Manage Risk By Protecting the Apps and Data That Drive Business Productivity

Today you face the challenge of securing a business environment transformed by technologies such as cloud and new workforce requirements such as mobility, BYO, and third-party talent.

Spotlight

Nexius

Since 2001, Nexius has provided end-to-end deployment services and solutions on the latest technologies. Our services include designing, optimizing, deploying and delivering state of the art networks. Tying it together through program management expertise and automation tools for optimized time to market.

OTHER ARTICLES
Enterprise Mobility, Mobile Infrastructure

Ericsson’s 5G platform adds unique core and business communication capabilities

Article | June 16, 2023

To leverage the full benefits of 5G and cloud native investments, orchestration and automation are now a critical matter of business. Ericsson’s 5G platform is now being strengthened with new solutions that enable smarter business. David Bjore, Head of R&D and Portfolio, Business Area Digital Services, Ericsson, says: “Through our core networks, service providers can get to market faster and can capitalize on new services, through leading consumer and enterprise communication and monetization solutions, enabling them to stay ahead in the race for 5G business, today and tomorrow.”

Read More
5G

Ericsson researchers top 4.3Gbps downlink on 5G millimeter wave

Article | May 18, 2023

With a technical specification comprising 8 component carriers (8CC) aggregating 800MHz of millimeter wave spectrum, Ericsson engineers achieved delivery rates of 4.3Gbps – the fastest 5G speed to date. Ericsson Radio System Street Macro 6701 delivered data with downlink speeds of 4.3Gbps over-the-air to an industry partner test device during interoperability testing. The commercial solution, including network and terminal support, will be available to 5G consumers during 2020.

Read More
Network Management, Network Security

Intelligence Brief: How is 5G changing network ownership?

Article | July 17, 2023

5G necessitates a different network strategy. Unlike previous generations, 5G deployment is not only about adding more sites and increasing backhaul capacity. In fact, it is more about rethinking the whole network architecture to make it agile. The high capacity requirements of 5G will necessitate the use of small cells in cities and areas of high footfall (such as airports) to complement national macro networks. Private networks (for example to sell into enterprise customers) and the concept of a neutral host (such as for sports stadiums) are further examples of diversification.

Read More

5G Needs Edge Computing to Deliver on Its Promises

Article | February 11, 2020

Edge computing will be a key enabler for 5G to deliver on its bandwidth and latency requirements. In the short term, it can enable developers to provide a “5G experience” at scale. In the long term, it will be necessary to optimise customer experience for real-time, data hungry applications. Telecoms operators have reported that 5G in the lab can deliver network speeds that are more than twenty times faster than LTE1. But, this does not reflect the experience of the average user. And 5G roll out in many countries will be limited in terms of coverage and capabilities for several more years, given that the ultra-low latency standards will only be revealed in 3GPP’s Release 16 later this year. This is why it is likely that, for 5G to deliver on its promises, it must be coupled with edge computing.

Read More

Spotlight

Nexius

Since 2001, Nexius has provided end-to-end deployment services and solutions on the latest technologies. Our services include designing, optimizing, deploying and delivering state of the art networks. Tying it together through program management expertise and automation tools for optimized time to market.

Related News

Sysdig Taps its Forensic Platform for Container Security Product

sdxcentral.com | October 13, 2017

The container security space garnered a new entrant as Sysdig launched its Secure product targeted at providing greater visibility and orchestrator integration.

Read More

Ransomware Analysis Promises Bleak Future with No Recovery

infosecurity-magazine.com | September 22, 2017

The future of ransomware does not offer any good news, as analysis shows new tactics and advancements by operators.According to analysis by Carbon Black’s Threat Analysis Unit of 1000 ransomware samples, researchers found that ransomware will increasingly target Linux systems and look to conduct SQL injections to infect servers and charge a higher ransom price.

Read More

Sysdig Taps its Forensic Platform for Container Security Product

sdxcentral.com | October 13, 2017

The container security space garnered a new entrant as Sysdig launched its Secure product targeted at providing greater visibility and orchestrator integration.

Read More

Ransomware Analysis Promises Bleak Future with No Recovery

infosecurity-magazine.com | September 22, 2017

The future of ransomware does not offer any good news, as analysis shows new tactics and advancements by operators.According to analysis by Carbon Black’s Threat Analysis Unit of 1000 ransomware samples, researchers found that ransomware will increasingly target Linux systems and look to conduct SQL injections to infect servers and charge a higher ransom price.

Read More

Events