants were reminded that without electricity, the digital economy would not survive very well. In 2016, 3.85 trillion kilowatthours (kWh) [EIA]...

Wednesday, 21 February 2018

How to Overcome Privacy Program Stumbling Blocks

Our Security Services team works with customers to navigate these waters. who is a lead consultant in our Privacy and Data Protection Services practice.  According to Steve, there are a few key areas where organizations can stumble: ◈ New dimensions of data access management ◈ Transparency ◈ Traceability...

Monday, 19 February 2018

Manufacturing mobility: Data, voice, video, and location

Manufacturers use wireless to increase margins, reduce cycle times, enable lean, and improve equipment productivity. While pervasive wireless connects sensors, tools, robots, AGVs, and RFID devices, it also enables mobility. Mobility supports far more than just cell phones, tablets, and laptops. Very simply put, mobility drives data, voice,...

Friday, 16 February 2018

DevSecOps: Security at the Speed of Business

We will describe another key aspect of DevSecOps – developing security guardrails with a hands-on approach via Agile hackathons. DevSecOps is about bridging DevOps workflows with Information Security (Infosec) Operations by embedding security as code during development, validation during testing and leveraging automation to run continuous operations. From...

Wednesday, 14 February 2018

Continuous Integration and Deployment for the Network

The requisite for Continuous Integration and Deployment (CI/CD) pipeline being used in the network is growing. Continuous Integration and deployment helps counteract inaccuracies in daily network deployments and changes, hence is critically required. The upshot for change release and automated network testing is that changes are simplified, done...

Monday, 12 February 2018

Five things that are bigger than the Internet: Findings from this year’s Global Cloud Index

The scale of the Internet is awe-inspiring. By 2021, there will be 4.6 billion people and 27 billion devices connected to the Internet, and Internet traffic will reach 2.8 trillion Gigabytes (or 2.8 Zettabytes) per year. Even with multiple Zettabytes crossing the network each year, there are some...

Friday, 9 February 2018

Better design for simpler, more effective security

Few will contest the notion that security is complex. Evolving threats.  Clever, motivated attackers.   And all too often, vendor-inflicted complexity of managing security from the mismatched consoles from dozens of vendors. In this case, not only must users jump between consoles but the actions that become familiar in...

Wednesday, 7 February 2018

Secure by Design: Enhanced Interfaces Improve Email Security and Malware Analysis

In the infosec world, it’s well established that time is a precious commodity. Time to detection and time to resolution are critical concepts that can mean the difference between a minor incident and making the news. In order to be effective, security teams need to be able to...

Sunday, 4 February 2018

Cisco Container Platform – Kubernetes for the Enterprise

Developed by Google to shepherd their in-house container clusters, Kubernetes has been vying for the attention and adoption of cloud architects. For the past several years, Docker Swarm, Mesos and Kubernetes have engaged in the duel to bring orchestration nirvana to containerized applications. While there are other participants...

Friday, 2 February 2018

Network Visibility for Mergers and Acquisitions

Mergers and acquisitions bring major challenges to nearly every aspect of a business, but integrating two different networks while maintaining enterprise security is perhaps one of the most demanding trials an organization can undergo. Every organization has their own security policies, and applying new ones to hundreds or...

Pages (26)1234567 »