As data becomes the new currency of the digital marketplace, one of the biggest security challenges organizations face is the number and kinds of endpoint devices that need access to the network. Smartphones, laptops, Chromebooks, tablets, and IoT devices of every function and size, and belonging to both employees and consumers, now regularly connect to some segment of the network to access data.
AT&T Preps White Box Routers for 5G
AT&T looks to expand its white box router approach to macro sites and small cells for 5G.
Other content in this Stream
Vodafone's Heeran: Defining the Telco Cloud
Vodafone's head of cloud and automation wants to define the telco cloud so that everyone's singing from the same hymn sheet.
Editor's Corner—Open source is not 'one size fits all'
Open source communities are no doubt playing a key role in moving the telecommunications industry forward, but not everyone is on board the bandwagon. Rikard Kjellberg, chief marketing officer of...
Spanning the globe: CenturyLink goes worldwide with its SD-WAN service
Thanks in part to its deal to buy Level 3, CenturyLink has rolled out its SD-WAN service to more than 36 countries across the globe. CenturyLink's SD-WAN service has stretched its legs out of...
Don't Be Afraid to Reboot Your Cloud Architecture
It may sound radical, but one way to deal with increasing cloud complexity is a complete reboot of your cloud architecture.
FortiGate Intrusion Prevention Continues to Excel in NSS Labs’ NGIPS Testing Results
NSS Labs gives coveted “Recommended” rating for Fortinet FortiGate IPS.
Fortinet is a Premiere Sponsor at the 2018 AT&T Business Summit
The AT&T Business Summit is about to kick off this September 25 – 28 at the Gaylord Texan Resort and Conference Center in Dallas, TX. Fortinet is proud to be participating as a Premiere sponsor.
Orange Business Services tees up support for Amazon Web Services
Orange Business Services is forming strategic partnerships with cloud providers such as AWS to become a leader for multicloud services. Orange Business Services already has a similar deal in place...
TAG Cyber Annual: Automation, Analytics & Cloud Driving Improved Security Picture
Organization led by former AT&T security chief Ed Amoroso updates third volume of annual reports tracking cybersecurity trends.
Windstream Enterprise's SD-WAN service scores PCI DSS compliance
Windstream announced on Tuesday that its SD-WAN service has met the standard for the Payment Card Industry Data Security Standard (PCI DSS) Version 3.2 Compliance. The PCI DSS compliance was...
Windstream Adds PCI Compliance to SD-WAN
Service provider says the independent compliance is important not just to its retail segment customers but also many other market segments.
Fortinet Brings the Industry’s Broadest Security Portfolio to Microsoft Ignite 2018
As a global leader in providing broad, integrated, and automated cybersecurity solutions, Fortinet is again participating as a Gold Sponsor at Microsoft Ignite.
Results from the Third Annual “ETSI NFV Plugtest + OPNFV SFC/NSH” Event
For three years now, ETSI has conducted an NFV (Network Functions Virtualization) Plugtest event that provides an opportunity for vendors and open source communities to meet, collaborate, and...
3 Reasons Automation Is an MSSP?s Best Friend
IDC report: VNF revenues to hit $16.4B by 2022
After a somewhat rocky start, virtual network functions are poised to grow to $16.4 billion in revenues by 2022, according to an IDC report. Worldwide revenue for the VNF market in 2017 checked in...
Security, Network Capacity Issues Drive Need for IoT Automation
Communications service providers (CSPs) are slowly adopting automated processes for their Internet of Things (IoT) network architecture, with more than 80% of CSPs who participated in this month's...
Painting a New Security Landscape
Derek Mankey sheds light on current criminal activity and suggests how organizations can stay a step ahead.
Move Securely to the Cloud: Gain the Advantages
Organizations can reap the full benefits of the cloud and avoid potential security risks by following four fundamental steps.
Today’s CISO is Shifting Toward Strategic Business Enablement
Today’s CISO responsibilities are shifting toward business enablement and digital transformation. Learn how CISOs can successfully adapt to these changes without compromising security posture.
Industry Voices—Doyle: 5 myths about multi-access edge computing
Multi-access edge computing (MEC) is a network architecture that supports compute and storage capacity at the edge of the network. Proponents believe that MEC provides substantial performance...
AT&T's Gilbert: AI Critical to 5G Infrastructure