SASE and QoE: What you need to know

SASE and QoE: What you need to know

Since Gartner introduced the Secure Access Service Edge (SASE) concept last year, we see growing interest about it among our partners and customers across the globe. However, quite a few people are ...
Inline DDoS Mitigation: Could the Massive Amazon AWS Attack Have Been Avoided?

Inline DDoS Mitigation: Could the Massive Amazon AWS Attack Have Been Avoided?

Terabit(s) per second DDoS attacks have not disappeared. Perhaps they were just taking a rest. AWS just reported a 2.3 Tbps attack earlier this year that tried to knock out cloud services ...
Mobile World Congress (MWC) 2020 canceled – here’s what to do instead

Mobile World Congress (MWC) 2020 canceled – here’s what to do instead

(written with Dan Bloom) What is the Mobile World Congress? For years, the Mobile World Congress (MWC) has been the world’s largest exhibition for the mobile industry. In 2019, the annual communications ...
Data center management: best practices for attracting enterprise clients

Data center management: best practices for attracting enterprise clients

(written with Dan Bloom) Data centers are critical facilities that house computers, storage, and systems, which are all crucial for the daily operation of any modern business. There is currently a trend ...
The top telco conferences and trends shaping our future

The top telco conferences and trends shaping our future

For those of you that may not know about Allot, we’re a leading provider of cybersecurity solutions for communication service providers and innovative network intelligence for both service providers and enterprises all ...
Video Streaming: A Hidden Threat to Enterprise Quality of Experience (QoE)

Video Streaming: A Hidden Threat to Enterprise Quality of Experience (QoE)

The Rise of Video Streaming Popularity As Disney gears up to launch its streaming service, joining Amazon, Apple, Facebook, and more, video streaming is being adopted into the daily routine of many ...
Brute Force Attacks on IoT – Here to Stay?

Brute Force Attacks on IoT – Here to Stay?

IoT devices, such as routers, printers, televisions, cameras, lamps, baby-monitors and what-ever-else, can be found, well, everywhere. Their use has been growing for years and is expected to continue to grow. Unfortunately, ...
DNS Attack on Yandex – Can It Happen to You?

DNS Attack on Yandex – Can It Happen to You?

Last week, Russian media was hit with news about massive DNS (Domain Name System) attacks on Yandex, the country’s biggest technology company and local giant of internet search – essentially, the Google ...
How to Gain Maximum Value from Closed Loop Automation (CLA)

Closed-Loop Automation: What it means for CSPs | Allot

Where is Your CSP on the Closed Loop Automation Journey? Automation in telecom is not new. But it has evolved. Initially, it was about being more efficient at solving well-defined problems – ...