Application Delivery and Application Security Should be Combined

Application Delivery and Application Security Should be Combined

Most businesses have multi-function printers that can fax, scan, and copy. In our roles, we are multi-functional as well. A network architect is often the operational troubleshooter because of his/her knowledge and expertise. The financial expert can take on the role of the supply logistics because of their understanding of ... Read More
Application SLA – Knowing is Half the Battle

Application SLA – Knowing is Half the Battle

In today’s world, digital transformation has changed how people interact with businesses and conduct their work. They interface with applications on the network. These applications need to be responsive and provide a quality of experience that enables people to appreciate the business and the services they provide. When an application ... Read More
Encryption is a Double-Edged Sword for the Healthcare Industry

Encryption is a Double-Edged Sword for the Healthcare Industry

The healthcare industry must take security and privacy seriously. They collect and retain personal health information (PHI) and financial information while providing life-saving medical care. The protection of this information and the networks that manage it is one of the top concerns for IT organizations in the healthcare industry. SSL/TLS ... Read More
Encryption is a Costume to Hide Threats on the Internet

Encryption is a Costume to Hide Threats on the Internet

It is the time of the year where adults and children alike put on costumes and go out to gather candy or create mischief. The costumes are scary or cute, but always achieve the goal of obfuscating the individual and hiding their true identity and intent. The person wearing the ... Read More
Old Technologies Enable Future Secure Application Delivery Networking

Old Technologies Enable Future Secure Application Delivery Networking

Many years ago, one of my customers had an internet-facing application. They positioned load balancers in front of the application to support the growing traffic load. Traffic to the website was growing so fast, that parts of the network infrastructure could not support the customer load. One of the first ... Read More
Financial Institutions Must Protect the Data Like They Protect the Money

Financial Institutions Must Protect the Data Like They Protect the Money

If you are like most people and myself, you do not go into a bank and have a conversation with a teller when you make a deposit or withdrawal. You probably do not write paper checks and sign them. You have an app on your phone to access your bank ... Read More
5 Key Items for the Digital Transformation of Healthcare

5 Key Items for the Digital Transformation of Healthcare

People’s lives are at risk as the healthcare industry transforms patient care with modern IT technologies. Data security and application availability are essential when a patient’s medical information is on the network. Hospitals and medical practices are digitizing healthcare applications like x-rays, CAT scans, medication distribution and surgical procedures using ... Read More
SSL Attacks – When Hackers Use Security Against You

SSL Attacks – When Hackers Use Security Against You

In World War II, the Allies had a significant advantage because they were able to compromise the encryption protocols that the Japanese and Germans used to send sensitive messages. They were able to intercept and decode messages to gain intelligence concerning sensitive military operations. In today’s Internet Age, malicious hackers ... Read More
Outbound SSL Solutions Protect Assets in the Wild

Outbound SSL Solutions Protect Assets in the Wild

Businesses need to protect their assets when they are within their protective infrastructure AND when they are actively exposed or placed within the unprotected external world. The tools and procedures needed to protect the internal assets are different from the ones that protect the assets when they leave the confines ... Read More