Tata Communications: Addressing Enterprise Challenges with Multi Cloud Connectivity
By: TATA Communications View more from TATA Communications >>
Download this next:
Vendor Study – Software Defined Solutions and Services
By: Apcela
Type: Analyst Report
This ISG Provider Lens study examines the different kinds of global network offerings related to SDN. These include:
- SD-WAN (consulting, implementation and managed services)
- SD-WAN (DIY); and
- Equipment and service supply to enterprises for own operation
It also includes core-to-edge/-branch providers, including those delivering via mobile and 4G/5G technologies and the service offerings related to those segments.
Read the study now to learn which vendor could best fit your business’ needs.
These are also closely related to: "Tata Communications: Addressing Enterprise Challenges with Multi Cloud Connectivity"
-
Network- software-defined solutions: Comparing providers
By: Comcast Business
Type: Research Content
SD-networks across all enterprise types are now ubiquitous in secure cloud-enabled implementations.
The global SD-WAN market analysis shows that the U.S. is the largest consumer, generating approximately $3 billion in revenue in 2023.
This 47-page research report compares network- software-defined solutions and services provider, analyzing their strengths, challenges and competitive differentiators.
Download the report now to discover more.
-
Research report: Private/hybrid cloud buyer's guide
By: Morpheus Data
Type: Analyst Report
The ISG Provider Lens report assesses the hybrid cloud management and resiliency platform markets, noting the rise of AI and machine learning to optimize hybrid cloud operations, costs, and compliance. Vendors are delivering unified management, predictive analytics, and automated recovery for multicloud challenges.
Resiliency solutions are increasingly vital for cyber threat defense and business continuity, with vendors integrating enhanced security and rapid recovery features.
Read the full report for key insights into the hybrid cloud and data resiliency landscape, aiding in the selection of solutions and vendors for digital transformation.
Find more content like what you just read:
-
CW APAC: Trend Watch: Cloud networking
By: TechTarget ComputerWeekly.com
Type: Ezine
In this handbook, focused on cloud networking in the Asia-Pacific region, Computer Weekly looks at the technology's advantages and how networking and security might evolve in the future.
-
3 roadblocks to modern application development
By: Cloudflare
Type: eBook
In 2024, enterprise spending on application development is projected to rise by nearly 5% as executives expand their focus on AI technologies. In this e-book, Cloudflare presents 3 roadblocks to modern application development, as well as strategies for overcoming them. Read on to learn more.
-
Royal Holloway: Cloud-native honeypot deployment
By: TechTarget ComputerWeekly.com
Type: Research Content
Exploring open problems facing cloud infrastructure, this article in our Royal Holloway security series describes the implementation, feasibility and benefits of cloud-native honeypots.
-
Royal Holloway: Security evaluation of network traffic mirroring in public cloud
By: TechTarget ComputerWeekly.com
Type: Research Content
This article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.
-
Royal Holloway: Attack mapping for the internet of things
By: TechTarget ComputerWeekly.com
Type: Research Content
The introduction of each internet-connected device to a home network increases the risk of cyber attack. This article in our Royal Holloway security series presents a practical model for investigating the security of a home network to evaluate and track what pathways an attacker may use to compromise it.
-
Bluetooth Low Energy: The IoT battle
By: TechTarget ComputerWeekly.com
Type: Research Content
This article in our Royal Holloway information security series provides a set of security guidelines, tools and considerations for anyone in an organisation who is considering acquiring or implementing Bluetooth Low Energy-enabled devices.
-
Unified Communication: “It should work as easily as a telephone call!”
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This article in our Royal Holloway Information Security series explains the security implications of unified communication.
-
Enterprise cloud applications – can we trust them?
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
-
Royal Holloway: Man proposes, fraud disposes
By: TechTarget ComputerWeekly.com
Type: Research Content
In May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.
-
Mobile Payments Using Host Card Emulation with NFC
By: TechTarget ComputerWeekly.com
Type: Research Content
In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.
-
Towards more robust internetworks
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This article in our Royal Holloway Security Series explains how graph theory can be used to model internetworks and improve their resilience against failures and attacks.
-
Royal Holloway: Secure connected and autonomous vehicles - the long road ahead
By: TechTarget ComputerWeekly.com
Type: Research Content
Advances in technology have led to safety and comfort features being added to vehicles, with ambitious plans for driverless cars and other connected and autonomous vehicle (CAV) systems being developed. This article looks at some of the requirements, constraints and challenges, including two areas of uncertainty: data and software updates.
-
Royal Holloway: Securing connected and autonomous vehicles
By: TechTarget ComputerWeekly.com
Type: Research Content
This article introduces connected and autonomous vehicles, analysing the underlying technologies and considering their cyber security vulnerabilities and attacks. We identify and assess the existing and emerging countermeasures for such vulnerabilities, and propose high-level recommendations.
-
Safety Meshing: Hybrid trust models in social networks for end-to-end encryption
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This article in our Royal Holloway Information Security Thesis series looks at an alternative approach to end-to-end encryption.
-
Active defence through deceptive IPS
By: TechTarget ComputerWeekly.com
Type: Research Content
This article in our Royal Holloway security series explains how intrusion prevention systems (IPS) can be used with a 'honeynet' to gather intelligence on cyber attacks
-
The Investigatory Powers Act 2016 and Internet Connections Records
By: TechTarget ComputerWeekly.com
Type: Research Content
This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
-
A Computer Weekly buyer's guide to Colocation
By: TechTarget ComputerWeekly.com
Type: eGuide
Colocation is an increasingly appealing option for data storage. In this 17-page buyer's guide, Computer Weekly looks at the constraints of migration, environmental considerations and datacentre opportunities in Africa.
-
Deep learning for countering energy theft – a hybrid long-short term memory approach
By: TechTarget ComputerWeekly.com
Type: Research Content
Energy theft is a critical issue for power system operators and billions of pounds are lost to it every year. This article in our Royal Holloway security series describes a convolutional long short-term memory-based energy theft detection model to identify electricity thieves.
-
Demystifying the myths of public cloud computing
By: TechTarget ComputerWeekly.com
Type: Research Content
In this article in our Royal Holloway security series, Chris Hodson asks whether public cloud is less secure than private datacentres, and assesses service models, deployment, threats and good practice.
-
Digital secure remote payment: How Apple Pay can change the future of remote payments
By: TechTarget ComputerWeekly.com
Type: Research Content
Apple Pay introduces EMV cryptographic strength to remote payments for in-app payments on the iPhone and interconnected Apple devices. It has the potential to reduce card-not-present (CNP) fraud.
-
Royal Holloway: Driverless vehicle security for military applications
By: TechTarget ComputerWeekly.com
Type: Research Content
Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.
-
Nordics are leading the datacentre revolution
By: TechTarget ComputerWeekly.com
Type: eGuide
The Nordic region has space, access to renewable energy, a cool climate and a well-educated workforce. All these things make it a great place to build a datacentre. Read in this e-guide how the Nordic region is leading the datacentre revolution.
-
Royal Holloway: Testing antivirus efficacy in Linux
By: TechTarget ComputerWeekly.com
Type: Ezine
Antivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.
-
Royal Holloway: Purple team playbook – threat modeling for security testing
By: TechTarget ComputerWeekly.com
Type: Research Content
The reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams
-
Royal Holloway: Rowhammer – From DRAM faults to escalating privileges
By: TechTarget ComputerWeekly.com
Type: Research Content
Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them
-
Coronavirus: Total outsourcing spending collapses in March
By: TechTarget ComputerWeekly.com
Type: eGuide
IT spending plunged in March, drastically reducing increases that had been expected in the EMEA region.
-
MicroScope's ultimate guide to the digital transformation and emerging opportunities for the channel
By: MicroScope
Type: eGuide
The phrase might be one that gets over used at conferences and in pitches but it refers to something that is really happening and to revenue opportunities that are emerging right now. This e-guide will share some of the recent developments in the channel and the latest thoughts about the issue.
-
Preparing for S/4Hana upgrade
By: TechTarget ComputerWeekly.com
Type: eGuide
S/4Hana offers organisations many benefits in terms of speed and the ability to run the latest, cloud-ready platform. But the upgrade can be costly. This E-Guide looks at how IT decision makers can get ready for S/4Hana upgrade projects, while keeping their existing ECC systems running, and the upgrade options available to them.
-
Preparing for S/4Hana upgrade
By: Livingstone Group
Type: eGuide
S/4Hana offers organisations many benefits in terms of speed and the ability to run the latest, cloud-ready platform. But the upgrade can be costly. This E-Guide looks at how IT decision makers can get ready for S/4Hana upgrade projects, while keeping their existing ECC systems running, and the upgrade options available to them.
-
Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk
By: TechTarget ComputerWeekly.com
Type: Resource
Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.
-
A case study in critical infrastructure interdependency
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This article in our Royal Holloway Security Series provides a short introduction to Critical Infrastructure Protection.
-
Managing Android devices in the enterprise
By: TechTarget ComputerWeekly.com
Type: eBook
This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).
-
Proving ownership of IPv6 addresses
By: TechTarget ComputerWeekly.com
Type: Research Content
In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.
-
Insuring the uninsurable: Is cyber insurance worth its salt?
By: TechTarget ComputerWeekly.com
Type: Research Content
This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
-
CW Nordics: Bergen's tech hub seeks global success
By: TechTarget ComputerWeekly.com
Type: eGuide
Norway's second largest city, Bergen, is building a tech ecosystem that is beginning its development with a focus on the city's industrial heritage. Also in this issue, read how Norway's government has had to backtrack on a law that removed tax relief on energy consumption at datacentres that process cryptocurrency mining.
-
CW Nordics - August-October 2020: Bergen's tech hub seeks global success
By: TechTarget ComputerWeekly.com
Type: Ezine
Norway's second largest city, Bergen, is building a tech ecosystem that is beginning its development with a focus on the city's industrial heritage. Also in this issue, read how Norway's government has had to backtrack on a law that removed tax relief on energy consumption at datacentres that process cryptocurrency mining.
-
SD-WAN and SASE Managed Services Survey Report 2024
By: Aryaka
Type: Research Content
This report can provide you with insight into why SD-WAN and SASE managed services are essential for secure cloud connectivity and hybrid work. Access the report to learn how enterprises are integrating networking and security to address growing complexity.
-
Royal Holloway: An enhanced approach for USB security management
By: TechTarget ComputerWeekly.com
Type: Resource
USB flash drives and other USB-connected data storage devices offer a simple way of making data more portable and more easily transferrable. However, their use presents security risks that must be addressed. Apart from increasing the risk of data theft, they have often been used to transfer malware, sometimes with disastrous results.
-
BadUSB 2.0: Exploring USB man-in-the-middle attacks
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This article in our Royal Holloway Security Series explores the uses and capabilities of rogue USB hardware implants for use in cyber espionage activities.
-
GDPR: Risk, opportunity and what it means for security professionals
By: TechTarget ComputerWeekly.com
Type: Research Content
This article in our Royal Holloway information security series explains why GDPR is necessary, what it means for security professionals, and how they can approach GDPR in a positive way.
-
Computer Weekly: Data Danger
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's issue we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at three ways CIOs can fund digital initiatives. Plus, with the shift from traditional desktop IT, what is the future of Windows in a multi-device world?
-
CW Middle East - October-December 2020: Egypt's datacentre plans take a step forward
By: TechTarget ComputerWeekly.com
Type: Ezine
While it builds an IT services industry, Egypt is also investing in infrastructure and now plans to develop a datacentre industry. Read in this issue how, as part of this plan, Egypt's parliament has passed a data protection law.
-
Royal Holloway: Protecting investors from cyber threats
By: TechTarget ComputerWeekly.com
Type: Research Content
The cyber security of personal investors who use UK investment platforms to manage their pensions or savings is not well understood and not often discussed. In this Royal Holloway security article, we identify the principal cyber threats to investors' assets on UK investment platforms and what can be done to prevent or mitigate these threats.
-
How long does it take to get owned?
By: TechTarget ComputerWeekly.com
Type: Research Content
A study to investigatethe amount of time that it takes for stolen credentials to be used by a hacker.
-
Infosec culture: A former helicopter pilot's perspective
By: TechTarget ComputerWeekly.com
Type: Research Content
In this article in our Royal Holloway security series, former helicopter pilot Ashley Bye explains how the UK Military Aviation Authority's model for an engaged air safety culture could be used to reduce the prevalence and severity of cyber security incidents.
-
Royal Holloway: Corporate under-reporting of cyber crime
By: TechTarget ComputerWeekly.com
Type: Research Content
Without reporting, cyber crimes cannot be investigated, prosecutions cannot be pursued and effective prevention strategies cannot be developed. Yet despite this, most corporates fail to report cyber crimes. This article in our Royal Holloway security series explains why this is an increasing cause for concern.
-
Towards an Autonomous Vehicle Enabled Society: Cyber Attacks and Countermeasures
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Cyber-attacks against autonomous vehicles could have grave implications for safety, privacy, reputation of manufacturers, and public perception.