article thumbnail

Does your cloud-access security broker support IPv6? It should.

Network World

Cloud access security brokers ( CASB ) insert security between enterprises and their cloud services by providing visibility and access control, but IPv6 could be causing a dangerous blind spot. That’s because CASBs might not support IPv6, which could be in wide corporate use even in enterprises that choose IPv4 as their preferred protocol.

IPv6 135
article thumbnail

Interop Liveblog: IPv6 Microsegmentation

Scott Lowe

This session was titled “IPv6 Microsegmentation,” and the speaker was Ivan Pepelnjak. Ivan is, of course, a well-known figure in the networking space, and publishes content at [link]. The session starts with a discussion of the problems found in Layer 2 IPv6 networks. Can we use shared Layer 3 IPv6 subnets?

IPv6 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Liveblog: IPv6 in the Cloud - Protocol and Service Overview

Scott Lowe

This is a liveblog of an AWS re:Invent 2017 breakout session titled “IPv6 in the Cloud: Protocol and Service Overview.” Global IPv6 adoption is currently around 22%, and is expected to hit 25% by the end of the year. Mobile and Internet of Things (IoT) are driving most of the growth, according to Halachmi.

IPv6 60
article thumbnail

Beyond the Office: Securing Home Devices and Networks Against Corporate Breaches

SecureWorld News

The rise of personal gadgets, the shift towards remote work, the BYOD trend , and advances in AI have all contributed to home networks becoming an extension of companies' cyber defense perimeters. However, many end-users do not recognize their home networks as extensions of their company's security boundaries.

Network 81
article thumbnail

Mach37 Spring 2014 Cohort Companies: Watch these hot new disruptors as they accelerate

CTOvision

They are: Axon Ghost Sentinel – Hugh Brooks, President, Harrisonburg, VA – Inspired by natural self-organizing systems, Axon Ghost Sentinel’s cyber security products provide lightweight, adaptive, scalable, and decentralized security for mobile and traditional devices, and enterprise networks. CardKill Inc.

Company 258
article thumbnail

A Tutorial For Enhancing Your Home DNS Protection

CTOvision

The operator played a critical function in establishing a global telephone network where any phone could talk to any phone. And when you authorize any device to join your home network, your network and your device are smart enough to automatically configure themselves to use your ISP's DNS service. It is all quite easy.

Fashion 177
article thumbnail

What is 5G Technology: 5G Connectivity and Speed Explained

Galido

5G networks will also diffuse intelligence across the entire network, from the device to the data center. In 5G networks, applications can also be hosted in mobile edge computing nodes such as “cloudlets.” This use of spectra allows for an excellent mobility capacity. Mobile Generations.

Network 96