Articles in Networking

Avaya Article Thumbnail

Reducing the Risks of Distributed Denial of Service Attacks

  • Ed Koehler
  • March 22, 2017 | Estimated reading time: 4 minutes to read
  • Picture what may just be one of the scariest scenarios in your career: The network has slowed to a crawl. You can barely hold a…
Avaya Article Thumbnail

Next-Generation IT: What Does It Really Look Like?

  • Jean Turgeon
  • March 20, 2017 | Estimated reading time: 5 minutes to read
  • From mainframes to virtualization to the IoT, we’ve come a long way in a very short amount of time in terms of networking, OS and…
Avaya Article Thumbnail

How to (Finally) Break the Longstanding Hold of Legacy Technology

  • Jean Turgeon
  • March 14, 2017 | Estimated reading time: 8 minutes to read
  • Without question, we’ve seen more technological innovation in the last 30 years than we have in the last century. We now live in a reality…
Avaya Article Thumbnail

APTs Part 4: How Do You Detect an Advanced Persistent Threat in Your Network?

  • Ed Koehler
  • February 15, 2017 | Estimated reading time: 4 minutes to read
  • Here in part four of my APT series, we’re looking at how to detect Advanced Persistent Threats in your network. The key is to know…
Avaya Article Thumbnail

APTs Part 3: Prevention is Ideal, But Detection is a Must

  • Ed Koehler
  • February 8, 2017 | Estimated reading time: 4 minutes to read
  • In my last blog I spoke about the first steps in the kill chain. Now that the Advanced Persistent Threat (APT) has gained residence, it’s…
Avaya Article Thumbnail

APTs Part 2: How the Advanced Persistent Threat Works

  • Ed Koehler
  • February 1, 2017 | Estimated reading time: 4 minutes to read
  • In my last blog I introduced the concept of Advanced Persistent Threats (APT) and provided some background on what these groups are about. APTs want…
Avaya Article Thumbnail

APTs Part 1: Protection Against Advanced Persistent Threats to Your Data

  • Ed Koehler
  • January 10, 2017 | Estimated reading time: 4 minutes to read
  • Hardly a day goes by without hearing about a data breach somewhere in the world. So it’s timely that we launch this new blog series…
Avaya Article Thumbnail

Hoteliers: Your Best Laid Plans Will Go Awry Without Strong Wi-Fi

  • Robert K. Mitton
  • January 6, 2017 | Estimated reading time: 5 minutes to read
  • In today’s smart, digital world, the average guest experience isn’t so average anymore. Traditional room service, for example, is being replaced by in-room kiosks that…
Avaya Article Thumbnail

Data Protection Part 3: Where Does Encryption fit into Data Protection?

  • Greg Deffenbaugh
  • January 4, 2017 | Estimated reading time: 10 minutes to read
  • I’ve mentioned that the SNIA SDC Conference provided the catalyst for writing this blog series on data protection. (See part 1 and part 2.) While…
Avaya Article Thumbnail

Data Protection Part 2: What About Unauthorized Data Access?

  • Greg Deffenbaugh
  • December 16, 2016 | Estimated reading time: 7 minutes to read
  • In part 1, we explored the physical loss of data, meaning the data is no longer available for access (intelligently) by anyone. There’s another, perhaps…
Avaya Article Thumbnail

Data Protection Part 1: What Does it Mean to Lose Data?

  • Greg Deffenbaugh
  • December 12, 2016 | Estimated reading time: 5 minutes to read
  • I recently attended the Storage Networking Industry Association (SNIA) Storage Developer Conference (SDC). It was very much a going-home event. I hadn’t thought about locks…
Avaya Article Thumbnail

Avaya Demos Wireless Location Based Services at Avaya ENGAGESM Dubai

  • Greg Deffenbaugh
  • December 9, 2016 | Estimated reading time: 5 minutes to read
  • Wireless Location Based Services (WLBS) are usually discussed in the areas of customer or guest engagement. However, there are also valuable use cases in the…
Avaya Article Thumbnail

Avoid Security Theater When Safeguarding Your Network

  • Paul Unbehagen
  • November 16, 2016 | Estimated reading time: 3 minutes to read
  • I have recently been in several meetings where I have been asked to provide advice on network and security designs. Many of the conversations revolved…
Avaya Article Thumbnail

Aiming Towards an Unfettered and Secure IoT

  • Randy Cross
  • November 8, 2016 | Estimated reading time: 6 minutes to read
  • Last week, we heard bold claims by a networking vendor that they could make the Internet of Things (IoT) safe because they “own” the network.…
Avaya Article Thumbnail

Time for a New Network Engine: Start Running on a Software-Defined Network

  • Greg Deffenbaugh
  • November 3, 2016 | Estimated reading time: 6 minutes to read
  • I grew up on a wheat farm in the 70s. I spent much of my teens and early 20s working on farm machinery, before starting…