GDPR: Will you be responsible or response-able?

At TM Forum Live! (in Nice in May), Microsoft’s Karel Dekyvere will deliver a presentation on ‘Security & privacy standards and regulations – what is enough, is there ever too much?’. In this post, he takes a looks at the General Data Protection Regulation (GDPR) legislation. The General Data Protection [...]

2017-03-08T12:25:41+00:00 Mar 15th, 2017|Categories: Breaking News, Feature Stories, NMS Essentials|Tags: , |0 Comments

How to secure IoT devices to protect your Enterprise Networks

 Secure IoT devices is not a luxury any more. Recent news headlines describe hackers intrusions into otherwise strong, well-defended networks. These hackers targeted low-profile, low-value network components like CCTV and DVRs Internet of Things (IoT) devices. So why is IoT becoming the target of choice for skilled hackers? Well, vendors do not [...]

2017-03-08T10:07:10+00:00 Mar 7th, 2017|Categories: Breaking News, Feature Stories, Technologies|Tags: , |0 Comments

IoT security is important – Unsecured IoT devices are used in DDoS Botnets

Distributed Denial of Service (DDoS) attacks on the DNS infrastructure are neither new nor rare. What is new, however, is the scale of the attacks, and the use of a network of compromised IoT devices as the source of the attack. IoT security is thus becoming a very important issue [...]

2017-02-14T11:32:10+00:00 Feb 22nd, 2017|Categories: Feature Stories|Tags: , |0 Comments

Cisco announces new release of Tetration Analytics to Help Secure Business Applications

Cisco announced recently that with a new release it's product Cisco Tetration Analytics now automates policy enforcement, enabling organizations to build secure environments for their business applications and also expands Tetration with new deployment options. According to Cisco, the latest software for Tetration Analytics provides the industry’s first consistent security policy enforcement applied holistically [...]

2017-02-07T14:37:37+00:00 Jan 31st, 2017|Categories: Breaking News|Tags: , |0 Comments

Introduction to FCAPS – Fault, Configuration, Accounting, Performance, Security

FCAPS is a model created by TMN to be used by Network Operators and Service Providers to compare capabilities and features of Management & Monitoring Systems. The FCAPS model is used for Element Management Systems (EMS), Network Management Systems (NMS) and Operation Support Systems (OSS), it is therefore a universal model. [...]

2016-11-29T12:57:51+00:00 Nov 29th, 2016|Categories: Functions (FCAPS)|Tags: , , , , |1 Comment

NICE Situator – A leading Physical Security Infrastructure Management Solution

Overview NICE belongs to the top-5 Physical Security Infrastructure Management (PSIM) vendors that offer large scale customizable & feature-rich software, targeting large scale implementations with multi-million CAPEX and hundreds of thousands maintenance OPEX. These projects are high-end PSIM applications, for critical infrastructure, e.g. transportation, communication, government. NICE was the [...]

2016-10-24T07:47:46+00:00 May 18th, 2014|Categories: Physical Security Infrastructure Management|Tags: , |0 Comments

Security Management in the FCAPS model

Security Management is a Network Management function that is about protecting both the network as a whole and the individual devices against intentional or accidental abuse, unauthorized access and communication loss. Security Management is also responsible to set constraints per managed element, according to standards & specifications. Implementing an SNMP-based [...]

2016-10-24T07:47:52+00:00 May 25th, 2013|Categories: Functions (FCAPS)|Tags: |0 Comments