Struggles and Solutions for Businesses and their Cybersecurity Policies
In previous articles we reviewed the overall topic of management interfaces to Taps and NPBs and in subsequent chapters took a deep dive into the topics of Fault Management and Configuration Management. In this chapter we will focus on Software Management and its related topics. Subsequent chapters will cover other management topics including accounting, performance monitoring, security and remote access.
On March 4th, 2021, the Infosec and compliance firm Qualys, a member of the Forbes 100 and a provider of security auditing services to over 10,000 customers globally, experienced an attack by a Clop Ransomware zero-day exploit target affecting the Accellion FTA server – a legacy file transfer technology. Many other companies were also targeted, but Qualys has stated that no ransomware was installed in their system, nor was there any request for payment received.
Electronic surveillance is a vital tool for State and Federal law enforcement, regulatory agencies, the Intelligence community, and a broad array of other government entities. Find out how network taps enable and improve network surveillance.
Network Taps, in addition to being available for copper or fiber media, can be purchased in a fixed configuration, typically called “duplex Taps” – or as “Aggregation Taps.” The latter category offers options for how the data copies are distributed among the monitor ports. This article will clarify the differences between the two Tap types, as well as exploring the rationale for different Tap configurations, and examples of their applications.
© 2021 Datacom Systems Inc. All Rights Reserved.
For the latest information, product updates, and to check the status of your service agreement, please contact our support team
Automated page speed optimizations for fast site performance