skip to Main Content

White papers

ENABLING ADAPTIVE SECURITY WITH ADVANCED THREAT DETECTION SOLUTIONS

According to the Symantec Internet Security Threat Report of April 2016, 431 million new malware variants were discovered in 2015…

HOW TO BUILD AUTOMATED NFV INFRASTRUCTURE

It’s been nearly five years since Network Functions Virtualization (NFV) was first conceived by a group of leading network operators…

FULFILLING THE PROMISE OF NFV

After some 49 months of intensive activity, network functions virtualization (NFV) has transitioned from a concept defined in a…

collateral-dummy-wp-574x400

THE LAST SECURITY TOOL

There is a new area of challenge to the security teams in the enterprise, government and education sectors – the constant attack…

PROVIDING SECURITY, AGILITY AND INSIGHT FOR DYNAMIC CLOUD CONNECTIVITY

Since the turn of the century, cloud computing has evolved to address a wider range of needs. Applications that one never imagined…

cover-wp-accelerated-pcap-img-574x400

ACCELERATED PCAP: AN ARCHITECTURE FOR PRECISION PACKET CAPTURE AND ANALYSIS ON HIGH-SPEED NETWORKS

There are a number of tools and capabilities available to engineers and administrators to help them manage and secure large and small-scale networks alike…

cover-wp-closing-the-real-574x400

CLOSING THE REAL-TIME INTELLIGENCE GAP

The volume, velocity and variety of data ingested by today’s data-intensive analytic platforms presents a significant challenge for decision makers…

cover-wp-the-time-has-574x400

THE TIME HAS COME FOR GREATER PRECISION

This white paper outlines what is required to achieve nanosecond precision time-stamping. The world of precision time-stamping…

Discover our networking industry blog to discuss the latest in Big Data, IoT, SDN and NFV.

Back To Top