In today’s evermore networked society, data protection is a serious business. Security breaches lead to unwanted headlines and a loss of trust in enterprise organizations (such as banks or healthcare providers). Data security and keeping ahead of potential attackers, is a rapidly evolving field of development. Potential areas may involve safeguarding modern cloud computing environments or protecting commercial activities over the web ...
Read the full post
As engineers at a global company with competition around every corner, we believe that continuous innovation is the key to competitive differentiation. But innovation is an elusive thing and doesn’t appear on demand. The popular image we have when we think of innovation is that of the lone engineer having a light-bulb moment. Sometimes it does happen that way, but true light-bulb moments are unpredictable and can be few and far between ...
Read the full post
One of the biggest challenges the enterprise faces with the advent of big data and the internet of things is what to do about the network edge. Emerging data patterns require an edge that is not only distributed across a wide area, largely on third-party infrastructure that is beyond the direct control of IT, but one that can handle a much broader set of responsibilities than traditional security and access ...
Read the full post
Adoption of cloud computing has rapidly evolved from an emerging technology to an established networking solution. With each year, enterprise and government organizations place more and more of their mission-critical workloads into the cloud, while consumers benefit for the ubiquitous access to content and services, anywhere, anytime and on any device ...
Read the full post
NETCONF Call Home, or reverse secure socket shell (SSH), is a technique that enables network functions virtualization (NFV) and software-defined networking (SDN) devices to establish a connection to a service provider control systems and protects the virtual customer premises equipment (vCPE), usually deployed behind a cable modem or a firewall ...
Read the full post