A highlight of the annual Global Network & Application Security Report is always the deep case studies. Each year, we work closely with a customer that has made the difficult, but admirable decision to shine a light on their experiences as a victim of a cyber-security attack. By sharing, these customers can help others prepare for what now is sadly an inevitable experience for many companies.read more
I recently spent time travelling internationally for work. During my trip in one of the countries, I caught a nasty bug. I won’t give you the details, but suffice to say I was not working at 100% physically and mentally. Of course, I spent a lot of time planning this trip, speaking at certain events, and meeting different teams and customers. I had to find a way to perform to meet everyone’s expectations. I had to identify the cause of my sub-par state and then find a solution to fix it which included hydration, vitamins, and medicine.read more
David Storch is a Product Manager and Principal Consultant at Atos and a featured guest blogger
According to the UK’s The Telegraph, ‘eight out of ten parents with children aged 14 or under say restricting their offspring’s use of gadgets is their preferred form of discipline because it stopped them from communicating with their friends. Youngsters saw having their tablets and phones taken away as the worst method of punishment.’read more
After all the meetings have finished, the jamon has been eaten, Rioja has been drunk and all the world’s Mobile Carriers have returned from Barcelona, what have we learned? And does it fit with what we expected? As predicted, Mark Zuckerberg chided the industry for focusing too much on IoT connections (who would not open new Facebook accounts), but he also spoke about spending more to connect to people in the developing world (who would open new Facebook accounts).read more
Can you guess where a network breach first occurs?
When a CISO asked this question during a recent business trip my answer was simple: “Sure! In the first line of defense.” Trying to improve my chances, I quickly added, “You know what, it’s when employees share on social networks and unintentionally provide puzzle pieces to potential perpetrators.”
“No,” he said. “It happens in the CISO’s mind. At the very moment they feel secure enough…”read more
In today’s virtualized world, organizations are looking for a single pane of glass – for visibility to user, application and network health, real-time status and performance data that is relevant. Why is this important? And how does this tie into orchestration and automation?
When provisioning applications and network infrastructure on-demand, particular attention is required when responses are slowing down, so proactive monitoring is critical. It’s important to know when an application is not meeting its SLA requirements or security attacks may be impacting application performance. AND it’s important to know these issues before they become a business disruption.read more
David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger.
Management is ultimately responsible for the security of an organization. At each level, the appropriate manager decides which of the precious dollars, assets, and personnel under his or her control should be allocated for each aspect of the business, security being one of the many competing functions.read more
Big-bandwidth applications are the tools your customers rely on to get things done. They don’t have time to wait through the typical six months of lead time needed for you to roll out new services on your traditional network built with proprietary “big iron” hardware.
The good news is that most carriers have begun the process of testing Network Function Virtualization (NFV) as a way to make network and service provisioning faster, more flexible and ultimately more profitable.read more