Articles

The “Articles” page of NWU’s blog is a source of up-to-date information about cybersecurity, IT solutions, and telecommunications. We cover a wide range of topics: from cyber threat analysis and the implementation of advanced protection systems to recommendations on optimizing IT infrastructure and integrating innovative technologies. Among the featured solutions are Anti-DDoS by Netscout, SIEM by Exabeam and LogRhythm, Firewall Policy Management by Tufin, NDR by Vectra AI, SBC and UC by Ribbon Communications, as well as environmental monitoring solutions by Humatech, uHoo, Nuvap, Sensibo, and others.
Categories
  • Enhance network security with Cubro Network Probes for deep traffic analysis, threat detection, and real-time monitoring.

    Cubro Network Probes: Overcoming the Lack of Traffic Control

    Challenges: Lack of Traffic Control and Network Threats Modern companies and service providers operate in a world where network traffic volumes grow exponentially. In recent years, the sharp increase in...


    20/02/2025Articles, Cubro Network Visibility (EN)
  • Enhance network security and visibility with Cubro DPI. Detect threats, optimize traffic, and ensure compliance with advanced packet analysis

    Сubro Deep Packet Inspection (DPI): In-depth Traffic Analysis

    In today’s digital world, network traffic volume is growing exponentially, creating new challenges for organizations in traffic management, monitoring, and data analysis. According to Cisco’s report, by 2025, global IP...


    17/02/2025Articles, Cubro Network Visibility (EN)
  • Detect and prevent Living off the Land (LOTL) attacks with Exabeam UEBA. Identify threats through behavior analytics. Get a consultation now!

    Exabeam UEBA: How to Neutralize Living off the Land (LOTL) Attacks

    What are Living off the Land Attacks? Living off the Land (LOTL) attacks involve using built-in system tools and functions to carry out malicious activities. Instead of deploying external malware,...


    12/02/2025Articles, Exabeam, News
  • Discover how Niagara Networks NPB enhances network security, optimizes traffic distribution, and improves cybersecurity efficiency.

    Niagara NPB: Effective Network Traffic Management

    Network Packet Brokers: Traffic Optimization and Network Security Enhancement In modern networks, the volume of data is growing exponentially, and threats are becoming increasingly sophisticated. Comprehensive network management requires detailed...


    10/02/2025Articles, Niagara Networks (EN)
  • Optimize network performance and security with Niagara Network Intelligence. Enhance traffic analysis, threat detection & efficiency.

    Niagara Network Intelligence: Advanced Traffic Processing

    Why Do Enterprises Need Network Analytics? In today’s digital world, companies face unprecedented volumes of network traffic daily. According to Cisco, by 2025, the average speed of global IP traffic...


    07/02/2025Articles, Niagara Networks (EN)
  • A firewall review evaluates and assesses your company’s network security capabilities as aligned with your organization’s business needs and risk tolerance to mitigate cyberattack risk.

    12 Best Practices for a Corporate Firewall Review

     A firewall review evaluates and assesses your company’s network security capabilities as aligned with your organization’s business needs and risk tolerance to mitigate cyberattack risk. Modern digitally transformed businesses often...


    08/11/2024Articles, Tufin
  • Learn DDoS defense tactics to protect uptime and reputation. Explore NETSCOUT solutions for unstoppable service now.

    What Are DDoS Attacks & How to Defend Against Them?

    DDoS (Distributed Denial of Service) attacks deliberately overload online resources—servers, networks, or applications—so legitimate users cannot access them. Attackers typically rely on botnets, which are networks of compromised devices that...


    04/11/2024Articles, Netscout
  • Big Four Professional Services Organization Leverages Tufin SecureTrack and SecureChange for Network Security Transformation.

    Big Four Achieves Network Security Transformation with Tufin

    Positive evidence of digital transformation with savings in the stability of business processes at Tufin  Challenge I: increasing the speed of change requests while improving security posture The firewall management...


    08/10/2024Articles, Tufin
  • Multinational Bank Eliminates 12-Month Security Policy Review Backlog and Automates Continuous Compliance.

    Bank Automates Compliance, Ends 12-Month Review Backlog

     A customer since 2017, this multinational financial services institution operates in retail, corporate, and investment banking segments. Based in Asia, it is in the top 20 banks in the world,...


    08/10/2024Articles, Tufin
  • Infinidat Wins Multiple Awards from Storage Magazine, UK at the 2024 Storries XXI

    Infinidat Wins Multiple Awards from Storage Magazine

     Infinidat, announced that Storage Magazine, UK has awarded Infinidat with the 2024 Capacity Storage Vendor of the Year Award and an Editor’s Choice Award for enterprise storage product innovation for...


    08/10/2024Articles, Infinidat
  • Attack surface management with Tufin enables you to automate impactful yet manual tasks so that you can allocate resources to more strategic activities.

    How to Grow a Healthy Attack Surface Management Plan with Tufin

     Attack surface management is much like planning and planting a vegetable garden. While you want your garden to grow, you need to understand the types of plants you can grow...


    08/10/2024Articles, Tufin
  • Infinidat has named Infinidat as a winner of a 2024 CRN Tech Innovator Award. Infinidat is being recognized for its InfuzeOS™ Cloud Edition in the “Storage−Cloud” category.

    Infinidat Wins 2024 CRN Tech Innovator Award for Cloud Storage

     Infinidat, a leading provider of enterprise storage solutions, announced that CRN®, a brand of The Channel Company, has named Infinidat as a winner of a 2024 CRN Tech Innovator Award....


    08/10/2024Articles, Infinidat