The workplace has never been more exposed to security risk than it is today. Even before staff was forced to work from home, employees were on the road, accessing diverse applications from planes, hotel rooms, and coffee shops. To ensure productivity and business continuity, IT teams have been tasked with ensuring that these applications are
For those who follow all things networking, or keep tabs on the evolution of Linux, the word WireGuard can elicit feelings of excitement and curiosity. For those who don’t geek out on such things, you may not be as familiar with the word. Wireguard is a new approach to VPN technology. After years of frustration
Everyday we speak with companies looking for ways to improve the cost and performance of their application’s connectivity. When the topic of MPLS comes up, there is a predictable groan of resigned disappointment. No one is coming to its defense. How can a technology that is so widely used, be so uniformly disliked? Normally, technologies
As you may have heard, Finastra was hit with ransom-ware attacks and were forced to shut down a number of their products and services over the weekend. There are initial reports showing that Finastra may have been running an unpatched VPN with known vulnerability issues. While Finastra has not released the full details and scope
A Data Mesh creates a layer of connectivity that abstracts away the complexities of connecting, managing and supporting an application’s access to remote data. It is used to stitch together data held across multiple environments. The premise of a data mesh is that it uses software to connect environments no matter where it lives, or
In boxing, the tale of the tape is a term that refers to the measurements taken before a fight begins. It is used to ‘size up’ the competitors by things like their weight, reach and height. While not an exact science, these stats give viewers a sense of who may be dominant in a fight.
As Michael Vizard notes here, virtualization of network features helps automate the onerous and often changing tasks of compliance. Legacy systems demand massive amounts of labor or expensive toolsets (or both) to achieve even baseline compliance.
Connectivity solutions will be increasingly challenged to implement the most advanced security. Enterprise scale banks can produce enterprise scale APIs but community financial institutions must rely on different methods, frequently to several vendors at a time.