Search Results

Search results for: software

Cloud-first managed WAN and security integrated into SD-WAN as-a-Service

Cloud-first WAN company and end-to-end managed SD-WAN provider, Aryaka, is now partnering with Check Point Software Technologies. Together the companies intend to use Aryaka’s cloud-first managed SD-WAN solution and Check Point’s CloudGuard Connect, CloudGuard Edge and CloudGuard IaaS to deliver integrated security and SD-WAN as-a-Service. (more…)

Read more

July 23, 2020

Posted by: Anasia D'mello

Ransomware behind 1 in 3 cyber attacks against organisations

Positive Technologies published the Cybersecurity Threatscape report last week, which found that during the first quarter of this year 34% of malware-based cyberattacks on organisations were ransomware attacks. Sectors that were targeted the most included government agencies, industry, finance, and healthcare. (more…)

Read more

July 22, 2020

Posted by: Anasia D'mello

SD-WAN portfolio expands to meet wider multi-cloud business needs

Masergy, a software-defined network and cloud platform for the digital enterprise, has launched the next generation of its SD-WAN portfolio. The new portfolio, based on Gartner’s Secure Access Security Edge (SASE) tenets, are designed with the flexibility in network, access, management, and security providing businesses the freedom to choose the right configuration for their cloud and network needs. (more…)

Read more

Posted by: Anasia D'mello

Weride chooses Weka to manage Its AI data pipeline

WekaIO (Weka), a specialist in high-performance and scalable file storage, announced today that WeRide, a smart mobility company with autonomous driving technologies, has selected the Weka File System (WekaFS), the world’s fastest shared parallel file system from WekaIO, to manage its artificial intelligence (AI) data pipeline from the edge to the core to the cloud. (more…)

Read more

July 21, 2020

Posted by: Anasia D'mello

Curve smart GPS tracker launched in Europe by Vodafone to track cars, laptops, keys and other valuables

Vodafone UK has expanded its consumer smart tech offering with the launch of smart GPS tracker, Curve. Curve allows users to stay connected to the people and things they love, sending them alerts and updates straight to their mobile from a distance. (more…)

Read more

July 20, 2020

Posted by: Anasia D'mello

US is prey to 156 ‘significant’ cyber attacks since 2006

The prevalence and severity of cyber attacks are increasing at an alarming rate every year. So say statistics from Cybersecurity Ventures which estimates that cybercrime will cost the global economy a colossal US$6 trillion (€5 trillion) per year by 2021. (more…)

Read more

Posted by: Anasia D'mello

Podcast: Cave Dwellers, Privacy, Huawei and Buzzsaws

Guest Alicia Asin, CEO of IoT specialists Libellium, asks “Is it really necessary to expose our privacy to control pandemics?” Privacy Purists are in the spotlight as Jeremy Cowan and George Malim ask Alicia how enterprises should balance free services and access to our data. And, Sun of a Beach: We see how IoT can help you in Spain this summer; we anticipate the UK’s Huawei decision, and see how we can all avoid COVID Cliches. (more…)

Read more

Posted by: IoT global network

Lanner joins Prodapt’s open virtual exchange to help transform network services at the virtualised edge

Prodapt, a consulting, technology, and network services provider to Digital Service Providers (DSPs), has formed a partnership with Lanner Electronics, provider of scalable and customisable edge computing platforms. (more…)

Read more

July 17, 2020

Posted by: Anasia D'mello

What is device attestation?

As an organisation that is founded on the expertise and insights of our members, we have taken the opportunity to discuss some of the new and emerging technologies shaping our industries, and how GlobalPlatform is working to define standards that enable digital devices and services to be securely brought to market. (more…)

Read more

Posted by: Anasia D'mello

Investigation shows problems in search for counterfeit IT components

Hardware security specialists with cyber security provider F-Secure has published a report detailing its investigation into a pair of counterfeit network switches. The investigation, which concluded that the counterfeits were designed to bypass processes that authenticate system components, illustrates the security challenges posed by counterfeit hardware. (more…)

Read more

Posted by: Anasia D'mello