Network Security

SubQuery Network Whitepaper

February 16, 2022

subquery
This document (the “Whitepaper”) has been prepared by SubQuery Pte Ltd. This notice is intended for all readers who view or access the Whitepaper, regardless of the communication channel or platform. The Whitepaper is strictly for information purposes only, and shall not, under any circumstances, be treated as an offer of securities or an invitation to participate in any regulated investment scheme, howsoever defined in any jurisdiction around the world.

Spotlight

Endace

"Endace provides world-leading network visibility infrastructure products. Endace products are trusted by some of the world’s largest organizations to accelerate their response to network and security problems. EndaceProbe Network Recorders guarantee to capture, index and record 100-percent of network traffic while scaling from 1 Gbps to 100 Gbps. EndaceVision is Endace's proprietary web-based application that enables engineers to visualize, search and retrieve network traffic from any EndaceProbe anywhere across the network."

OTHER WHITEPAPERS
news image

Building flexible infrastructure for 5G

whitePaper | October 18, 2022

5G networks are more than just an iteration of networking technology. They enable fundamentally new ways for businesses to operate and offer their products and services. To unlock this, service providers will need to adopt a new network architecture that is software-defined, fully disaggregated and has the ability to be distributed optimally to meet performance and latency requirements.

Read More
news image

Mobile networks and spectrum Meeting future demand for mobile data

whitePaper | February 9, 2022

Demand for mobile services1 has grown rapidly over the last decade and we expect that growth to continue with people expecting to access good quality mobile services wherever they live, work and travel. Innovation continues to drive the development of new mobile devices and applications and we expect increasing use of wireless data by machines and devices in the future. Mobile networks will need to expand capacity and improve quality to meet these future business and consumer needs.

Read More
news image

Tackling Indoor 5G Coverage

whitePaper | March 15, 2022

Operators are picking up serious momentum when it comes to 5G roll outs. As of December 2021, 487 operators in 145 countries or territories had invested in 5G mobile or fixed wireless networks with 200 of these having launched some level of 5G network coverage. However, there is still a long road ahead when it comes to ensuring that 5G meets its potential and drives maximum ROI. A big stumbling block to overcome will be to ensure comprehensive coverage, in particular, in buildings.

Read More
news image

NG.127 E2E Network Slicing Architecture

whitePaper | May 10, 2022

The purpose of this document is to emphasize necessity of cross-standardization collaboration to realize E2E Network Slicing Architecture designed from an End-to-End (E2E) perspective, spanning over different technical domains (e.g., device, access network, core network, transport network and network management system) and multiple vendors and to provide guidance on actions in each Standards Developing Organizations (SDOs) and open source projects.

Read More
news image

Zero Trust Maturity Model

whitePaper | June 14, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Read More
news image

NETWORKING AND YOUR COMPETITIV EDGE

whitePaper | February 27, 2023

The future is digital, and the race is on. Businesses across the world are approaching a crucial juncture where those who have the ability to adapt their operations to a rapidly evolving landscape will have the edge over their competitors. The number of devices communicating across the network has been growing exponentially, but that number is about to explode as the Internet of Things (IoT) continues to become a reality. As a result, it has never been more important to ensure that the edge of a business’ network is robust, secure and can be upgraded with the speed needed to capitalise on changing business environments.

Read More

Spotlight

Endace

"Endace provides world-leading network visibility infrastructure products. Endace products are trusted by some of the world’s largest organizations to accelerate their response to network and security problems. EndaceProbe Network Recorders guarantee to capture, index and record 100-percent of network traffic while scaling from 1 Gbps to 100 Gbps. EndaceVision is Endace's proprietary web-based application that enables engineers to visualize, search and retrieve network traffic from any EndaceProbe anywhere across the network."

Events