Articles

    The "Articles" page on NWU's blog serves as a navigation hub for technical articles related to various IT and telecommunications solutions. Topics covered include AI integration in UC (Unified Communications), VoIP infrastructure upgrades, firewall management, and cybersecurity. The articles showcase insights on cutting-edge technology such as Ribbon Communications, Tufin's firewall solutions, and Exabeam's cybersecurity practices. Each article provides in-depth coverage of solutions relevant to enterprises and service providers, reflecting NWU's focus on innovation and security.
    Categories
    • Tufin Acquires AKIPS to Bring Customers Enhanced Visibility into Network Operations and Performance

      Tufin Acquires AKIPS for full network visibility

       Combination Strengthens Ability to Provide End-to-End Insight, Management, and Automation to Enterprise Network Security and IT Teams Tufin®, the leader in network and cloud security policy automation, today announced that...


      08/10/2024Articles, Tufin
    • Tufin Orchestration Suite Enhances Network Visibility Tools, Incorporates Audit and Compliance Tools, and Adds Support for Palo Alto Prisma, Cisco Viptela, Check Point Quantum, VMware NSX-T on AWS, and More  Tufin, the leader in network and cloud security policy automation, today announced the release of Tufin Orchestration Suite (TOS) version R23-2. The latest edition streamlines […]

      Tufin Boosts SASE with Visibility & Policy Automation

      Tufin Orchestration Suite Enhances Network Visibility Tools, Incorporates Audit and Compliance Tools, and Adds Support for Palo Alto Prisma, Cisco Viptela, Check Point Quantum, VMware NSX-T on AWS, and More...


      08/10/2024Articles, Tufin
    • Tufin Wins 2023 Top InfoSec Innovator Award for Most Innovative Network Security and Management

      Tufin Wins 2023 Top InfoSec Innovator Award

      Tufin, the leader in network and cloud security policy automation, today announced that it won the 2023 Top InfoSec Innovator Award for “Most Innovative Network Security and Management.” This is...


      08/10/2024Articles, Tufin
    • Tufin Orchestration Suite R24-1 Gives Security Teams the Ability to Strengthen Security and Compliance Across Today’s Complex Hybrid Networks

      Tufin Enhances Security Control & Visibility From a Single Platform

       Tufin Orchestration Suite R24-1 Gives Security Teams the Ability to Strengthen Security and Compliance Across Today’s Complex Hybrid Networks Tufin®, the leader in network and cloud security policy automation, today...


      08/10/2024Articles, Tufin
    • Tufin’s New AI Assistant Makes Identifying Network Issues as Simple as Messaging a Colleague

      TufinMate Launched to Accelerate Network Access Troubleshooting

      Tufin’s New AI Assistant Makes Identifying Network Issues as Simple as Messaging a Colleague Tufin®, the leader in network and cloud security policy automation, today launched TufinMate, an AI assistant...


      08/10/2024Articles, Tufin
    • Tufin Dashboard Essentials Helps Companies Track Security Implementation Progress and Streamline Compliance Efforts

      Streamline Security & Compliance with Tufin Dashboard

       Tufin®, the leader in network and cloud security policy automation, today announced Dashboard Essentials, a new extension to the Tufin Orchestration Suite that improves analytics for monitoring security, compliance, and...


      08/10/2024Articles, Tufin
    • Tufin was selected based on their proven experience with Microsoft Security technologies, willingness to explore and provide feedback on cutting edge functionality, and close relationship with Microsoft.

      Tufin in Microsoft Copilot for Security Preview

       Tufin announced its participation in the Microsoft Copilot for Security Partner Private Preview. Tufin was selected based on their proven experience with Microsoft Security technologies, willingness to explore and provide...


      08/10/2024Articles, Tufin
    • Learn firewall review strategies to enhance security, manage risks, and ensure compliance across hybrid networks

      Effective Firewall Review Strategies for Enhanced Network Security

      A firewall review assesses your company’s network security, aligning with business needs and risk tolerance to mitigate cyber threats. Understanding the Importance of Regular Firewall Audits Businesses today often work...


      08/10/2024Articles, Tufin
    • Tufin Orchestration Suite R24-2 Improves Security Efficiency Across Hybrid and Multi-Cloud Environments with Faster Device Coverage Through Tufin’s Open Policy Model Framework

      Tufin Orchestration Suite R24-2: unprecedented automation of hybrid networks

      Tufin Orchestration Suite R24-2 Improves Security Efficiency Across Hybrid and Multi-Cloud Environments with Faster Device Coverage Through Tufin’s Open Policy Model Framework. Tufin, the leader in network and cloud security...


      14/09/2024Articles, Tufin
    • Discover how Exabeam identifies and mitigates external, internal, and endemic cybersecurity threats with advanced AI-driven tools.

      Understanding the Different Types of Adversaries

      Understanding and Addressing Cybersecurity Adversaries Exabeam highlights the importance of identifying external, internal, and endemic adversaries for robust security strategies. External Adversaries: Recognizing Conventional Threats External adversaries include cybercriminals, nation-states,...


      29/05/2023Articles, Exabeam
    • Exabeam earns CRN’s 5-star rating for the seventh year, showcasing SIEM innovation, partner training, and global cybersecurity leadership.

      Exabeam Awarded 5-Star Rating in CRN® Partner Program Guide for the Seventh Consecutive Year

      Exabeam, a global leader in cybersecurity and the innovator of New-Scale SIEM™, has secured a prestigious 5-star rating in CRN®’s 2023 Partner Program Guide for the seventh consecutive year. This...


      10/05/2023Articles, Exabeam
    • Discover Exabeam's insights on social engineering tactics, prevention strategies, and advanced tools for robust cybersecurity.

      Top 5 Social Engineering Techniques and How to Prevent Them

      Social engineering is one of the most dangerous and prevalent methods attackers use to exploit human vulnerabilities. By manipulating individuals instead of systems, adversaries bypass technical defenses, accessing sensitive information,...


      18/05/2020Articles, Exabeam