Data center

Confessions of a Network Engineer – Remote Access VPNs
In 2001, I joined a global retailer based in the Pacific Northwest as a network engineer. My first task was to build out a remote access VPN. At the time, after considering ...

Overcoming the Barriers to Zero-Trust
For more than a decade, companies have been working to implement a zero-trust approach to cybersecurity–with the goal of eliminating trust from a given data network by validating every stage of digital ...
Imperva Reaches New Heights as it Opens PoPs in Cape Town and Rio
Imperva is reaching new heights as we expand our global network of data centers with new points of presence (PoPs) in Rio de Janeiro, Brazil and Cape Town, South Africa. The two ...

The Cloud as the New Data Center: What it Means for Security
If your organization stores, collects and processes data – so, really, every organization – you need a data center. And, of course, “A business typically relies heavily upon the applications, services and data ...
Imperva is on Top of the World as it Announces New PoP in Bogotá
Imperva is on top of the world to announce the opening of our newest and highest data center yet in Bogotá, Colombia. This latest move represents our commitment as an organization to ...
Will Zero Trust Shape the Future of Cloud Security?
Zero trust is everywhere, and it will change the way we undertake security. Just as zero trust concepts are shaping the data center and our networks, they will shape cloud environments, as ...

Cybersecurity for Sports and Entertainment
As operations at sports stadiums become more dependent on data centers and online networks, and as the performance metrics and health data of athletes become more vulnerable to illicit exposure or alteration, ...
How Your Organization Can Prevent Data Breaches
Detection is essential, but correlation is critical. To prevent data breaches, you need to correlate events across multiple threat surfaces The post How Your Organization Can Prevent Data Breaches appeared first on ...

How Air Gapping Can Protect IP
In today’s hyperautomated world, organizations connect various environments, applications and databases to one another, creating complex infrastructures. Security professionals discuss the difficulties inherent in securing cloud environments, and the risks that third-party ...

Nurturing a healthy digital transformation process
Digital Transformation is already a familiar term. In its essence, it deals with the integration of digital technology in all business areas to bring better value to customers. Over the last year, ...