Deep Packet Inspection for Wireless Access Points

July 12, 2018

According to many market research analysts, the global wireless access point (WAP) market is anticipated to continue its upward trajectory and to grow at an impressive compound annual growth rate (CAGR) of approximately 8% through 2020. Many enterprises are utilizing cloudcomputing technology for cost-cutting purposes, eliminating investments required for storage hardware and other physical infrastructures. With significant growth expected in Internet usage, particularly bandwidth consuming video traffic, WAP vendors need to enable their customers to monitor and improve device performance, improve end user experience, and enhance security.

Spotlight

Fortanix

Fortanix has built a new category Runtime Encryption using Intel SGX. Just like encryption today protects data at rest and data during motion, Runtime Encryption keeps keys, data, and applications completely protected from external and internal threats including malicious insiders, cloud providers, OS-level hacks and network intruders. Customers get deterministic security, unlike existing leaky security, which means their applications and data remain completely protected regardless of how the attacks originate and how root credentials are compromised.

OTHER WHITEPAPERS
news image

Scaling Intel’s Data Centers with Software-Defined Networking and Automation

whitePaper | July 19, 2022

As Intel’s business grows, demand for data center network capacity has increased by more than 25% annually. Additionally, business pressures require new capacity to be brought into production within 24 hours. As far back as 2014, we recognized the potential of software-defined networking (SDN) to help meet these challenges.

Read More
news image

Citrix Secure Private Access: A better ZTNA alternative than Zscaler Private Access.

whitePaper | June 15, 2022

With the recent surge in remote work, IT has been tasked with enabling thousands of remote users with secure access to applications and data. Rather than a few users accessing the corporate networks via VPN, entire organizations now work outside the office. This has flipped the entire security posture of countless organizations.

Read More
news image

Future of the Connected Vehicle

whitePaper | January 6, 2022

This white paper discusses how DISH will support the fast-growing connectivity needs of vehicles by delivering cost-effective optimization and intelligent vehicle cloud connectivity supported by private, public or hybrid-cloud infrastructure. Efficient vehicle data flow and management, for both consumer and commercial vehicles, is critical to creating a superior in-vehicle experience, even before achieving Level 4 autonomy.

Read More
news image

ARIADNE – On communication-theoretic models for programmable wireless environments enabled by reconfigurable intelligent surfaces

whitePaper | June 2, 2021

With the current deployment of the fifth generation (5G) of communication systems, it is now a critical time to identify enabling technologies for the sixth generation (6G) of communication systems. 6G systems are expected to fulfill more stringent requirements than 5G systems, on transmission capacity, reliability, latency, coverage, energy consumption, and connection density.

Read More
news image

Service performance measurement methods over 5G experimental networks

whitePaper | May 1, 2021

This white paper (available in both short and long versions) analyses the 5G-PPP projects’ use cases of various verticals for their performance KPIs and their mapping to the 5G network KPIs. The scope is to identify (based on architectural elements analysis, information flow, etc.) the potential impact on the service performance and the perceived user quality. The considered use cases belong to the following domains: Smart Cities & Utilities, Transportation, Automotive, Media & Entertainment, Agriculture & Agri-food, Smart (Air)ports, Energy and E-health & Wellness. The goal was to understand the relationship between the 5G network performance indicators and the vertical services.

Read More
news image

Virtualized Networks and Real Risks: Best Practices for Securing Network Function Virtualization Environment

whitePaper | September 19, 2022

Network Functions Virtualization (NFV) is unleashing fundamental innovation in the way organizations buy, deploy, and operate network infrastructures. By leveraging open standards and commodity hardware, NFV delivers cost savings, enhanced flexibility, improved performance, and more. However, without the right safeguards, organizations can also see their vulnerabilities increase when they move to a Virtualized Network Functions (VNF) architecture. This white paper offers a detailed look at the unique security implications of adopting NFV approaches, and it provides a number of best practices to employ to ensure sensitive data and transmissions remain secure in these environments.

Read More

Spotlight

Fortanix

Fortanix has built a new category Runtime Encryption using Intel SGX. Just like encryption today protects data at rest and data during motion, Runtime Encryption keeps keys, data, and applications completely protected from external and internal threats including malicious insiders, cloud providers, OS-level hacks and network intruders. Customers get deterministic security, unlike existing leaky security, which means their applications and data remain completely protected regardless of how the attacks originate and how root credentials are compromised.

Events