When electric cars first began gaining popularity, traditional car companies thought they could easily replicate them and didn’t devote much time to develop a competing product. You could argue some still have their head in the sand, but we’ll reserve that topic for another blog. What the traditional car companies were reluctant to realize was
The term “identity-based networking” refers to the concept of an end user’s identity being tied to the network services they are allowed to receive. The initial implementations of this concept can be seen in ubiquitous network services such as 802.1x. Wireless networks have been applying the basics of identity-based networking to users who joined wireless
It was not that long ago that a wide variety of security and networking technologies first erupted in the market. Firewalls, anti-virus, IDS/IPS, web content management, site-to-site and user VPNs were offered by dozens of different vendors on dedicated appliances without a thought to centralized management or product integration. From this chaos came the next
The workplace has never been more exposed to security risk than it is today. Even before staff was forced to work from home, employees were on the road, accessing diverse applications from planes, hotel rooms, and coffee shops. To ensure productivity and business continuity, IT teams have been tasked with ensuring that these applications are
Our customers always come to us with a problem… “I want to get data from the factory floor to my cloud application” “My customer wants to run my application on-premise, but we don’t deploy our applications onsite.” “My data is scattered across multiple data centers and I can’t replicate it centrally” I could go on
As Michael Vizard notes here, virtualization of network features helps automate the onerous and often changing tasks of compliance. Legacy systems demand massive amounts of labor or expensive toolsets (or both) to achieve even baseline compliance.