Blog

24 Sep 2015 Extending IDS and IPS Throughput Capacity

The load on Intrusion Detection and Prevention Systems (IDS/IPS) is increasing as data rates and the number of possible threats continue to rise. When these security devices become saturated, they drop packets. The more packets that get dropped the greater the statistical likelihood that one will contain a potential threat that will infiltrate your network and cause harm. Read more


27 Aug 2015 NFV Series (#2): Network Function Virtualisation, maximising your potential

The previous blog post in the Network Function Virtualisation (NFV) series described the need for an update to the complex and inefficient network architecture paradigm that preceded NFV. This blog post looks at the main benefits that this new network architecture provides operators. Read more


21 Aug 2015 Hardware Accelerator cards, a cost effective solution for expanding network capabilities

As data rates continue to rise a vertical expansion model becomes increasingly unsustainable for network operators. The high operating costs that come with adding more and more servers to cope with rising network demands can be avoided, however, with the use of hardware accelerator cards. Read more


07 Aug 2015 NFV Series - Network Function Virtualisation (NFV), a disruption to the status quo

The telecoms market is constantly evolving. What worked 10, 5, or even 2 years ago might be obsolete in today’s market. As competition has increased the ability of operators to keep up with market developments has been hampered by a network architecture paradigm of complicated infrastructure consisting of many specialised hardware devices. Routers, switches and network nodes have conventionally been separate dedicated hardware devices designed to carry out a single function only. Read more


30 Jul 2015 Find your network breakpoint, before someone else does

Recent high profile security failures reinforce the case for demanding and realistic penetration testing to enable security managers to find the limits and vulnerabilities of their network. As networks become increasingly virtualised and component interactions become more complex establishing these security strengths and weaknesses becomes increasingly difficult. Read more