The End of the Beginning...
  • Published in

The End of the Beginning... Earlier this week, AT&T made an exciting announcement about their Network on Demand platform. They are enhancing it with Juniper’s NFV/virtualization technologies and deploying vCPE (Virtual Customer Premises Equipment), a solution that will help them meet the heightened demands of their customers and automate service creation at scale. Copyright © 1996-2013 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences                    

Read More
Network Security: It’s a Zero-Sum Game
  • Published in

Network Security: It’s a Zero-Sum Game Make sure you win it with Juniper’s new network security solutions.   Cybercriminals. They’re inside your network perimeter. Already.   Read about Junipers security innovations within the newly announced Juniper Unite architecture. Copyright © 1996-2013 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences                    

Read More
Eight Ways to Heighten Cybersecurity
  • Published in

Eight Ways to Heighten Cybersecurity As our world has become ever more connected, we’ve all learned common online safety tips. It’s now second nature to use strong passwords and antivirus software; take care when connecting to public Wi-Fi; and remain alert to social engineering scams (e.g., phishing). Copyright © 1996-2013 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences                    

Read More
Extending Operational Intelligence for GigaSECURE with Gigamon Visibility App for Splunk
  • Published in

Next generation business infrastructures and their IT operations teams rely on a variety of tools to analyze wire and traffic data for security, application, and network performance monitoring. But what is the glue that ties these tools together? How can the SecOps or NetOps teams gain full operational visibility? Specialized solutions like Splunk, are deployed […] The post Extending Operational Intelligence for GigaSECURE with Gigamon Visibility App for Splunk appeared first on Gigamon Blog.

Read More
Securing the Promise of SDDC Micro-segmentation

SDDCs promise to dramatically increase the security of data centers using NSX micro-segmentation allows you to take advantage of granular security today with design choices that maximize your visibility and give you operational scale. The Evolution and the Promise Data center design has been in the midst of revolutionary changes for the last decade. By […] The post Securing the Promise of SDDC Micro-segmentation appeared first on Gigamon Blog.

Read More
Rethink of Security Architecture Means Opportunity for Channel Partners

The massive data breaches that are dominating headlines nearly daily are forcing a reimagining of security architecture. Most organizations have accepted that existing network protection methods at the perimeter are being evaded and are looking to beef up their insider threat detection capabilities with the latest technologies. This creates an opportunity for channel partners to […] The post Rethink of Security Architecture Means Opportunity for Channel Partners appeared first on Gigamon Blog.

Read More

Videos

Andrew Hollister, CISO at LogRhythm, discusses the findings of the company’s recent report, produced in association with Ponemon Institute – covering the current threat landscape, the need for clear communications between the CISO and the CEO/board level executives, and the importance of using a security framework to help build an optimised, end-to-end and resilient cybersecurity infrastructure.
Leon Ward, VP of Product Management, ThreatQuotient, shares some early findings of the company’s ‘The State of Cybersecurity Automation 2022’ research report, which finds a dramatic increase in security automation activity, as well as highlighting the importance of managing expectations when it comes to implementation versus outcomes.
Brad Ascar, Principle Product Manager – Kubernetes ecosystem at Redis - cuts through the hype surrounding containers to explain the many benefits they offer. The importance of education and training, optimised orchestration and how to get started with containers and Kubernetes are all covered.
Interview with Liz Parnell, Chief Operating Officer, EMEA, at Rackspace Technology. Women working in the IT industry share their experiences – covering the opportunities they have had, the challenges they have had to overcome during their careers to date, and offering plenty of constructive thoughts and observations as to what improvements still need to be made when it comes to improving diversity within the workplace.

News

Front-end developer salaries rise by as much as 40% in London, but skills shortages continue to bite as organizations struggle to attract digital talent.
ABB power solutions support one of Shanghai’s largest data centres, used by Tencent and China Telecom.
Panzura has launched a new comprehensive data management solution for customers that work in sensitive data environments, such as public sector, healthcare, and financial services. Because the service makes both the snapshots and the data immutable, ransomware attacks can’t damage files in the Panzura global file system. Instead, attacks are shrugged off by quickly reverting to seconds-old data blocks to reassemble uninfected files. Through a new strategic agreement, this new solution, as well as all of Panzura’s other workloads, will run on Amazon Web Services (AWS).
The new offering leverages Wipro’s recent acquisitions in the consulting space and brings clients an end-to-end solution at a time of heightened cyber risks.