Are you ready for the MiFID II time synchronisation compliance deadline?
With less than a year until MiFID II compliance comes in to force and much speculation over the severity of fines and penalties for non-compliance, now is the perfect time to engage with us regarding your requirements for MiFID II compliance.
Download the Power over Ethernet (PoE) Reference Poster
This 1 page reference poster that you can print at your own office will serve as a quick guide for powered devices and the 802.3af/at Standards A and B.
Optical Circuit Switching Questionnaire
To help us further understand the needs of the future market for Optical Circuit Switching, we ask that you assist us by completing OUR short questionnaire. As a thank you for your assistance, we will enter your name to our prize draw to win 1 of 3 iPad Minis.
Packet Capture Questionnaire
To help us further understand the needs of the future market for Packet Capture, we ask that you assist us by completing the short questionnaire below.
As a thank you for your assistance, we will enter your name to our prize draw to win 1 of 3 iPad Minis.
ThreatARMOR blocks bad IP addresses to enhance IDS capability for a Service Provider
In the case of HyperBox, ThreatArmor reduces the number of daily security alerts from 1 million down to 200,000. This includes DDoS attacks, phishing and botnet connections and automated probes and scans.
Need a new Firewall or IPS? Hold Fire!
And by the way, new bad IP addresses emerge every single day – do you really want to manually update your Firewall rules at the same rate? Or would you prefer the block list to automatically update every 5 minutes?
Ixia ThreatArmor now available in 10Gbps
To cope with the growing demand placed on Enterprise networks to remain secure whilst consistently delivering business-critical systems and applications enablement, the Ixia ThreatArmor solution from Phoenix Datacom is now available in 10Gbps as well as 1Gbps.
We left an Ixia ThreatARMOR in our test network, when we returned, we were pleasantly surprised.
Drinking our own champagne: Ixia ThreatARMOR in the Phoenix Datacom test network automatically blocking known bad IP addresses.
What is Ransomware and how can you protect against the threat?
Though there are many different types of Ransomware and the list and attack frequency are growing, protection and mitigation does not have to be a difficult and costly exercise.
Hardening the performance and resiliency of your existing cyber-security environment
Read the post-event write-up from our recent hot-topics event in the area of hardening the performance and resiliency of your existing cyber-security environment.