Posts by Martin Krebs

Zero-touch deployment

Unpack, plug in, connect, and the cloud takes care of the rest. What sounds like a dream to any network technician or IT admin can actually be a reality when commissioning and rolling out devices on the network. The solution: “Zero-touch deployment“.

Think big – Wi-Fi 6

Wi-Fi 6 in high-density environments

The display at the airport gate shows a delay to two hours—quite a wait until departure. Now the smartphones and tablets are running hot: Video streaming, messenger services, and all sort of apps on numerous devices. Because web users tend to prefer surfing by wireless LAN, large numbers of clients access the airport public Wi-Fi […]

Application-based routing: Boost your WAN!

Last autumn, Gartner released an article headlined “SD-WAN Is Killing MPLS, So Prepare to Replace It Now”. This was a clear message to every company looking for effective networking between their branches, sites and headquarters.

Just don’t lose control over your Wi-Fi

Be it at work or in your own home: Fast and secure Wi-Fi is pretty much taken for granted these days. When it comes to security, the reality may look very different. Or are you able to keep track of exactly who is in your company network at all times?

When Networks Become Virtual

In 2016 analysts Gartner declared that the industry trend of server virtualization had reached maturity. Almost twenty years after the introduction of the very first virtualization functions, some of the companies questioned during the survey declared they had already virtualized 90% of their servers. On average, firms reported that they had a virtualization rate of […]

Getting to Grips with Switch Security – 4 Ways of Using 802.1X

802.1X Switch Security Standard

When you visit a company or public building these days, on arrival you often receive the Wi‑Fi login data for the free guest access. In most cases, hotspots that offer guest access are securely separated from the company network and prevent any access to internal data. So when it comes to wireless network security, we […]

Securing Voice-over-IP – Put an End to Eavesdropping

Analog telephony has a long history, dating back to the 19th century inventors and pioneers of the telephone Innocenzo Manzetti, Philipp Reis and Alexander Graham Bell. But the days of analog communication are numbered and, gradually, digitalization is taking over.

Clone wars – How to secure yourself from an evil hotspot

Evil Twin Access Point

If we take a look at which countries have the best-developed public Wi-Fi networks, it quickly becomes clear that countries with smaller economies are leading the way worldwide. According to a recent study by Rotten WiFi, numerous smaller European nations belong to the top 20 countries offering public Wi-Fi.

Certificate Authority for everyone? Or how to lock the NSA out

Post_NSA

Most companies today operate at several sites and use public networks to stay interconnected. With the aim of securing communication over the Internet, encryption techniques have seen significant development and refinement in recent years. In the case of site connectivity via VPN tunnel, the IPSec protocol is considered to be highly robust and secure.