Click to learn more about author Leonid Sandler. Traditional cybersecurity product categories separate data protection products from network security and cloud workload protection. The reasons go back to the history of the cybertechnology evolution and the major technology players’ spheres of influence. Ultimately, of course, the biggest motivation for any cybersecurity product across any of […]
A “Thing” Explainer – Technology Edition
Click to learn more about author Leon Adato. With so many technology buzzwords flying around (and it seems more being added by the day), it’s become increasingly difficult to fully grasp the functionalities of new technologies before the “next best thing” is announced, revealed, merged, acquired, or discovered. As tech pros, we have a difficult job […]
The Next Step in Data Routing: Sharing Information Between the Control and Data Planes
Click to learn more about author Gur Shatz. In a few short decades, the Internet evolved from an obscure way for the military and academics to communicate to the dominant network for the world’s business and entertainment industries. A lot has changed, especially when it comes to how routers – the beating heart of the Internet […]
Evolving Cloud Networks and How to Keep Them Secure
Click to learn more about author Pete Johnson. The triumvirate of the Data Center world has traditionally consisted of compute, storage and networking, so naturally Cloud Computing has been based on the same. Just as we saw in the private Data Center world, networking tends to lag the other two in terms of evolution, and […]