Break glass in case of emergency: How a SASE approach can solve remote network outages
What happens when a network outage prevents network operators from accessing the network they need to troubleshoot and repair? Cisco+ Secure Connect provides VPN-as-a-Service using a SASE solution that enables secure connectivity and private access to an out-of-band network.
IoT Evolves: the coming of long range WAN
What is LoRaWAN? How does it work? And will it really change the IoT like nothing before?
On the Road to Digital, Where’s Your Map?
Digital trends like mobility, IoT, cloud, and analytics are changing the way the world does business. As a leader, you know these trends offer you the opportunity to innovate, automate,...
Point of View: Optimisation, Monetisation and Customer Privacy
Cisco Cloud Security for Public and Private Cloud – A Secure, and Compliant Cloud Data Center
Recently the widespread fire of data breaches impacting privacy of millions of hapless people across the globe has become the stirring news. This spree of cyber attacks unveiling the fact that information security industry, organizations and even governments are vulnerable to today’s persistent, well-organized and sophisticated cyber threats. There was a common theme among all […]
RST Fiber’s High-speed Network powered by Cisco’s Evolved Programmable Network
By Gina Nienaber, Marketing Manager We’ve been discussing the Evolved Programmable Network for some time now, knowing the transition from an IP NGN to an EPN is not something that will happen overnight (See EPN Blogs 1 , 2, 3). The Cisco® Evolved Programmable Network (EPN), represents an idea, an end-to-end unification of network, storage, […]
The Value of Endpoint and Network Protection Together
As I’ve discussed in past blog posts, advanced malware and sophisticated attacks are relentless as they compromise environments using new and stealthy techniques. Modern malware is dynamic and exists in an interconnected ecosystem that is constantly in motion. It will use an array of attack vectors, take endless form factors, and launch attacks over time. […]