Articles in Networking

Avaya Article Thumbnail

APTs Part 4: How Do You Detect an Advanced Persistent Threat in Your Network?

  • Ed Koehler
  • February 15, 2017 | Estimated reading time: 4 minutes to read
  • Here in part four of my APT series, we’re looking at how to detect Advanced Persistent Threats in your network. The key is to know…
Avaya Article Thumbnail

APTs Part 3: Prevention is Ideal, But Detection is a Must

  • Ed Koehler
  • February 8, 2017 | Estimated reading time: 4 minutes to read
  • In my last blog I spoke about the first steps in the kill chain. Now that the Advanced Persistent Threat (APT) has gained residence, it’s…
Avaya Article Thumbnail

APTs Part 2: How the Advanced Persistent Threat Works

  • Ed Koehler
  • February 1, 2017 | Estimated reading time: 4 minutes to read
  • In my last blog I introduced the concept of Advanced Persistent Threats (APT) and provided some background on what these groups are about. APTs want…
Avaya Article Thumbnail

APTs Part 1: Protection Against Advanced Persistent Threats to Your Data

  • Ed Koehler
  • January 10, 2017 | Estimated reading time: 4 minutes to read
  • Hardly a day goes by without hearing about a data breach somewhere in the world. So it’s timely that we launch this new blog series…
Avaya Article Thumbnail

Hoteliers: Your Best Laid Plans Will Go Awry Without Strong Wi-Fi

  • Robert K. Mitton
  • January 6, 2017 | Estimated reading time: 5 minutes to read
  • In today’s smart, digital world, the average guest experience isn’t so average anymore. Traditional room service, for example, is being replaced by in-room kiosks that…
Avaya Article Thumbnail

Data Protection Part 3: Where Does Encryption fit into Data Protection?

  • Greg Deffenbaugh
  • January 4, 2017 | Estimated reading time: 10 minutes to read
  • I’ve mentioned that the SNIA SDC Conference provided the catalyst for writing this blog series on data protection. (See part 1 and part 2.) While…
Avaya Article Thumbnail

Data Protection Part 2: What About Unauthorized Data Access?

  • Greg Deffenbaugh
  • December 16, 2016 | Estimated reading time: 7 minutes to read
  • In part 1, we explored the physical loss of data, meaning the data is no longer available for access (intelligently) by anyone. There’s another, perhaps…
Avaya Article Thumbnail

Data Protection Part 1: What Does it Mean to Lose Data?

  • Greg Deffenbaugh
  • December 12, 2016 | Estimated reading time: 5 minutes to read
  • I recently attended the Storage Networking Industry Association (SNIA) Storage Developer Conference (SDC). It was very much a going-home event. I hadn’t thought about locks…
Avaya Article Thumbnail

Avaya Demos Wireless Location Based Services at Avaya ENGAGESM Dubai

  • Greg Deffenbaugh
  • December 9, 2016 | Estimated reading time: 5 minutes to read
  • Wireless Location Based Services (WLBS) are usually discussed in the areas of customer or guest engagement. However, there are also valuable use cases in the…
Avaya Article Thumbnail

Avoid Security Theater When Safeguarding Your Network

  • Paul Unbehagen
  • November 16, 2016 | Estimated reading time: 3 minutes to read
  • I have recently been in several meetings where I have been asked to provide advice on network and security designs. Many of the conversations revolved…
Avaya Article Thumbnail

Aiming Towards an Unfettered and Secure IoT

  • Randy Cross
  • November 8, 2016 | Estimated reading time: 6 minutes to read
  • Last week, we heard bold claims by a networking vendor that they could make the Internet of Things (IoT) safe because they “own” the network.…
Avaya Article Thumbnail

Time for a New Network Engine: Start Running on a Software-Defined Network

  • Greg Deffenbaugh
  • November 3, 2016 | Estimated reading time: 6 minutes to read
  • I grew up on a wheat farm in the 70s. I spent much of my teens and early 20s working on farm machinery, before starting…
Avaya Article Thumbnail

Security and the IoT: Where to Start, How to Solve

  • Fab Fiori
  • November 2, 2016 | Estimated reading time: 6 minutes to read
  • I recently attended the 2016 North America IoT Tech Expo in Santa Clara, California. This event highlights how the most innovative advancements in technology are…
Avaya Article Thumbnail

How Wi-Fi Location-Based Services Can Step Up Your Public Safety Game

  • Greg Deffenbaugh
  • October 27, 2016 | Estimated reading time: 6 minutes to read
  • My first job out of college was working on Sonar Systems for the U.S. Navy. Modern sonar systems passively listen in the ocean to identify…
Avaya Article Thumbnail

As Consumer Tech Remakes the Workplace, a Thoughtful Security Strategy Is the Best Defense

  • Adrian Brookes
  • October 26, 2016 | Estimated reading time: 5 minutes to read
  • I think we’d all agree the business landscape has changed dramatically over the past two decades. Think back to the last time you wrote a…