
How the tech industry can embrace the female audience
What does this have to do with an IT security and connectivity specialist like Infradata, I hear you ask (go on, you know you were going to!). The answer is, more than you’d think.

SD-WAN
Do you want an SD-WAN with basic security or robust secure SD-WAN
Instead of accommodating increasing and variable demand with costly, inflexible WAN connections, more network leaders are looking to implement a software-defined wide area network (SD-WAN). SD-WAN is attractive not only because it provides more efficient and cost-effective bandwidth allocation, but also because it improves WAN performance, agility, and operational flexibility.

To automate your DevOps processes, start with monitoring
Within companies trying to scale to even moderate size and sophistication, IT must change its focus from "making it work" to "making it efficient." It's not surprising, then, that themes such as agility and automation are now among the most important design criteria.

From start-up to scale-up, and beyond…
It wasn’t so very long ago that the FTSE 500 was a pretty predictable patch. Most of the companies that made the cut had been in existence for up to 75 years, and having achieved their status they clung onto it. Newcomers were few and far between in this most exclusive of clubs.

Contain Yourself
Containers inherently address the need of how to make mission-critical software work in different computing environments. A container consists of the application and its runtime dependencies; that is, an application, libraries and other binaries, and configuration files needed to run it, bundled into one package.

CSR
Why a secure and connected future is critical for the UN SDGs
How Infradata is exemplifying the UN Sustainable Development Goals (SDG).

Palo Alto Networks
Palo Alto Networks Announces Cloud-Based Logging Service in Europe
Palo Alto Networks announced the launch of its cloud-based Logging Service in Europe. This service allows customers to collect large amounts of their own security data from the Palo Alto Networks Next-Generation Security Platform, making large scale log collection affordable while addressing data privacy and location needs for many European organizations.

Juniper Networks Reinforces Commitment to Open Source
Juniper Networks further bolstered its support for open standards during its annual NXTWORK user conference, by announcing its intent to move the codebase for OpenContrail™, an open-source network virtualization platform for the cloud, to the - Linux Foundation.

How Financial Services Firms Can Protect Against DDoS Attacks
DDoS attacks are becoming increasingly common across the financial services industry. DDoS attacks occur when a portion of the network is targeted, typically at the networking, transport, or application layer, with a flood of requests that overwhelm network bandwidth, causing it to slow or crash completely.

The Convergence of Security and Network Operations
More complex business networks, including cloud services and infrastructure, mobile applications, virtual desktops, SDN/NFV, and IoT systems, are taxing both security and network operations teams. At the same time, increasingly sophisticated and persistent attacks are challenging traditional organizational roles and structures.

Cloud security Network security
10 Security Predictions for 2018
Today, we’re going to do our best Kreskin impression and attempt to predict the state of cybersecurity in 2018.

Why NFV and SDN are the bricks and mortar behind 5G
As part of the Technical Consultancy team at Infradata, I’ve had the privilege of working almost exclusively with SDN & NFV technologies since 2014. Three years on, I confess, the technology has not caught on quite as rapidly as my younger self thought.

Why gambling with your infrastructure stacks the odds against you
Today in Britain, online gambling accounts for 33% of all gambling spend, meaning that more people are parting with their pounds over the internet than in any other gambling format.

Firewall
A clean firewall is a healthy one
The fact that a firewall needs to be 'clean' in the first place may sound odd, but it is of great importance and often overlooked.

Miss you already – why GDPR is the next PPI
If I had a pound for every PPI related advert, email, text or unsolicited phone call I’ve ever received I’d be a wealthy woman, it would certainly amount to more than most actual PPI claims.

Who's wearing the trousers?
In my current role I’m surrounded by intelligent, funny and successful people. The fact I see them as colleagues rather than genders is entirely normal in my head.

Meet Petya: the new type of Ransomware that infected the world this week
Over a month after the WannaCry attack, yet another type of Ransomware has resurfaced this week, codename: Petya. Companies have been infected worldwide,

Almost three quarters of IT security professionals claim to be better protected, but the cybercriminals are winning the war
Infradata today announced the results of its IT security survey conducted at Infosecurity Europe 2017. According to the IT security professionals who took the survey, 72% of organisations think they are better protected than they were twelve months ago.
Sign up for our newsletter
Get the latest security news, insights and market trends delivered to your inbox.