Enterprise Iot, Infrastructure

Can Zero Trust Network Access Replace Your VPN?

September 13, 2022

can-zero-trust-network
Secure, seamless remote network access is a business enabler — boosting remote user productivity and reducing the time spent by IT teams to onboard and maintain user-to-application connectivity with agility and resilience. And yet, remote access remains a challenge for many organizations

Spotlight

HiKoB

HiKoB is a leading provider of wireless and scalable instrumentation systems that generate strategic data and information on your physical resources and assets to feed your information system.

OTHER WHITEPAPERS
news image

Threat detection and response in cloud environments

whitePaper | August 1, 2022

Cloud environments change fundamental assumptions in how to perform threat detection and response. The highly dynamic inventory of cloud workloads means systems come and go in seconds. When system configuration errors are introduced during a build, they can be exacerbated and amplified when automation replicates the errors across many workloads. Shared responsibility with the cloud service provider (CSP) creates potential threat detection gaps in the attack lifecycle.

Read More
news image

Zero Trust Maturity Model

whitePaper | June 13, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Read More
news image

IoT in the TV White Space Spectrum

whitePaper | April 4, 2022

The deployment of Internet of Things (IoT) networks has rapidly increased over recent years – to connect homes, cities, farms, and many other industries. Today, these networks rely on connectivity solutions, such as LoRaWAN, operating in the ISM bands. Our experience from deployments in multiple countries has shown that such networks are bottlenecked by range and bandwidth.

Read More
news image

Intelligent Edge & Private Networks Center of Excellence

whitePaper | December 19, 2022

The Accenture-Cisco Center of Excellence is an international center integrated with ACIC+ and its catalogue with a hub in Rome in the Accenture Cloud Innovation Center and one in Milan, in the Cisco Cybersecurity Co-Innovation Center as well as a Demo Center at Equinix’s datacenter ML5. The Center will leverage Market leader software-defined solutions for DC, WAN and LAN, Security for both corporate and industrial sites, to establish, based on Equinix Fabric and network edge catalog, a direct and low latency cloud interconnection through its resilient facilities to main cloud providers (MAG). The benefits of having Equinix in this architecture are numerous in terms of lower IT costs thanks to consumption-based billing, faster time-to-market and rapid innovation that supports large scale-up with fluid and real-time service enablement, plus monitoring from a single portal.

Read More
news image

Different Dimensions of IOT Security

whitePaper | December 20, 2019

IOT is wirelessly connecting things to the internet using sensors, RFID’s and remotely accessing and managing them over our phone or through our voice. IOT uses various communication protocols such as Zigbee, 6LowPan, Bluetooth and has bi directional communication for exchange of information. The database for IOT is cloud which is also vulnerable to security threats. The increasing amount of popularity of IoT and its pervasive usage has made it more recurrent to prominent cyber-attacks such as botnet attack, IoT ransom ware, DOS attack, RFID hack.

Read More
news image

5G The Future of IoT

whitePaper | November 1, 2019

The Internet of Things (IoT) is transforming businesses and peoples’ lives, and will continue to ignite innovations in the future. It is expected that we will progress to tens of billions of connected devices globally over the next decade1 that will generate multi-trillion dollars of economic value2 across many markets forming the foundation of a totally interconnected world—or the Internet of Everything.

Read More

Spotlight

HiKoB

HiKoB is a leading provider of wireless and scalable instrumentation systems that generate strategic data and information on your physical resources and assets to feed your information system.

Events