Accelerated Firewall Software on DPDK-ready x86 Hardware Platforms

high performance software x86 packet processing

Virtualization has massively evolved cloud computing and computer networking, with VNF’s now available and sufficient for many network functions previously performed through dedicated hardware. Yet even today, achieving the near real-time performance expected of networking hardware is a still challenge for virtualized network functions typically running on open compute x86-based network hardware. Firewalls and intrusion …

Read more

Accelerated Firewall Software on DPDK-ready x86 Hardware Platforms was last modified: July 27th, 2020 by James Piedra

Lanner Ready to Offer LTE Certified, FirstNet-Ready Wireless Gateways

FirstNet Next-gen emergency communications network. hardware platforms for critical communications and services.

The evolution of emergency services is now spearheaded by this year’s deployment of a nation-wide public-safety dedicated network known as FirstNet. This critical network reserves 20Mhz out of the valuable 700 Mhz frequency range due to the obstacle penetrating power this frequency affords. FirstNet was developed to provide mission critical communications and emergency services the …

Read more

Lanner Ready to Offer LTE Certified, FirstNet-Ready Wireless Gateways was last modified: February 26th, 2019 by James Piedra

Why Multi-Access Edge Computing is the future

Most modern devices, applications and services make extensive use of cloud computing resources (data centers, CDN’s). Nearly all hardware leveraged in cloud computing is composed primarily of: CPU’s, GPU’s, RAM, Network interfaces and non-volatile storage; all of these are the essential building blocks of modern cloud computing. But there’s much more to computing, especially networks, …

Read more

Why Multi-Access Edge Computing is the future was last modified: April 2nd, 2020 by James Piedra

4 frightening attacks insecure IoT devices can enable today

Internet of Things powered Distributed Denial of Service Attacks cripple critical internet Domain Name Servers

The internet is abuzz with exciting innovations in technology, its minimization, automation capacity and the myriad re-applications of older technologies now enhanced with modern communications advances. But this comes with significant security concerns, as now most of our devices, appliances and even light-bulbs are becoming internet-facing liabilities. Cars, pacemakers, heart-monitors, webcams, smartphones, GPS and wireless …

Read more

4 frightening attacks insecure IoT devices can enable today was last modified: February 11th, 2019 by James Piedra

How to find a Secure, Reliable & Trusted Hardware Vendor, OEM/ODM.

Compromised server boards, system management chips and backdoors

News reports and the several ongoing investigations of alleged hardware backdoors/vulnerabilities found in several mass-produced computer hardware suppliers leave many security professionals increasingly concerned about their hardware. According to US intelligence, it has become incredibly difficult, if not impossible in practice, to effectively audit modern computer hardware that may have been tampered with – even …

Read more

How to find a Secure, Reliable & Trusted Hardware Vendor, OEM/ODM. was last modified: February 11th, 2019 by James Piedra

Why you can’t ignore NBAD in your Cyber Security Strategy

NBAD Systems

We all agree that the tools and techniques of malicious online hackers have evolved and advanced alongside the technologies that enable them, making it essential that network administrators ensure their networks are prepared for any eventuality. This is where Network Behavior Anomaly Detection (NBAD) systems come into the picture. In this post, we will review …

Read more

Why you can’t ignore NBAD in your Cyber Security Strategy was last modified: January 30th, 2018 by Rick Spencer

Artificial Intelligence Re-inventing Cyber Security

There was a time not too long ago when the idea of any kind of artificial intelligence (AI) technologies being involved in cyber security would have been seen as something of a pipe dream. However, with advances in cyber security technologies and those that enable and enhance artificial intelligence such as automation, machine learning and …

Read more

Artificial Intelligence Re-inventing Cyber Security was last modified: January 31st, 2018 by Rick Spencer

Key Considerations Before Choosing an Enterprise WAF

Enterprise WAF

According to Hosting Fact’s 2016 review of internet, e-commerce and hosting statistics, in 2016, the internet influenced sales to the tune of $2.1 trillion. With this in mind, it’s easy to see why modern enterprises keep coming up with more and more web based services and applications. Each web application may be differ from the other …

Read more

Key Considerations Before Choosing an Enterprise WAF was last modified: January 31st, 2018 by Rick Spencer

Cyber security firms accelerate efforts for emerging IoT applications and infrastructure

Finding new IoT applications has become a way of life for many, and powerful x86 processors can be found anywhere from smart refrigerators, tablets and vehicular control systems to nuclear power plant security systems. The first 3 quarters of 2016 have been quite the roller-coaster for the tech industry, with record-breaking mergers, acquisitions and agreements making the …

Read more

Cyber security firms accelerate efforts for emerging IoT applications and infrastructure was last modified: July 16th, 2021 by James Piedra

SD-WAN Solutions first to demonstrate benefits of Software defined networks

All the ongoing effort towards NFV/SDN in the telecom and networking world is really starting to pay off, as companies can now easily deploy working software-defined WAN solutions using inexpensive ISP’s bandwidth coupled with industry standard x86 rackmount network appliances. SD-WAN solutions offer incredible benefits outside of the immediate savings in CAPEX, like exponentially faster …

Read more

SD-WAN Solutions first to demonstrate benefits of Software defined networks was last modified: July 16th, 2021 by James Piedra