99 Articles Tagged networking

Avaya Article Thumbnail

A Business-First Approach to Digital Transformation

  • Greg Deffenbaugh
  • April 20, 2017 | Estimated reading time: 7 minutes to read
  • In part I of this series, we explored the definitions of Digital Transformation, IoT, and Smart Enterprise. Digital transformation goes beyond normal organizational evolution. It…
Avaya Article Thumbnail

What’s Your Ransomware Reaction Plan?

  • Ed Koehler
  • April 13, 2017 | Estimated reading time: 4 minutes to read
  • Ransomware is nothing new, but like Distributed Denial of Service Attacks (DDOS), over time it has evolved in its prevalence, sophistication and impact. New techniques…
Avaya Article Thumbnail

Digital Transformation, the IoT, and the Smart Enterprise

  • Greg Deffenbaugh
  • April 12, 2017 | Estimated reading time: 4 minutes to read
  • I was given the title “Smart Enterprise” for a presentation at #AvayaEngage 2017. The presentation abstract mentioned Digital Transformation and the Internet of Things (IoT),…
Avaya Article Thumbnail

Reducing the Risks of Distributed Denial of Service Attacks

  • Ed Koehler
  • March 22, 2017 | Estimated reading time: 4 minutes to read
  • Picture what may just be one of the scariest scenarios in your career: The network has slowed to a crawl. You can barely hold a…
Avaya Article Thumbnail

Less Maintenance, More Innovation: How to (Finally) Fill the IT Skills Gap

  • Jean Turgeon
  • February 20, 2017 | Estimated reading time: 6 minutes to read
  • If you take a good look at how the business ecosystem is evolving, you’ll find that it’s being redefined by five key market trends: Automation…
Avaya Article Thumbnail

APTs Part 4: How Do You Detect an Advanced Persistent Threat in Your Network?

  • Ed Koehler
  • February 15, 2017 | Estimated reading time: 4 minutes to read
  • Here in part four of my APT series, we’re looking at how to detect Advanced Persistent Threats in your network. The key is to know…
Avaya Article Thumbnail

APTs Part 3: Prevention is Ideal, But Detection is a Must

  • Ed Koehler
  • February 8, 2017 | Estimated reading time: 4 minutes to read
  • In my last blog I spoke about the first steps in the kill chain. Now that the Advanced Persistent Threat (APT) has gained residence, it’s…
Avaya Article Thumbnail

APTs Part 2: How the Advanced Persistent Threat Works

  • Ed Koehler
  • February 1, 2017 | Estimated reading time: 4 minutes to read
  • In my last blog I introduced the concept of Advanced Persistent Threats (APT) and provided some background on what these groups are about. APTs want…
Avaya Article Thumbnail

Hoteliers: Your Best Laid Plans Will Go Awry Without Strong Wi-Fi

  • Robert K. Mitton
  • January 6, 2017 | Estimated reading time: 5 minutes to read
  • In today’s smart, digital world, the average guest experience isn’t so average anymore. Traditional room service, for example, is being replaced by in-room kiosks that…
Avaya Article Thumbnail

Data Protection Part 3: Where Does Encryption fit into Data Protection?

  • Greg Deffenbaugh
  • January 4, 2017 | Estimated reading time: 10 minutes to read
  • I’ve mentioned that the SNIA SDC Conference provided the catalyst for writing this blog series on data protection. (See part 1 and part 2.) While…
Avaya Article Thumbnail

Data Protection Part 2: What About Unauthorized Data Access?

  • Greg Deffenbaugh
  • December 16, 2016 | Estimated reading time: 7 minutes to read
  • In part 1, we explored the physical loss of data, meaning the data is no longer available for access (intelligently) by anyone. There’s another, perhaps…
Avaya Article Thumbnail

Avaya Demos Wireless Location Based Services at Avaya ENGAGESM Dubai

  • Greg Deffenbaugh
  • December 9, 2016 | Estimated reading time: 5 minutes to read
  • Wireless Location Based Services (WLBS) are usually discussed in the areas of customer or guest engagement. However, there are also valuable use cases in the…
Avaya Article Thumbnail

Aiming Towards an Unfettered and Secure IoT

  • Randy Cross
  • November 8, 2016 | Estimated reading time: 6 minutes to read
  • Last week, we heard bold claims by a networking vendor that they could make the Internet of Things (IoT) safe because they “own” the network.…
Avaya Article Thumbnail

What does a Smart City look like? We’re defining it with a new partner

  • Jean Turgeon
  • September 29, 2016 | Estimated reading time: 4 minutes to read
  • The city of the future is a Smart City, emboldened by technology that folds in government, industry, and consumers. For this to happen, it needs…
Avaya Article Thumbnail

New Age, New Requirements, More Innovation: Three Ways to Keep Up (Part 3)

  • Jean Turgeon
  • August 31, 2016 | Estimated reading time: 4 minutes to read
  • The 2016 Rio Olympics may be over, but the excitement is still palpable. As I watched the performances from some of today’s most gifted athletes,…
Avaya Article Thumbnail

New Age, New Requirements, More Innovation: Three Ways to Keep Up (Part 2)

  • Jean Turgeon
  • August 22, 2016 | Estimated reading time: 5 minutes to read
  • If you’ve read Part 1 of this series, you hopefully now have a solid understanding of how businesses must keep up with today’s pace of…