9 Articles Tagged native stealth

Avaya Article Thumbnail

Time for a New Network Engine: Start Running on a Software-Defined Network

  • Greg Deffenbaugh
  • November 3, 2016 | 6 minutes to read
  • I grew up on a wheat farm in the 70s. I spent much of my teens and early 20s working on farm machinery, before starting…
Avaya Article Thumbnail

Security and the IoT: Where to Start, How to Solve

  • Fab Fiori
  • November 2, 2016 | 6 minutes to read
  • I recently attended the 2016 North America IoT Tech Expo in Santa Clara, California. This event highlights how the most innovative advancements in technology are…
Avaya Article Thumbnail

How Wi-Fi Location-Based Services Can Step Up Your Public Safety Game

  • Greg Deffenbaugh
  • October 27, 2016 | 6 minutes to read
  • My first job out of college was working on Sonar Systems for the U.S. Navy. Modern sonar systems passively listen in the ocean to identify…
Avaya Article Thumbnail

As Consumer Tech Remakes the Workplace, a Thoughtful Security Strategy Is the Best Defense

  • Adrian Brookes
  • October 26, 2016 | 5 minutes to read
  • I think we’d all agree the business landscape has changed dramatically over the past two decades. Think back to the last time you wrote a…
Avaya Article Thumbnail

An Exploration of End-to-End Network Segmentation Part III: Automatic Elasticity

  • Jean Turgeon
  • October 19, 2016 | 4 minutes to read
  • Imagine for a moment: you’re connected to a network via a piece of string. You perform your work, you wind down for the day and…
Avaya Article Thumbnail

Changing the Lagging Face of Public Safety with Smart Networking Solutions (Part 4)

  • Fab Fiori
  • October 13, 2016 | 6 minutes to read
  • In part I of this series, Avaya Vice President and Chief Technologist for Software-Defined Architecture Jean Turgeon opened up a much-needed conversation about the current…
Avaya Article Thumbnail

An Exploration of End-to-End Network Segmentation—Part II: Native Stealth

  • Jean Turgeon
  • October 12, 2016 | 4 minutes to read
  • As I’ve said before, no one provider can completely eliminate network security risks. There is, however, a proven way to reduce risk and network exposure:…
Avaya Article Thumbnail

How to Make the Most of IoT While Minimizing Security Risks

  • Jean Turgeon
  • October 6, 2016 | 2 minutes to read
  • I was in London yesterday for IP Expo 2016. I had the pleasure of speaking with many customers and presenting a keynote about the security…
Avaya Article Thumbnail

An Exploration of End-to-End Network Segmentation—Part I: Hyper-Segmentation

  • Jean Turgeon
  • October 5, 2016 | 9 minutes to read
  • More than 90% of businesses say they have some sort of cybersecurity framework in place, but here’s the truth: a network security strategy will never…