Introducing the Cisco Technology Verification Service
By Anthony Grieco Building Trust and Transparency One Step at a Time Like all successful companies, we listen to our customers and strive to exceed their expectations. Our customers expect us to be trustworthy, transparent and accountable. As a company, there are many ways we are doing just that. We started this journey more than […]
Introducing the Cisco Technology Verification Service
By Anthony Grieco Building Trust and Transparency One Step at a Time Like all successful companies, we listen to our customers and strive to exceed their expectations. Our customers expect us to be trustworthy, transparent and accountable. As a company, there are many ways we are doing just that. We started this journey more than […]
FUJITSU Aktionsmodelle November 2015
FUJITSU Aktionsmodelle November 2015 Auch in diesem Monat gibt es wieder aktuelle Aktionsmodelle unseres Technologie-Partners FUJITSU. Bitte berücksichtigen Sie bei Ihrer Planung der Rest-Budgets, dass für individuell gebaute Systeme etwa 2 Wochen Lieferzeit einzuplanen sind. Aktuelle Angebote für mobile Systeme. Aktuelle Angebote für Desktopsysteme. Aktuelle Angebote für Server- und Speichersysteme. Wir freuen uns auf Ihre […]
An introduction to the new Cisco Network Visibility Flow Protocol (nvzFlow)
By Vinny Parla As recently announced , Cisco AnyConnect 4.2 extends visibility to the endpoint with the Network Visibility Module (NVM). Users are one of the most vulnerable parts of any security strategy, with 78% of organizations saying in a recent survey that a malicious or negligent employee had been the cause of a breach. […]
An introduction to the new Cisco Network Visibility Flow Protocol (nvzFlow)
By Vinny Parla As recently announced , Cisco AnyConnect 4.2 extends visibility to the endpoint with the Network Visibility Module (NVM). Users are one of the most vulnerable parts of any security strategy, with 78% of organizations saying in a recent survey that a malicious or negligent employee had been the cause of a breach. […]
How (not) to Sample Network Traffic
By Martin Rehak This post has been authored by Karel Bartos and Martin Rehak The volume of the network traffic has been steadily increasing in the last years. In the same time, the delivery of critical services from cloud data centers has increased not only the volume of traffic, but also the complexity of transactions. […]
How (not) to Sample Network Traffic
By Martin Rehak This post has been authored by Karel Bartos and Martin Rehak The volume of the network traffic has been steadily increasing in the last years. In the same time, the delivery of critical services from cloud data centers has increased not only the volume of traffic, but also the complexity of transactions. […]