53 Articles Tagged security

Avaya Article Thumbnail

APTs Part 4: How Do You Detect an Advanced Persistent Threat in Your Network?

  • Ed Koehler
  • February 15, 2017 | Estimated reading time: 4 minutes to read
  • Here in part four of my APT series, we’re looking at how to detect Advanced Persistent Threats in your network. The key is to know…
Avaya Article Thumbnail

APTs Part 3: Prevention is Ideal, But Detection is a Must

  • Ed Koehler
  • February 8, 2017 | Estimated reading time: 4 minutes to read
  • In my last blog I spoke about the first steps in the kill chain. Now that the Advanced Persistent Threat (APT) has gained residence, it’s…
Avaya Article Thumbnail

APTs Part 2: How the Advanced Persistent Threat Works

  • Ed Koehler
  • February 1, 2017 | Estimated reading time: 4 minutes to read
  • In my last blog I introduced the concept of Advanced Persistent Threats (APT) and provided some background on what these groups are about. APTs want…
Avaya Article Thumbnail

The IoT Chronicles Part 4: Predictions for 2017 and Beyond

  • Jean Turgeon
  • January 5, 2017 | Estimated reading time: 5 minutes to read
  • 2016 certainly didn’t come up short in terms of tech innovation. From genetically engineered immune cells that can control long-term HIV to plant gene editing…
Avaya Article Thumbnail

The IoT Chronicles Part 3: Security Regulation

  • Jean Turgeon
  • December 19, 2016 | Estimated reading time: 6 minutes to read
  • There’s no denying the transformative power of the IoT (whether or not you’ve read this IoT Chronicles blog series.) Practically every object imaginable today has…
Avaya Article Thumbnail

The IoT Chronicles Part 2: Three Big Security Threats—and How to Solve Them

  • Jean Turgeon
  • November 28, 2016 | Estimated reading time: 6 minutes to read
  • With projected market revenue of $1.7 trillion by 2020, the Internet of Things (IoT) stands to forever change the world as we know it. In…
Avaya Article Thumbnail

Verbio Brings Voice Biometrics to Avaya Breeze™

  • Jon Alperin
  • November 8, 2016 | Estimated reading time: 2 minutes to read
  • If you’ve been following the Avaya Connected Blog in recent weeks, hopefully you’ve read about the changes Avaya expects to see in Customer Engagement as…
Avaya Article Thumbnail

Time for a New Network Engine: Start Running on a Software-Defined Network

  • Greg Deffenbaugh
  • November 3, 2016 | Estimated reading time: 6 minutes to read
  • I grew up on a wheat farm in the 70s. I spent much of my teens and early 20s working on farm machinery, before starting…
Avaya Article Thumbnail

Security and the IoT: Where to Start, How to Solve

  • Fab Fiori
  • November 2, 2016 | Estimated reading time: 6 minutes to read
  • I recently attended the 2016 North America IoT Tech Expo in Santa Clara, California. This event highlights how the most innovative advancements in technology are…
Avaya Article Thumbnail

How Wi-Fi Location-Based Services Can Step Up Your Public Safety Game

  • Greg Deffenbaugh
  • October 27, 2016 | Estimated reading time: 6 minutes to read
  • My first job out of college was working on Sonar Systems for the U.S. Navy. Modern sonar systems passively listen in the ocean to identify…
Avaya Article Thumbnail

As Consumer Tech Remakes the Workplace, a Thoughtful Security Strategy Is the Best Defense

  • Adrian Brookes
  • October 26, 2016 | Estimated reading time: 5 minutes to read
  • I think we’d all agree the business landscape has changed dramatically over the past two decades. Think back to the last time you wrote a…
Avaya Article Thumbnail

An Exploration of End-to-End Network Segmentation Part III: Automatic Elasticity

  • Jean Turgeon
  • October 19, 2016 | Estimated reading time: 4 minutes to read
  • Imagine for a moment: you’re connected to a network via a piece of string. You perform your work, you wind down for the day and…
Avaya Article Thumbnail

Changing the Lagging Face of Public Safety with Smart Networking Solutions (Part 4)

  • Fab Fiori
  • October 13, 2016 | Estimated reading time: 6 minutes to read
  • In part I of this series, Avaya Vice President and Chief Technologist for Software-Defined Architecture Jean Turgeon opened up a much-needed conversation about the current…
Avaya Article Thumbnail

An Exploration of End-to-End Network Segmentation—Part II: Native Stealth

  • Jean Turgeon
  • October 12, 2016 | Estimated reading time: 4 minutes to read
  • As I’ve said before, no one provider can completely eliminate network security risks. There is, however, a proven way to reduce risk and network exposure:…
Avaya Article Thumbnail

How to Make the Most of IoT While Minimizing Security Risks

  • Jean Turgeon
  • October 6, 2016 | Estimated reading time: 2 minutes to read
  • I was in London yesterday for IP Expo 2016. I had the pleasure of speaking with many customers and presenting a keynote about the security…
Avaya Article Thumbnail

An Exploration of End-to-End Network Segmentation—Part I: Hyper-Segmentation

  • Jean Turgeon
  • October 5, 2016 | Estimated reading time: 9 minutes to read
  • More than 90% of businesses say they have some sort of cybersecurity framework in place, but here’s the truth: a network security strategy will never…