TAP Into Technology Blog: IT Security (25)
[SlideShare] TAP Toons: Network v. Security - How to End the Finger Pointing
Now that security and networking operations have become so complex, it’s not surprising that administrators are quick to blame the other party when things go wrong – and they always do. It’s vital to build solutions into your network...
What’s the 2020 on the Cloud?
With each passing year, mobile- and cloud-based services are further supplanting the customer-premise equipment (CPE) standard. This leads to two major challenges for network engineers.
The Cost of Network Outages
“Network outages can cost financial institutes up to $60k for 30 minutes of downtime.” I was just speaking to a long time customer of ours that divulged this to me when discussing their upcoming network connectivity needs. As a financial...
One Link, Multiple In-Line Security Appliances—What Can Security Architects Do?
The days when firewalls alone could defend corporate networks are long gone. Today, security architects are realizing that the most productive way to protect enterprise networks is to deploy active, in-line security appliances at the edge...
Ransomware, a Billion Dollar World Wide Threat
Every day I hear that a company has solved the network and file security war with a new security widget. Yet every day there are more announcements of breaches, stolen identities, etc. According to the Identity Theft Resource Center (ITRC)...
Are You Adding to Your Security Stack? Then Learn Chaining at the Edge
Back in the early days of the 90's, before cybercrime really took off, no one really anticipated a need for a network to run more than two security appliances at the same time. That was then. Here and now, cyber-threats are extremely...