A New Way to Implement Data Center Security.

| May 28, 2015

article image
You've secured the perimeter of your data center, but what about threats that infiltrate the network, lie dormant, and then attack? See how micro-segmentation works secures from the inside.

Spotlight

XAPT Corporation

Understanding your business is the most important element to all engagements. XAPT success is built on that principle. Items such as Change Management, Process Re-Engineering and Strategic Business Reporting are some of the most important elements of all implementations. These elements are to ensure your business maintains optimal efficiency and profitability while your transition to your new ERP or CRM system.

OTHER ARTICLES

We Need to Talk About ‘Cloud Neutrality’

Article | February 10, 2020

We spent a lot of years talking about net neutrality the idea that the companies that provide access to the internet shouldn’t unfairly block, slow down, or otherwise interfere with traffic even if that traffic competes with their services. But there’s an even bigger issue brewing, and it’s time to start talking about it: cloud neutrality. “While its name sounds soft and fluffy,” Microsoft president and general counsel Brad Smith and coauthor Carol Ann Browne write in their recent book, Tools and Weapons: The Promise and the Peril of the Digital Age, “in truth the cloud is a fortress.” Their introduction describes the modern marvel of the data center: a 2 million-square-foot, climate-controlled facility made up of colossal electrical generators, diesel fuel tanks, battery arrays, and bulletproof doors

Read More

Do you need a data hosting service?

Article | April 2, 2020

Collecting data, processing it and finally culling it to fuel your business decisions is imperative at a day and age where technology is omnipresent. And hence, the next obvious question that every business needs to ask is, ‘where are we storing our data?’ Even though many of us have never even set foot into a data center, as citizens of a connected, data-driven world, we are highly dependent on data center services - the same way we rely on efficient water supply, transport infrastructure, and electrical grids.

Read More

Why we need more 5G cyberhacks

Article | February 24, 2020

How secure are 5G networks? That question should be on the lips of every network operator (and their customers) as the next generation of mobile broadband technology is rolled out across the world. While the industry is likely to find out the hard way, there are steps that can be taken to head off potential trouble. One such step is for network technology vendors to open up their systems to ethical hackers to see what happens (a scenario that doesn't happen nearly enough in the industry across all types of network technology). So it was encouraging to see a recent report on what was the world's first 5G cyber hackathon, which was held last November in Oulu, Finland. It was particularly encouraging to see that two of the radio access network market's leaders, Ericsson and Nokia, participated, as more than 80 ethical hackers got stuck into 5G New Radio, non-standalone (NSA) core and 5G fixed wireless access systems to see what vulnerabilities they could uncover.

Read More

The world is ready for 5G. Are you?

Article | June 3, 2021

At last, the wait for 5G is nearly over. As this map shows, coverage is widespread across much of the U.S., in 24 EU countries, and in pockets around the globe. The new wireless standard is worth the wait. Compared to 4G, the new wireless standard can move more data from the edge, with less latency. And connect many more users and devices—an important development given that the IDC estimates 152,000 new Internet of Things (IoT) devices per minute by 2025. Put it together, and 5G is a game-changing backhaul for public networks. (Wi-Fi 6, often mentioned in the same breath as 5G, is generally used for private WANs.

Read More

Spotlight

XAPT Corporation

Understanding your business is the most important element to all engagements. XAPT success is built on that principle. Items such as Change Management, Process Re-Engineering and Strategic Business Reporting are some of the most important elements of all implementations. These elements are to ensure your business maintains optimal efficiency and profitability while your transition to your new ERP or CRM system.

Events