security

May 1, 2019

SECURITY

“Spark Joy” With New 12.0 Email Security Features & Videos

2 min read

When you see “software update available,” does it spark joy? For many of us, the answer is a resounding “no.” But, don’t be fooled into thinking that our new 12.0...

April 29, 2019

EXECUTIVE PLATFORM

Unplugged and Uninterrupted: What’s Driving Networking Today

7 min read

Enterprise Networking SVP and GM Scott Harrell discusses how networking needs have changed in recent years, and how we will move the industry forward to meet them.

Affirming Trustworthiness of Critical Infrastructure

3 min read

How do you establish a strong infrastructure foundation that preserves integrity and reinforces trust? We'll show you how to cryptographically gather evidence to affirm trustworthiness of your trusted network.

April 18, 2019

SECURITY

Email – From Novelty to Nefarious

6 min read

How a revolutionary technology was usurped for evil, and what we can do about it Since its inception, email has gone from a novelty, to a necessity, to at...

Trust in IOS XR

5 min read

Explore the software functionalities in IOS XR that enhance the security posture of the router, defends the router against common attacks, and provides evidence of trust.

5G Will Give Mobile Carriers a Pass into the B2B World

2 min read

The advent of 5G networks is often referred to in bald terms as not much more than a speed upgrade.

How 5G Will Make the Network-as-a-Service (NaaS) Model a Reality

2 min read

Cellular networks have become an important connectivity asset for businesses, allowing them to support mobile workers and devices that sit outside the enterprise.

March 28, 2019

COLLABORATION

3 Things to Consider for Safe and Secure Team Collaboration

7 min read

We wanted to spend a moment to talk about a real-world, here-and-now problem that every company faces today: how do I keep my users and my company safe?

March 26, 2019

NETWORKING

Putting the “Trust” in Trustworthy SD-WAN

6 min read

With ever-more sophisticated threats, network operators must be able to trust that the hardware and software that comprise their infrastructure are genuine, uncompromised, and operating as intended.