3 Articles Tagged Securing the Everywhere Perimeter

Data Protection Part 3: Where Does Encryption fit into Data Protection?

Data Protection Part 3: Where Does Encryption fit into Data Protection?

  • Greg Deffenbaugh
  • January 4, 2017 | Estimated reading time: 10 minutes to read
  • I’ve mentioned that the SNIA SDC Conference provided the catalyst for writing this blog series on data protection. (See part 1 and part 2.) While…
Learn how data breaches can be prevented with Avaya’s network segmentation and security solutions.

Data Protection Part 2: What About Unauthorized Data Access?

  • Greg Deffenbaugh
  • December 16, 2016 | Estimated reading time: 7 minutes to read
  • In part 1, we explored the physical loss of data, meaning the data is no longer available for access (intelligently) by anyone. There’s another, perhaps…
Time for a New Network Engine: Start Running on a Software-Defined Network

Time for a New Network Engine: Start Running on a Software-Defined Network

  • Greg Deffenbaugh
  • November 3, 2016 | Estimated reading time: 6 minutes to read
  • I grew up on a wheat farm in the 70s. I spent much of my teens and early 20s working on farm machinery, before starting…