Ron Meyran

18 POSTS0 COMMENTS
Ron Meyran leads the marketing activities, partner strategy and Go-to-Market plans for Radware’s alliance and application partners. He also works to develop joint solutions that add value proposition and help drive sales initiatives – designed to increase visibility and lead generation. Mr. Meyran is a security and SDN industry expert who represents Radware at various industry events and training sessions. His thought leadership and opinion pieces have been widely published in leading IT & security industry magazines and he holds a B.Sc. degree in Electrical Engineering from Ben-Gurion University and a MBA from Tel Aviv University.

eCrime Congress in Germany: Restoring the Equilibrium of Attackers Vs. Defenders

Last week, I attended eCrime Congress in Frankfurt, Germany. Held on January 30,Radware was one of the sponsors of the event, which featured a...

Application Delivery Controllers (ADCs): The Last Physical Hurdle to the Software Defined Datacenter (SDDC)

Effectively a next generation load balancer, enterprises are deploying Application Delivery Controllers (ADCs) to front-end their mission critical applications. The enterprise ADC market is...

How Cloud Ready Are You? Download Radware’s Alteon VA Blueprint Directly from the VMWare Cloud Application Marketplace

Anyone intimately connected to the world of server virtualization and cloud computing is no stranger to the name VMware. From an early stage, Radware...

Think you are secured? Think again following Anonymous cyber-attacks against Panama government website

On Saturday February 11, 2012 Anonymous Group coordinated a DDoS attack against Panama government website www.presidencia.gob.pa. The site suffered initially from service disruption but...

DDoS Attack Myths: Does Size Really Matter?

Major DDoS attacks are often portrayed in the media using measurement terms like “a 10Gbps DDoS attack hit site X” or “an 8 Million...

The Hacking Eco-system: Fighting Cyber Attacks to Stay Profitable

Attacks and countermeasures typically focus on techniques, vulnerabilities, systems and tools.  There is another angle of the cat-and-mouse fight between attackers and victims --...

Fighting Cyber Attacks in Real Time with AMS

Most organizations that utilize network defense software have adopted a passive approach when attempting to stop cyber attacks.  That’s because most of the defense...

IPv6 Threats: What you should know before ramping up a new service layer

IPv6 was designed to solve the limited addressing space of IPv4 and includes built-in security features to provide authentication, data confidentiality and integrity. However,...