Will Subscribers Pay for Security?

By John Klassen, Product Marketing, Carrier Products

will-subscribers-pay

Posted on March 14, 2018 in: Security

Tags:

Carriers see security as a vital component of their five-year strategies and expect to increase spending on security in 2018 according to the Telecoms.com Annual Industry Survey 2017. Is security a good business opportunity for Carriers?

Read more

Secure by Design

By John Klassen, Product Marketing, Carrier Products

light bulb

Posted on February 13, 2018 in: Security

Tags:

Carriers providing value-added services need to protect both their network infrastructure and their end-customers from internet threats. New threats are constantly emerging but remodeling your security architecture to address each new threat may leave gaps in your security coverage. Bolting-on third-party products to fill gaps isolates your core architecture from change but creates complexity and management challenges such as multiple operating consoles and data integration barriers. Are carriers fighting a losing battle?

Read more

Discover, Register and Pair: Securing and Managing Fixed and Mobile Users

By Pierre Ehsani, Senior Director, Product Management

Posted on October 12, 2017 in: General

Tags:

Service providers looking to enhance and secure the online experience for their residential and business subscribers often struggle to find solutions that are easy for their customers to configure and use – particularly when it comes to setting policies that carry across fixed, mobile and converged networks. This type of simple, seamless management is actually a key distinguishing feature of Nominum N2 solutions. And not just from a “here’s what our products can do” perspective, but from a “here’s how easily your customers can do this” perspective.

Read more

A Productive Path to NFV

By Bruce Van Nice, Director of Product Marketing

Posted on September 19, 2017 in: Network

Provider networks continue to experience growth in traffic, which raises costs, without corresponding growth in revenues. Accommodating this growth and increasing complexity while managing costs is forcing CSPs to assess how they build and maintain their networks. Everyone agrees everything ultimately resolves to software and fortunately there’s been considerable innovation that will support provider business imperatives.

Read more

Keeping up with DNSSEC

By Mark Dokter, Senior Product Manager, and Ralf Weber, Senior Architect

network security

Posted on September 14, 2017 in: Network

Tags:

DNS was first conceived in 1983, back when one of the most memorable movie quotes of all time was popularized: “Go ahead, make my day” (Clint Eastwood in “Sudden Impact”). The internet as we know it today did not yet exist; however, ARPANET, its predecessor network, was the exclusive domain of a small group of academics and researchers, so no one gave much thought to security. A lot has changed.

Read more

Infographic: How Botnets Work

By Yohai Einav, Principal Security Researcher

Posted on August 31, 2017 in: Security

Tags: ,

With IoT on the rise, consumers are rightfully afraid of privacy invasions. But, infected devices can serve far more sinister purposes. Herewith, we breakdown the ways a botnet works.

Read more

Take a Bite out of Cybercrime by Analyzing New Core Domains

By Yuriy Yuzifovich, Head of Security Research and Data Science

hands on keyboard thumb

Posted on August 24, 2017 in: Security

Tags: ,

We just conducted our monthly Cyber Insider discussion, this time focusing on what deep analysis of new core domains reveals about new threats and zero-day malware. As a company that processes 1.7 trillion DNS queries a day and analyzes 100 billion queries a day from our global service provider customers, we are in a unique position to gain insights.

Read more

A Rich Policy Language for the DNS

By Ralf Weber, Principal Architect, Special Projects

Rich Policy Language DNS

Posted on August 10, 2017 in: Network, Security

Tags: , ,

For many years ISPs in certain parts of the world have been required by their regulators/governments to redirect certain websites that were deemed malicious or suspicious. DNS offered a straightforward way to do this; and Nominum, being a DNS company, developed an early mechanism using a DNS zone file that made it simple for ISPs to comply. The technology was originally named “Malicious Domain Redirection” (MDR), and it basically allowed DNS server operators to perform a single action for a given domain name. Actions could be categorized so that each action or redirection did not have to be repeated.

Read more

How CSPs can Close the Security Loop for SMBs

By Sue Rudd, Director, Service Provider Analysis, Strategy Analytics

credit card point of sale

Posted on August 8, 2017 in: Security

Tags:

The rising cost and complexity of today’s evolving cyberattacks require organizations to take a new approach to cybersecurity – one that blocks threats and malicious sites at the network level and is characterized by a closed loop model. This is particularly true for the small and medium-sized business (SMB) market, where cost constraints and limited security expertise leave Main Street businesses around the globe vulnerable to ransomware and other damaging malware.

Read more

1 2 3 12