Friday 27 October 2017

Creating Capacity for Innovation

Large organizations have a challenge that start-ups don’t have. They have unintended complexity, duplication, old processes, and work that exists simply because it has always been done that way. Most executives of large organizations know they need to embrace Digital Transformation, but they don’t know where to begin. They have operational commitments and responsibilities to stakeholders or shareholders, and no excess operational expense to invest in innovation.

Thursday 26 October 2017

Securing the Campus

From student data and intellectual property, to reputation and grant funding…higher education institutions are at risk if cybersecurity is not a foundational element in their operations.

This fall, more than 20 million students returned to their college or university. Each student will walk on campus with at least three personal connected devices. At a university with roughly 40,000 students – that’s around 121,000 devices, not including all the sensors and devices across the campus that are school property. That’s 121,000+ opportunities for a security breach.

Wednesday 25 October 2017

Cisco Traffic Analysis & Encrypted Threat Analytics

Today, knowing who is using your network is table stakes. Knowing what users are consuming on the network is essential for analysis. What applications are being used, when they are used and most importantly are those applications are safe enough and compliant with your organization policies.

Independent testing company Miercom recently carried out comprehensive set of tests to evaluate traffic analysis capabilities of Cisco’s Digital Network Architecture & Huawei’s Agile Solution along with few other test areas.

Tuesday 24 October 2017

Secure, High Availability for Epic EHR Systems with Cisco ACI and Tetration

Since its initial release, Cisco Application Centric Infrastructure (ACI) has been selected and deployed by many healthcare institutions around the globe.  ACI is the foundation for achieving these customer’s next generation application requirements for their complex environments and applications.

Monday 23 October 2017

Architecting a More Secure Future

The new age of innovation is providing a level of convenience and technological advancements that were once unfathomable. But with every breakthrough comes challenges, and more precisely these days, security challenges. We, in the security industry, are constantly faced with new threats emerging from vectors that didn’t even exist yesterday.

Wednesday 18 October 2017

Working Wherever: Digital Safety Beyond the Company Walls

Imagine you’re a business traveler at the airport with a little time to spare before your flight. You fire up your laptop, access the airport’s free wi-fi, log on to your bank account, and pay your credit card bill to free up credit for your trip. Efficient use of time, right? Well, also imagine that you chose the wi-fi access point that looked most likely to be the free airport network from the several options that popped up in your connector – except it’s not. It’s actually a look-alike set up by a hacker, who is now tracking your banking and credit card information, because you’re logged on to his network. Not so efficient, or safe.

Monday 16 October 2017

The Advantage of Remote PHY

In a recently published white paper, The TCO Advantage of Remote PHY, we compare the CAPEX and OPEX of a Remote PHY deployment with an Integrated CCAP/HFC deployment. A next-generation Distributed Access Architecture (DAA), Remote PHY moves access hardware from the headend to smaller hub sites or into the plant, providing cable operators with a number of benefits including a reduced footprint, lower operational costs and bandwidth growth.