How to protect your video conferences from hackersAugust 5, 2020 | Austin Herrington | 3 min read As companies across the U.S. embrace remote working solutions in response to COVID-19, video-teleconferencing (VTC) platforms are now the virtual office must-have. These tools allow face-to-face video conferences between users in different cities, states, countries,...
4 Ways to Improve WAN SecurityNovember 5, 2019 | Mike Frane With global spending on cyber security estimated to reach $10 billion by 20271, cybersecurity has arguably become one of the most important corporate initiatives. The wide area network (WAN) is one of the most common...
13 Frightening Impacts of Network OutagesOctober 22, 2019 | Windstream Enterprise This is a test excerpt
How to protect your video conferences from hackersAugust 5, 2020 | Austin Herrington As companies across the U.S. embrace remote working solutions in response to COVID-19, video-teleconferencing (VTC) platforms are now the virtual office must-have. These tools allow face-to-face video conferences between users in different cities, states, countries,...
4 Ways to Improve WAN SecurityNovember 5, 2019 | Mike Frane With global spending on cyber security estimated to reach $10 billion by 20271, cybersecurity has arguably become one of the most important corporate initiatives. The wide area network (WAN) is one of the most common...
13 Frightening Impacts of Network OutagesOctober 22, 2019 | Windstream Enterprise This is a test excerpt
DDoS Attacks: On the Rise and Growing in SophisticationOctober 10, 2019 | Windstream Enterprise In a one-week span in September 2019 alone, distributed denial-of-service, DDoS, attacks took down a popular gaming service and one of the world’s most visited websites. Botmasters faced justice in court, and protesters in Hong...
Protecting Your Business from Crimes of OpportunityJune 10, 2019 | Trent Pham Security events occur frequently but may not capture our attention unless they are more spectacular than the last, like Marriott’s data breach of half a billion records. We’ve all forgotten by now the personal identifiable information...
How Businesses Gain from Integrating SD-WAN and SecurityApril 17, 2019 | Mike Frane SD-WAN (software-defined wide area network) and security technologies are convergently evolving—responding to the needs of the market while stimulating new demand through innovation. SD-WAN and security capabilities are being integrated in platforms both on-premises and...
Security Information and Event Management (SIEM): What it is and Why You Need itFebruary 18, 2019 | Jungbo Hong These days, enterprise IT environments are becoming more complex due to the variety of systems in play – for example, a firewall device for security, active directory for user authentication, servers for applications, network devices...
6 Must-Have Security Tools for IT LeadersFebruary 2, 2019 | Tony Spurlin Securing an enterprise network is an ever-growing task due to twin increases in network complexity and hacker sophistication. The good news: The security industry is doing a fantastic job of creating new tools to help...
Mitigating DDoS Threats on Your Own TermsDecember 6, 2018 | Trent Pham Insurance is that product we all buy but hope we never use. Of course, paying for something you don’t use can create a dilemma. Let’s say your company offers an optional dental plan. By opting-out,...
4 Essential SD-WAN Security DefensesOctober 16, 2018 | Trent Pham SD-WAN’s growing popularity stems from the advantages it offers by moving key business functions to the cloud: simplified management, increased efficiency and resiliency, improved scalability, and significantly lower costs. It’s little wonder that SD‑WAN growth...