13 Articles Tagged native stealth

Avaya Article Thumbnail

Secure IoT Deployments with Avaya SDN Fx™ Architecture Solutions

  • Greg Deffenbaugh
  • April 25, 2017 | Estimated reading time: 6 minutes to read
  • Let’s look at how to deploy the IoT in a safe and sane manner—a top-of-mind business challenge. Before diving into the technology, let’s remember why…
Avaya Article Thumbnail

APTs Part 1: Protection Against Advanced Persistent Threats to Your Data

  • Ed Koehler
  • January 10, 2017 | Estimated reading time: 4 minutes to read
  • Hardly a day goes by without hearing about a data breach somewhere in the world. So it’s timely that we launch this new blog series…
Avaya Article Thumbnail

Data Protection Part 3: Where Does Encryption fit into Data Protection?

  • Greg Deffenbaugh
  • January 4, 2017 | Estimated reading time: 10 minutes to read
  • I’ve mentioned that the SNIA SDC Conference provided the catalyst for writing this blog series on data protection. (See part 1 and part 2.) While…
Avaya Article Thumbnail

Data Protection Part 2: What About Unauthorized Data Access?

  • Greg Deffenbaugh
  • December 16, 2016 | Estimated reading time: 7 minutes to read
  • In part 1, we explored the physical loss of data, meaning the data is no longer available for access (intelligently) by anyone. There’s another, perhaps…
Avaya Article Thumbnail

Time for a New Network Engine: Start Running on a Software-Defined Network

  • Greg Deffenbaugh
  • November 3, 2016 | Estimated reading time: 6 minutes to read
  • I grew up on a wheat farm in the 70s. I spent much of my teens and early 20s working on farm machinery, before starting…
Avaya Article Thumbnail

Security and the IoT: Where to Start, How to Solve

  • Fab Fiori
  • November 2, 2016 | Estimated reading time: 6 minutes to read
  • I recently attended the 2016 North America IoT Tech Expo in Santa Clara, California. This event highlights how the most innovative advancements in technology are…
Avaya Article Thumbnail

How Wi-Fi Location-Based Services Can Step Up Your Public Safety Game

  • Greg Deffenbaugh
  • October 27, 2016 | Estimated reading time: 6 minutes to read
  • My first job out of college was working on Sonar Systems for the U.S. Navy. Modern sonar systems passively listen in the ocean to identify…
Avaya Article Thumbnail

As Consumer Tech Remakes the Workplace, a Thoughtful Security Strategy Is the Best Defense

  • Adrian Brookes
  • October 26, 2016 | Estimated reading time: 5 minutes to read
  • I think we’d all agree the business landscape has changed dramatically over the past two decades. Think back to the last time you wrote a…
Avaya Article Thumbnail

An Exploration of End-to-End Network Segmentation Part III: Automatic Elasticity

  • Jean Turgeon
  • October 19, 2016 | Estimated reading time: 4 minutes to read
  • Imagine for a moment: you’re connected to a network via a piece of string. You perform your work, you wind down for the day and…
Avaya Article Thumbnail

Changing the Lagging Face of Public Safety with Smart Networking Solutions (Part 4)

  • Fab Fiori
  • October 13, 2016 | Estimated reading time: 6 minutes to read
  • In part I of this series, Avaya Vice President and Chief Technologist for Software-Defined Architecture Jean Turgeon opened up a much-needed conversation about the current…
Avaya Article Thumbnail

An Exploration of End-to-End Network Segmentation—Part II: Native Stealth

  • Jean Turgeon
  • October 12, 2016 | Estimated reading time: 4 minutes to read
  • As I’ve said before, no one provider can completely eliminate network security risks. There is, however, a proven way to reduce risk and network exposure:…
Avaya Article Thumbnail

How to Make the Most of IoT While Minimizing Security Risks

  • Jean Turgeon
  • October 6, 2016 | Estimated reading time: 2 minutes to read
  • I was in London yesterday for IP Expo 2016. I had the pleasure of speaking with many customers and presenting a keynote about the security…
Avaya Article Thumbnail

An Exploration of End-to-End Network Segmentation—Part I: Hyper-Segmentation

  • Jean Turgeon
  • October 5, 2016 | Estimated reading time: 9 minutes to read
  • More than 90% of businesses say they have some sort of cybersecurity framework in place, but here’s the truth: a network security strategy will never…