- June 22, 2006
Like many Internet protocols, SIP was designed with simplicity, not security, in mind. And, although H.323 was created to meet broader goals, security issues have plagued it as well. Expert Lisa Phifer examines some of the vulnerabilities in this ...
- June 15, 2006
GAB Robins has hundreds of sites and bandwidth-intensive users and applications. When Frame Relay just wouldn't cut it anymore, the company's network architects went with a managed broadband VPN from virtual network operator Virtela.
- April 06, 2006
A Bermuda telecommunication and IT service provider boosts visibility into the network with InteQ managed services, which can be used in concert with HP OpenView.
- March 21, 2006
A financial firm picked Verizon Private IP to connect branch offices, build a disaster recovery site, and secure customer info.
Sponsored by Palo Alto - Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More
Sponsored by Palo Alto - In this article we explore a case study: How Unit 42, Palo Alto Network’s threat intelligence and research team, used the AutoFocus threat intelligence service to detect and analyze the Escelar banking Trojan. See More
Sponsored by Palo Alto - The is a new breed of threat intelligence services but how can enterprise security teams use these capabilities to detect and mitigate targeted threats? See More
Sponsored by Palo Alto - The focus of most cybersecurity organizations has shifted from mass attacks to unique threats that target specific industries, specific software applications or even specific enterprises. In the vast majority of cases, it takes too long to detect, analyze and mitigate these attacks. See More