What does 2018 hold in store for the telecom sector? We asked our own editors and analysts, and gathered up a few third-party forecasts as well.
Bell Canada says open source ONAP adds modularity, flexibility to its network
Bell Canada has become one of the first service providers to deploy Open Network Automation Platform (ONAP)...
Other content in this Stream
Executive Insights: The Third Generation of Security is Here
Organizations are rapidly adopting mobility, IoT, smart devices, and multi-cloud computing to meet new networking requirements. These changes are increasing the speed and the volume of the data...
Innovation Insights: Our Security Fabric Vision is Reality
Nearly two years ago, we unveiled our technology vision of the Fortinet Security Fabric. And today, with the release of FortiOS 6.0, we have turned that vision into a full-fledged reality with a...
Executive Insights: The Future: It Ain't What It Used to Be
The problem with the future-as baseball legend Yogi Berra, the founders of the Internet, and any CISO or CTO can assure you-is that, increasingly, it ain't what it used to be.
Executive Insights: Digital Change Requires A New Approach to Security
A Conversation with Fortinet’s CTO and co-Founder, Michael Xie
Why Open Source & Hardware Integration Can Work for Service Providers | Light Reading
Kontron's GM, Robert Courteau, discusses how hardware still matters in a software-defined world. He explains how vendors like Kontron and its partners have made significant strides to eliminate...
Verizon and Colt Use SDN Orchestration to Control Each Other’s Networks
The companies claim the PoC was the first to show two-way control.
What is security’s role in digital transformation?
Digital transformation (DX) is about digitizing processes and services so businesses can be more agile and operate more efficiently, from delivering customer service to improving processes with...
The Value of Collaborative Threat Intelligence Sharing
In today’s digital economy, speed and efficiency are essential. So is the ability to access data from anywhere and from any device. These demands are forcing the network to change, increasing the...
Verizon Insights Podcast: Securing Your Network to Drive Digital Outcomes
Digital transformation drivers are having an impact on the security discussions taking place at businesses across all industries. In this podcast, Mark Hollman, Senior Manager of Product...
Five tips for easing into virtualization
From physical to virtual IT departments are becoming virtualized in an effort to deliver more services with less financial resources. Migrating from legacy systems to virtual systems doesn’t...
Accenture CIO: Journey to Cloud Accelerates Tech Upgrades
Accenture CIO Andrew Wilson is 2 years into a 3-year journey to put 90% of the company's IT infrastructure into the cloud. Here's how that cloud commitment helped accelerate a recent IT project.
It’s looking more like the Internet of Threats at the moment – IBM
With 4G finally on the verge of being ubiquitous and 5G on the horizon the prospect of IoT is becoming real, but are organizations taking a genuinely thorough approach to security? New research...
The Challenges of Securing the Multi-Cloud Network
The digital transformation driving the adoption of multi-cloud networks requires an equivalent security transformation.
ETSI NFV Group Collaborates with OPNFV
ETSI NFV endeavors to make VNFs as open as possible.
Which data center intrusion prevention systems are worth the investment? NSS Labs tests 5 DCIPS products
Performance is critical when evaluating data center intrusion-prevention systems (DCIPS), which face significantly higher traffic volumes than traditional IPSes.A typical IPS is deployed at the...
Why the Fortinet Security Fabric Is the "Secret Sauce" for Managed Security Services Providers
To cut to the chase, the technical features of Fortinet solutions are only half the story when it comes to the Fortinet Security Fabric's unmatched ability to deliver managed security services....
Fortinet Founder Sees Network Security In The Bigger Picture
Hear Ken Xie's interview as he provides his insights on securing the infrastructure and opportunities presented by changing data protection needs around the globe.
Enterprise IoT security considerations
Security concerns are regularly cited as the number one IoT deployment concern or barrier to adoption. “Security” covers a wide swath of considerations, both in terms of prevention and reaction....
3 Foundational Pillars for Driving Business with our Partners
Providing security to businesses today is a far different proposition than it was just a few years ago. Looking back, security in the first decade of the 2000’s was a bolt-on proposition....
Fortinet Doubles Down on Mobile Core Security and Managed Security Services at Mobile World Congress