240 Results for:udp

  • Sort by: 

Arcserve enhances portfolio of Sophos-secured backup

By Johnny Yu 21 May 2020

Arcserve extended its Sophos suite of cybersecurity products aimed at protecting backups from ransomware to include cloud and Microsoft Office 365 workloads. Read More

How to perform WVD monitoring with Azure Log Analytics

By Chris Twiest 05 Oct 2020

Like any DaaS offering, Windows Virtual Desktop's success depends on user experience. Learn how to set up the Azure Log Analytics tool and how it can help virtual desktop administrators. Read More

Should I worry about the Constrained Application Protocol?

By Judith Myerson 08 Mar 2019

The Constrained Application Protocol underpins IoT networks. But the protocol could allow a threat actor to launch an attack. Read More

Arcserve and StorageCraft merger aims for ‘single pane of glass’

By Antony Adshead 24 Feb 2021

Arcserve and StorageCraft bring a lot of similarities but enough differences for their backers to bet on with their merger, with unifying management between product sets the only priority currently stated Read More

How was a MikroTik router hack used to hijack traffic?

By Judith Myerson 23 Nov 2018

Qihoo 360 Netlab researchers found that TZSP traffic was being redirected from vulnerable routers. Learn what this type of traffic is and how this attack is possible. Read More

4 Windows Virtual Desktop management limitations

By Marius Sandbu 19 Mar 2021

WVD management isn't all the way there yet, despite Microsoft expanding its offering over the past year. Some capabilities still aren't as extensive as Citrix and VMware's offerings. Read More

Containous releases Traefik 2.0 open source edge router

By Sean Michael Kerner 25 Sep 2019

Traefik 2.0, a major update to the popular open source edge router, enables new use cases and improves visibility into cloud-native deployment stacks, including Kubernetes. Read More

VPN and cloud-based printing options change with the times

By Brien Posey 27 May 2021

Print workflow and IT infrastructure are key considerations when choosing between a VPN and cloud printing setup that can accommodate the needs of a hybrid workforce. Read More

Memcached servers irresistible to DDoS attackers, expert warns

By Warwick Ashford 02 Mar 2018

In the light of the biggest distributed denial of service attack to date against GitHub, organisations should ditch memcached servers or risk a blizzard of blistering attacks, says security researcher Read More

Different types of cloud load balancing and algorithms

By Stephen J. Bigelow 23 Jun 2021

Learn how load balancing in the cloud differs from a traditional network traffic distribution, and explore services available from AWS, Google and Microsoft. Read More