5. July 2021

What has network TAP ever done for us?

What has a network TAP ever done for us - Cubro
The fundamental component of any successful visibility solution is the 100% reliable, accurate source of network traffic delivered by network TAPs used for network performance and security monitoring.
22. June 2021

What has network visibility ever done for us?

What has network visibility ever done for us
Network visibility solutions have evolved from tapping and aggregation use cases to delivering many essential use cases, which significantly contribute to organizations’ ability to retain existing customers, win new customers, manage costs, improve data security, achieve and maintain regulatory compliance.
10. March 2021

Network Visibility is Insurance for your Network

Network visibility is insurance for your network
Every minute a critical network service, or the network itself, is down which results in lost revenue. Cubro’s line of Network Visibility and Monitoring products create the foundation for the same level of protection and risk mitigation that your company’s physical assets enjoy.
28. September 2020

Why network visibility is essential for successful Digital Transformation outcomes?

NPB technology can help businesses and organizations to significantly reduce the risk of not achieving or delaying a successful digital transformation outcome to help them increase their revenue, profitability and share value.
3. September 2020

The value of network visibility solutions for today’s Service Provider and Enterprises

Value of network visibility solutions
Network visibility technology has been deployed by Service Providers and Enterprises for the last 15 years or so and remains as important to a successful business and IT outcomes today as it was then. The use cases for visibility technology have developed as networks have changed and are now able to provide new, incremental value to organizations. The blog examines the value of visibility solutions and the reasons why they are essential for the success of contemporary IT initiatives and business outcomes.
4. May 2020

Security Hygiene for Remote Workers: Part 4

Security hygiene for remote workers part 3
In the previous installment we secured our Wi-Fi and discussed segmenting our network to the best of our ability. All this work will be for naught, however, if we allow malicious software in through our own actions. In this final installment we will examine user behaviour and review known avenues of exploits relative to the coronavirus outbreak.
23. April 2020

Security Hygiene for Remote Workers: Part 3

The Wireless Network and Segmentation
In this section, we will turn our attention to the wireless portion of the home network because restricting access to our network from the outside world does little good if a bad actor can gain access to our LAN. When setting up our Wi-Fi we absolutely want to be using WPA2 with PSK at a minimum (That’s Wireless Protected Access 2 with Pre-Shared Key).
15. April 2020

Security Hygiene for Remote Workers: Part 2

Sensitive Data and Work Compputer
In the previous article, we discussed what we can do to protect sensitive data while working remotely as well as good practices to secure our computer systems against malware and exploits. In this section, we will take a look at what could be the most neglected piece of equipment in your home network: your router.
8. April 2020

Security Hygiene for Remote Workers – Part 1

blog-pic_Security-Hygiene-Remote-Workers_system_blog
With the spread of the SARS-COV-2 virus, responsible for COVID-19, an unprecedented number of people have found themselves working remotely. This brings a lot of new challenges to bear, not the least of which is simply putting together a workspace in the home. Unfortunately, a remote worker’s considerations shouldn’t end at simply gathering the tools to work remotely. It is very important during this time to be conscious of security practices regarding your computing habits and home network.
EN
Contact technical expert