Viavi Introduces a Suite of Products to Support Delivery of VPN Services throughout the Lifecycle

VIAVI Solutions | September 09, 2020

In response to enterprises around the globe adopting remote work as the new normal, Viavi Solutions Inc. has introduced a suite of products to support delivery of VPN services throughout the lifecycle, from validation, to pre-deployment testing, to monitoring, assurance and troubleshooting. According to the Neustar International Security Council, 64% of companies experienced disruptions to network security business practices due to the sudden shift to a work from home model, and 78% of corporate VPNs have experienced some connectivity issues. The VIAVI State of the Network Study of IT professionals found that VPN oversubscription was one of the top challenges of managing remote user traffic growth, with remote end-user experience being the highest ranked requirement for operational visibility. Issues such as the inability to access VPN at peak times, poor conference call quality, and slow application response times have caused significant challenges.

Spotlight

Check out how VMware AirWatch's Company Culture was rated by employees on Comparably What do employees think of VMware AirWatch's company culture? VMware AirWatch's culture is rated C+ (65/100) based on 240 ratings. Employees gave John Marshall, VMware AirWatch's CEO, a C+ (68/100), putting John Marshall in the Top 50% in the country. VMware AirWatch's Diversity Score ranks them in the Top 50% of similar sized companies.

Spotlight

Check out how VMware AirWatch's Company Culture was rated by employees on Comparably What do employees think of VMware AirWatch's company culture? VMware AirWatch's culture is rated C+ (65/100) based on 240 ratings. Employees gave John Marshall, VMware AirWatch's CEO, a C+ (68/100), putting John Marshall in the Top 50% in the country. VMware AirWatch's Diversity Score ranks them in the Top 50% of similar sized companies.

Related News

VIRTUAL DESKTOP TOOLS

Introducing Meshnet - NordVPN’s New Feature

NordVPN | June 28, 2022

NordVPN has unveiled Meshnet, a unique new feature that will enable users to connect directly to other devices rather than routing their data through a VPN server, cementing the company's position as an industry leader. “Whereas a traditional NordVPN connection redirects your internet traffic through servers, Meshnet lets you create your own NordVPN server, made up of only your own or your friends' devices, regardless of their location. All that’s needed is a NordVPN subscription,” says Vykintas Maknickas, product strategist at NordVPN. “This feature release is a gamechanger and will truly transform how our users utilize NordVPN. Our product team has been working relentlessly for the past few years, which really began with the development of our flagship technology — NordLynx — the bedrock behind Meshnet that allows us to provide amplified privacy solutions without sacrificing industry leading speed,” Vykintas Maknickas, product strategist at NordVPN To use Meshnet, users must first update their NordVPN app and ensure that they are linked through the NordLynx protocol, after which they can switch it on in the NordVPN app and connect up to 10 personal and/or 50 external devices. NordVPN is a subsidiary of Nord Security. Nord Security is confident in its ability to become an all-around cybersecurity solution. In addition to NordVPN, the cybersecurity firm offers three more market-leading products: NordPass, a next-generation password manager; NordLocker, an encrypted cloud storage solution; and NordLayer, an advanced network access security solution for organizations.

Read More

VIRTUAL DESKTOP TOOLS

GoodAccess Partners with phoenixNAP, a Global IT Services Provider

GoodAccess | July 27, 2022

GoodAccess, the company reinventing secure cloud access for small and medium businesses, today announced its partnership with phoenixNAP®, a global IT services provider offering security-focused cloud infrastructure, dedicated servers, colocation, and specialized Infrastructure-as-a-Service (IaaS) technology solutions. Built to provide an encrypted connection between users and business systems, GoodAccess Cloud VPN improves network security and helps address increased cyber risks in work-from-home environments. By securing employees' access to a company's network, GoodAccess Cloud VPN helps protect business data and applications from intrusion or breach. The solution makes it impossible for malicious actors to detect business systems, helping organizations enable zero-trust network access and ensure advanced protection of their networks. As a phoenixNAP recommended Cloud VPN option, GoodAccess can be easily deployed on top of Bare Metal Cloud and other phoenixNAP's infrastructure solutions. Providing robust network protection through an intuitive interface, GoodAccess adds a critical security layer to a corporate infrastructure. "Enabling secure network access for employees is vital to maintaining a safe and healthy IT environment, In an effort to provide businesses with advanced security tools and solutions, we collaborated with GoodAccess to offer organizations an easy way to deploy Cloud VPN for network protection. This is particularly important for organizations with remote work policies as it enables their employees to securely access corporate data and systems regardless of where they are located. We are excited to work with GoodAccess and offer its advanced solutions to organizations leveraging phoenixNAP's infrastructure." Ron Cadwell, CEO of phoenixNAP "Our collaboration with phoenixNAP enables businesses to easily deploy advanced infrastructure and network security technologies to address emerging security concerns," said Artur Kane, VP of product, GoodAccess. "GoodAccess Cloud VPN helps organizations protect both their assets and their employees by ensuring zero-trust remote access to corporate data. In our effort to deliver secure and compliance-ready solutions at a flexible and affordable model, we are aligned with phoenixNAP and we are looking forward to helping businesses take their security to a new level." Through its diverse infrastructure-as-a-service portfolio, phoenixNAP enables organizations to build stable and secure IT environments at an opex-based model. They can leverage a wide variety of security and availability solutions to ensure advanced data protection, business continuity, and compliance-readiness. phoenixNAP's solutions are available from strategic locations in the U.S., Europe, and Asia-Pacific, providing global reach and consistent connectivity worldwide. As one of phoenixNAP's most agile infrastructure solutions, Bare Metal Cloud enables organizations to automatically deploy dedicated servers and manage them easily through API or IaC tools. Its flexible hourly and monthly billing models make it possible for organizations to optimize their budget and easily scale resources as their demands grow. GoodAccess Cloud VPN can be easily added to Bare Metal Cloud as a network protection option to ensure advanced environment security. About GoodAccess GoodAccess is the global company dedicated to simplifying "anytime, anywhere" secure connectivity and access for small and medium businesses around the world, beginning with its free GoodAccess Starter product for unlimited usage for up to 100 employees. For companies with the need for static IP addresses, Zero Trust access and other requirements, GoodAccess provides a competitively priced platform that maintains simplicity and ease of use. GoodAccess products are designed for set-up within 10 minutes and the flexibility to meet varying conditions. About phoenixNAP phoenixNAP® is a global IT services provider with a focus on cyber security and compliance-readiness, whose progressive Infrastructure-as-a-Service solutions are delivered from strategic edge locations worldwide. Its cloud, dedicated servers, hardware leasing, and colocation options are built to meet always evolving IT business requirements. Providing comprehensive disaster recovery solutions, a DDoS-protected global network, and hybrid IT deployments with software and hardware-based security, phoenixNAP fully supports its clients' business continuity planning.

Read More

VIRTUAL DESKTOP TOOLS

Trellix Finds Business Services Top Target of Ransomware Attacks

Trellix | July 19, 2022

Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), today released The Threat Report: Summer 2022, analyzing cybersecurity trends and attack methods from the first quarter of 2022. The report features research from Trellix Threat Labs into connected healthcare and access control systems. It also includes analysis of email security trends and details the evolution of Russian cybercrime related to the conflict in Ukraine where new malware or methods have yet to be observed. Key findings: Increased Threats to Business Services: Companies providing IT, finance and other types of consulting and contract services were targeted by adversarial actors more often, demonstrating cybercriminals desire to disrupt multiple companies with one attack. Business services accounted for 64% of total U.S. ransomware detections and was the second most targeted sector behind telecom across global ransomware detections, malware detections, and nation-state backed attacks in Q1 2022. Ransomware Evolution: Following the January arrests of members of the REvil ransomware gang, payouts to attackers declined. Trellix also observed ransomware groups building lockers targeting virtualization services with varied success. Leaked chats from the quarter’s second most active ransomware gang, Conti, which publicly expressed allegiance to the Russian administration, seem to confirm the government is directing cybercriminal enterprises. Email Security Trends: Telemetry analysis revealed phishing URLs and malicious document trends in email security. Most malicious emails detected contained a phishing URL used to steal credentials or lure victims to download malware. Trellix also identified emails with malicious documents and executables like infostealers and trojans attached. “With the merging of our digital and physical worlds, cyberattacks cause more chaos in our daily lives, Adversaries know they are being watched closely; the absence of new tactics observed in the wild during the war in Ukraine tells us tools are being held back. Global threat actors have novel cyber artillery ready to deploy in case of escalation and organizations need to remain vigilant.” -Christiaan Beek, Lead Scientist and Senior Principal Engineer, Trellix. The Threat Report: Summer 2022 leverages proprietary data from Trellix’s network of over one billion sensors, open-source intelligence and Trellix Threat Labs investigations into prevalent threats like ransomware and nation-state activity. Telemetry related to detection of threats is used for the purposes of this report. A detection is when a file, URL, IP-address, suspicious email, network behavior or other indicator is detected and reported via the Trellix XDR ecosystem. Additional Resources Trellix Threat Center Trellix Threat Labs Blog The Threat Report: Summer 2022 About Trellix- Trellix is a global company redefining the future of cybersecurity and soulful work. The company’s open and native extended detection and response (XDR) platform helps organizations confronted by today’s most advanced threats gain confidence in the protection and resilience of their operations. Trellix, along with an extensive partner ecosystem, accelerates technology innovation through machine learning and automation to empower over 40,000 business and government customers with living security.

Read More