Axial’s Managing Director on Partnering with Ixia

written by

Axial’s Managing Director discussing our relationship with Gigamon

written by

Developing an IT Action Plan for GDPR

written by

Pay up or Else!

In last month’s blog I discussed your network potentially having numerous methods by which access could be achieved (Is yours an open door network?).  Sadly, it is often the case that when a security event occurs (notice I said “when”, not “if”) then the next step is how do you deal with that unsavoury event?…

written by

Is yours an open door network?

It would be impossible to have missed the significant increase in the number of companies who have had their proprietary and valuable data compromised by unknown individuals maliciously penetrating their networks without being spotted, stealing millions of sensitive data records, and the damage only being comprehended when the details of the e-heist go public.  From…

written by

You can’t decrypt everything!

You simply cannot decrypt everything!  I’m not saying you shouldn’t decrypt user traffic, but it is important to understand that some services simply cannot be decrypted. Here’s some basic information on SSL decryption: SSL is a protocol based on trust For example when SSL traffic is decrypted on a web proxy, you are breaking that…

written by

Say hello to HaLow!

Wi-Fi HaLow™ (pronounced ‘halo’) is a new low-power, long-range wireless technology designed to support and enhance the large variety of network connected physical objects that we call the Internet of Things. With considerable industry momentum building around the requirement for a low power wireless solution, the Wi-Fi Alliance announced this new technology earlier in the year, based on the pending IEEE 802.11ah specification….

written by

Axial Talking Point – Dealing with Cloud, BYOD and the Modern Threat Landscape

written by

Cloud – painkiller or headache?

It’s all a matter of perspective.  From one viewpoint, “Cloud” is the answer to everything; scale, cost reduction, ubiquitous access to applications, storage, lower management overhead, flexibility . . . probably even world peace in the eyes of some. I’m sure we’ve all been exposed at some point to the wide-eyed “Cloud is the (only)…

written by

30 Minutes to Practical Value

I’m sure we’d all like to know where our money would be best invested for greatest return.  This is particularly true when it comes to structured network security. A simple and elegant option would be to block the IP traffic from internet locations where you KNOW you don’t have business relations.  Why? To save your…

written by