Skip to content

The Next Evolution in Network Visibility

Organisations are caught in a constant cycle of deploying new services, supporting new use cases, and managing growth – which results in networks that are

8 STEPS TO START THREAT HUNTING

What is Threat Hunting Whether the process is called threat hunting, cyber hunting or cyber threat hunting, each term essentially means the same thing: security

Shaw reports 8.1% revenue growth in fiscal year; Freedom unit deploys new LTE spectrum

Canadian quad-play cableco and mobile group Shaw Communications has reported its consolidated financial results for its fiscal fourth quarter and year ended 31 August 2017.

Infosim® provides any-to-any IoT management with StableNet®

The unprecedented complexity of IoT is bringing together a universe of “things” that were not designed to work together or share data. Data is increasing

Infosim’s SDN/NFV-enabled Security Architecture for Enterprise Networks

Infosim® together with University of Würzburg, TU Munich & genua mbH Key Learning Objectives  ​The SarDiNe Research Project Fine-grained Access Control in SDN Networks Resiliency

Infosim: Go with the flow – choose the right tool though!

NetFlow is a handy tool in the daily work of Network Admins and Analysts. It can be used to measure traffic in networks from an

Viavi’s On-Demand Application Dependency Mapping Central to Latest Observer Update

New Observer Apex offers faster loading speeds, connection dynamics functionality for packet visibility, on-demand application dependency mapping (ADM), improved widget editor for faster insights, VoIP

Infosim’s Veni, Vidi, Vici: Seeing as an integral part of conquering your network Webinar

Infosim’s Global Webinar Julius Caesar knew that, in order to conquer an issue, you need to get a good overview of the situation you are