"ZK Research conducted a recent study of the Application Delivery Controller (ADC) market and finds that the landscape for load balancers and ADCs is rapidly changing in the face of these market forces.
Join Principal Analyst Zeus Kerravala for an informative session to learn:
- Common application delivery challenges
- On-premises vs. cloud considerations for ADCs
- Trends in delivering cloud-native applications
- Trends in troubleshooting
- Future solutions being considered
- What are the features most in demand that network engineers aren't getting
Watch the On-Demand Webinar by filling out this form."
Certain types of diseases seem to only occur within certain national boundaries. Malware is not one of them. A formidable threat to enterprise security since the 1980s, cybercrime is a truly global phenomenon, and no business is safe from its reach.
A brief look at the history of malware attacks reveals a degree of variance within the virtual threat landscape that makes pinpointing and stopping such attacks extremely difficult.
As the historic virus examples illustrate, the malware problem has been and will continue to be a constant threat. Since an offensive line against cybercrime is not possible, enterprises need to prepare the best defense they can.
Published By: Masergy
Published Date: Sep 18, 2019
Slow is the new broken, and SD-WAN is helping IT teams move at the speed of today’s digital innovation. But an SD-WAN investment requires you to make critical decisions around architectural design, the use of broadband connectivity, and security. How do you navigate those decisions and identify the right service provider? Zeus Kerravala, Founder and Principal Analyst at ZK Research, offers his guide to investing in SD-WAN.
Take the stealth, creativity and patience of Stuxnet, the commercialism, wide
distribution and easy-to-use toolkits of Zeus, and you understand the potency of today’s malware. Start planning now to protect your intellectual property and other assets.
Attacks today incorporate increasingly sophisticated methods of social engineering and client-side software manipulation to exfiltrate data without detection. Some attackers leverage so-called spearphishing to entice employees to give up access information and spread their attacks to other enterprise systems; others use password crackers against compromised applications in order to gain further access rights to the network. The attackers might also set up channels for command and control communications with the compromised systems, as in the case of the Zeus or SpyEye bot infections.
Published By: Polycom
Published Date: Jun 08, 2016
"There are many ways to take advantage of the rich set of collaboration tools provided by Microsoft Skype for Business. IT leaders should consider a cap-and-grow Skype for Business strategy and then think through how it can be leveraged as a replacement technology.
Digest this white paper by leading UC analyst Zeus Kerravala for insight on the 14 best practices for a Skype for Business Enterprise Voice deployment. Enabling IM and presence first, expanding desktop applications, and more are details in this informative piece.
This white paper examines five steps to better security that today's retail businesses can't afford to ignore on their networks - from application control to data loss prevention - to ensure business continuity and PCI DSS compliance.