15. April 2020

Security Hygiene for Remote Workers: Part 2

Sensitive Data and Work Compputer
In the previous article, we discussed what we can do to protect sensitive data while working remotely as well as good practices to secure our computer systems against malware and exploits. In this section, we will take a look at what could be the most neglected piece of equipment in your home network: your router.
8. April 2020

Security Hygiene for Remote Workers – Part 1

blog-pic_Security-Hygiene-Remote-Workers_system_blog
With the spread of the SARS-COV-2 virus, responsible for COVID-19, an unprecedented number of people have found themselves working remotely. This brings a lot of new challenges to bear, not the least of which is simply putting together a workspace in the home. Unfortunately, a remote worker’s considerations shouldn’t end at simply gathering the tools to work remotely. It is very important during this time to be conscious of security practices regarding your computing habits and home network.
10. March 2020

Control What You Can and Acknowledge What Is Beyond Control

Empower yourself with the right tools; take control of your network
It seems we are constantly dealing with natural disasters, epidemics, pandemics, and economic crisis. While these are situations that are, quite simply, beyond anyone’s control one can and should be prepared for a variety of circumstances to the best of their ability. The good news is we almost always have far more control to correct the issues related to the network. With regards to day to day operation, the right tools can assist you in accelerating troubleshooting, improving security, and optimizing efficiency.
7. November 2019

LTE GTP Load Balancing with Cubro Advanced NPB

With the growth in end-user needs for high bandwidth due to Netflix, WhatsApp, YouTube, Instagram, etc, there is a demand for much-sophisticated network management and monitoring of the traffic. An efficient load balancing (LB) can only be done with one powerful entity based on a deterministic identifier. Any solution based on additional meta-information will fail because a meta-information had to be computed and there is no error-free algorithm.
23. September 2019

EXA32100 VXLAN Termination – To Save Your Sanity!

Using Cubro EXA32100, the customer can reduce business costs by making the team more productive. The service provider can save money because it needs to spend less on the cost of network operators.
11. September 2019

What Business Benefits Does Cubro EXA8 Provide

Enterprises need a more intelligent network security and monitoring approach which provides granular visibility down to the link layer. The EXA8 is an all in one portable monitoring and troubleshooting tool addressing the need of the enterprise market.
8. April 2019

Network security works only if you see the right traffic

Security is nowadays an important part of network management. Secure networks are vital for running an uninterrupted business, preventing data loss and maintaining the overall image of the business. Security challenges are increasing …
2. April 2019

The downside of virtual probing approach in mobile networks

For probes to get the relevant traffic, it needs smart network visibility solution which we offer at Cubro. In legacy networks, we use network TAPs, aggregators, NPB "network packet brokers" to feed the relevant data to the probe …
26. March 2019

How to improve enterprise network visibility

Network requirements are constantly changing in enterprises. The network goal of every enterprise is to be more efficient and cost-effective while embracing the changes. There are several network visibility solutions/vendors available in the market …
EN
Contact technical expert