11 Articles Tagged automated elasticity

Benefits of Deploying the Avaya Surge™ Solution for Any IP Network | Avaya Blog

Benefits of Deploying the Avaya Surge™ Solution for Any IP Network

  • Greg Deffenbaugh
  • May 11, 2017 | Estimated reading time: 3 minutes to read
  • The Avaya Surge™ Solution is designed to work in an SDN Fx fabric environment. But many companies don’t have the luxury of deploying a full…
Avaya Surge™ Solution Makes Securing the IoT Easy for All Devices | Avaya Blog

Avaya Surge™ Solution Makes Securing the IoT Easy for All Devices

  • Greg Deffenbaugh
  • May 4, 2017 | Estimated reading time: 5 minutes to read
  • Let’s explore how you can manage thousands of IoT devices while protecting your network and data from unnecessary risk. Often, we think newer devices will…
Secure IoT Deployments with Avaya SDN Fx™ Architecture Solutions | Avaya Blog

Secure IoT Deployments with Avaya SDN Fx™ Architecture Solutions

  • Greg Deffenbaugh
  • April 25, 2017 | Estimated reading time: 6 minutes to read
  • Let’s look at how to deploy the IoT in a safe and sane manner—a top-of-mind business challenge. Before diving into the technology, let’s remember why…
Data Protection Part 3: Where Does Encryption fit into Data Protection?

Data Protection Part 3: Where Does Encryption fit into Data Protection?

  • Greg Deffenbaugh
  • January 4, 2017 | Estimated reading time: 10 minutes to read
  • I’ve mentioned that the SNIA SDC Conference provided the catalyst for writing this blog series on data protection. (See part 1 and part 2.) While…
Learn how data breaches can be prevented with Avaya’s network segmentation and security solutions.

Data Protection Part 2: What About Unauthorized Data Access?

  • Greg Deffenbaugh
  • December 16, 2016 | Estimated reading time: 7 minutes to read
  • In part 1, we explored the physical loss of data, meaning the data is no longer available for access (intelligently) by anyone. There’s another, perhaps…
Time for a New Network Engine: Start Running on a Software-Defined Network

Time for a New Network Engine: Start Running on a Software-Defined Network

  • Greg Deffenbaugh
  • November 3, 2016 | Estimated reading time: 6 minutes to read
  • I grew up on a wheat farm in the 70s. I spent much of my teens and early 20s working on farm machinery, before starting…
How Wi-Fi Location-Based Services Can Step Up Your Public Safety Game

How Wi-Fi Location-Based Services Can Step Up Your Public Safety Game

  • Greg Deffenbaugh
  • October 27, 2016 | Estimated reading time: 6 minutes to read
  • My first job out of college was working on Sonar Systems for the U.S. Navy. Modern sonar systems passively listen in the ocean to identify…
As Consumer Technology Remakes the Workplace, a Strategy for Managing Security Breaches

As Consumer Tech Remakes the Workplace, a Thoughtful Security Strategy Is the Best Defense

  • Adrian Brookes
  • October 26, 2016 | Estimated reading time: 5 minutes to read
  • I think we’d all agree the business landscape has changed dramatically over the past two decades. Think back to the last time you wrote a…
An Exploration of End-to-End Network Segmentation—Part II: Native Stealth

An Exploration of End-to-End Network Segmentation—Part II: Native Stealth

  • Jean Turgeon
  • October 12, 2016 | Estimated reading time: 4 minutes to read
  • As I’ve said before, no one provider can completely eliminate network security risks. There is, however, a proven way to reduce risk and network exposure:…
How to Make the Most of IoT While Minimizing Security Risks

How to Make the Most of IoT While Minimizing Security Risks

  • Jean Turgeon
  • October 6, 2016 | Estimated reading time: 2 minutes to read
  • I was in London yesterday for IP Expo 2016. I had the pleasure of speaking with many customers and presenting a keynote about the security…
An Exploration of End-to-End Network Segmentation—Part I: Hyper-Segmentation

An Exploration of End-to-End Network Segmentation—Part I: Hyper-Segmentation

  • Jean Turgeon
  • October 5, 2016 | Estimated reading time: 9 minutes to read
  • More than 90% of businesses say they have some sort of cybersecurity framework in place, but here’s the truth: a network security strategy will never…