BLOG
Your Features are only as Strong as Your Hardware
In the telecom world innovation has taken the spotlight, opening the doors to new protocols, cutting-edge features, ambitious capabilities like 5G, NGFW, etc. Yet behind the scenes, there's a less glamorous, but equally vital actor: the robust hardware supporting all these technologies. Modern network devices nowadays promise more than ever, but these promises are...
Kategorien
Digital Transformation and Fiber Deployment in Europe
The digital transformation in the decade between 2020 and 2030 is clearly a priority for EU authorities. Large public investments have been approved to help provide high-capacity communications networks and prepare for the wave of innovation from new Artificial...
NetFlow collection: A new standard for advanced network monitoring
Data collection is an essential part of network management to ensure network devices are being efficiently monitored and managed. NetFlow and SNMP (Simple Network Management Protocol) are two widely used techniques for collecting network data. These two approaches are...
Who will manage SD-WAN?
SD-WAN (Software-defined Wide Area Network) technology makes it easier for businesses and organizations to manage the complexity of the WAN networks they work with, while optimizing connectivity costs and improving the experience of employees and customers in the use...
Why buses need to be protected from cyberattacks
It is a fact that Internet communications are ever more present in our entertainment, work and social interactions. As a result, the telecommunications industry is a continuously changing and growing sector where huge resources are devoted to research and development...
IoT Cybersecurity for Smart Cities
We are currently living in a time where Spain’s municipalities are receiving lots of aid through European Next Generation funds including, among others, the water and agri-food PERTEs (Strategic Projects for Economic Recovery and Transformation). Projects relating to...
Main cybersecurity threats for SMEs – cyberattacks
For the production fabric in general and for Spain in particular, SMEs play an important role. According to CEPYME (Spanish SMEs business organization), companies with 10 to 49 workers have had a very high employment generation rate in recent years and are now...
Choosing an SD-WAN Solution Model: Cloud vs On-Premise
Large and medium-sized companies have been implementing SD-WAN solutions for some years now, and recent studies confirm that the SD-WAN market is still booming. According to a report by the IDC, the market will grow by about 19% annually until 2025. There are several...
Railway hardware standards and certifications
Railway vehicle manufacturers, suppliers and rolling stock operating companies are required to meet mandatory, voluntary and contractual requirements for the construction, commissioning and operation of rolling stock and components. Rail testing companies provide...
Easy network deployment with Corporate ZTP
Zero Touch Provisioning is a method that can be implemented in different types of businesses, whereby the implementation of some technological parts of their limited ecosystem is optimally solved through the use of automated processes generally based on software and...
Limitations of Traditional Cybersecurity Solutions
Traditional cybersecurity solutions, such as firewalls and antivirus software, have been the mainstay of cybersecurity for decades. However, these solutions are becoming less effective in the face of more sophisticated cyber threats. One of the main limitations of...
The Rail Industry in the EU: Towards digitalization
When it comes to transportation, the train represents a symbol of pride for many European countries, reflecting the progress of industrial development and the engine of passenger mobility. As an example, the EU demand for passenger transport increased by around 10%...
The importance of Network Traffic Analysis – NTA tools in implementing cybersecurity in companies
Network Traffic Analysis - NTA tools and cybersecurity are two key areas of IT security. Both are essential to protect an organization’s systems and data. This article will discuss the importance of NTA tools and how they can help improve cybersecurity. Network...


































