Category Archives Enterprise

Financial services adopt comprehensive network security strategy for breach detection and remediation post-event. Being a senior network engineer charged with ensuring secure financial services to tens of thousands of customers can be a lot of pressure. However, a more robust security strategy including close alignment with security teams can help keep everything running smoothly. The […]

New Observer Apex offers faster loading speeds, connection dynamics functionality for packet visibility, on-demand application dependency mapping (ADM), improved widget editor for faster insights, VoIP service-level agreement assurance based on threshold monitoring, faster alarms, and more. On-Demand ADM On-demand ADM offers fast discovery of application interdependencies, building maps that visualize these complex relationships with simple […]

GDPR Myth Busting Image

Korrektur von drei Missverständnissen zur DSGVO Wir alle haben den ganzen Rummel miterlebt, die Presseberichte gelesen, E-Mails erhalten und an Webinaren teilgenommen, oder? Doch trotzdem gibt es mehrere Missverständnisse und Kommunikationspannen zur Datenschutz-Grundverordnung (DSGVO) der EU, die am 25. Mai 2018 in Kraft treten wird – ob Sie nun darauf vorbereitet sind oder nicht! Hier wollen wir […]

Security Forensics

Another day, another cyberattack. Just as companies were recovering after the WannaCry attack, a number of organizations were hit by Petya… or NotPetya. Name it as you see fit. In a matter of just two months, two devastating ransomware attacks have crippled networks globally. Clearly, security threats are multiplying in intensity and complexity. But what […]

Viavi announces programming for Cisco Live in Las Vegas to highlight network performance monitoring, and test and certification solutions. Held June 25-29 in Las Vegas, Cisco Live is the industry’s premier education and training event for IT, networking, and communications professionals. Leading network test, measurement, and assurance technology company Viavi Solutions will be there at booth 1119 to […]

GDPR Myth Busting Image

Busting Three GDPR Myths We’ve all heard the hype, read the articles, received the emails, sat on the webinars, right? But there are still several misunderstandings and miscommunication out there surrounding the EU General Data Privacy Regulations (GDPR) which will come into effect on 25 May 2018, whether you are ready for them, or not. […]

In the case of WannaCry and other exploits, capturing traffic in the core of the network with the ability to go back in time for several days is a best-of-breed solution for both security and network teams. The recent WannaCry exploit (WannaCrypt/WannaCrypt0r and variants) is ransomware that was leaked by the Shadow Brokers hacker group […]

Network security forensics offers insight for enterprises after WannaCry ransomware exploit. Security is a top concern for anyone running a network today. The recent WannaCry ransomware attack and other high-profile hacks have shined a new light on the fact that security strategies in the enterprise must constantly evolve to meet the challenges of new and […]

Effective preparation, including investment in network performance monitoring tools such as packet capture, delivers network security forensics capabilities that are ready when attacks occur. The three main phases of a network security stance today are prevention, detection, and remediation. A recent survey by ServiceNow of 300 Chief Information Security Officers (CISOs) investigates the state of […]

Close