WHAT'S YOUR DNS SECURITY RISK? INSIGHTS FROM RECENT PONEMON SURVEY

Have you ever done an assessment on how secure your DNS infrastructure is? Ponemon Institute has recently completed the first DNS Security Risk Survey among global organizations to understand how secure they are when it comes to malware and data exfiltration that uses DNS.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Nokia Educational Series - Evolution of voice from VOLTE to 5G

Nokia

The evolution of voice from circuit to voice over VoLTE requires the implementation of IMS. What happens to voice with the introduction of 5G? Happily, IMS is advertised to be “access transparent” so no big deal, right? Or is it? The reality isn’t quite as clean as the advertising might lead you to believe. In this Webinar we will discover the evolution from a VoLTE network to a Voice over 5G network and the interim steps and the migration period it will require. Join us to discuss some of those special cases and migration steps in this webinar.
Watch Now

IoT Applications and Instant Networks for Law Enforcement

The Justice Clearinghouse

With advanced technology, law enforcement agencies benefit from the ability to be at the right place at the right time — and with the right tools to enable critical communications so officers have the real-time information they need. With the capabilities of smart sensors, smart surveillance, license plate readers and recorders, and the ability to readily push this data to headquarters and responding emergency workers, the system can be advanced to reach vast capabilities in the detection, determination, and deterrence of criminal activity.
Watch Now

The Fiber Foundation of 5G Networks

Light Reading

5G is the buzz. Everyone involved in the large telecommunications ecosystem is developing, trialing, promising and dreaming about 5G networks. While this technology comes with great promises and applications, we seldom hear about the underlying physical network that will have to transport the data to the 5G radios. That’s right, the optical fiber network that has been installed and optimized for other applications (e.g., FTTx, Remote PHY) will now need to reach deeper with possibly more stringent requirements.
Watch Now

The Death of Network Hardware Appliances – and the Evolution of Cloud-Native Architectures

When organizations need to protect their on-premises networks, IT departments typically turn to old, legacy hardware boxes. These hardware boxes are expensive, hard to manage, and slow. To complicate matters further, legacy approaches to connectivity (re: MPLS) and security (re: on-premises firewall and DDoS “scrubbing centers”) just don’t work for today’s distributed workforce and cloud-hosted applications.
Watch Now

Spotlight

resources