Blog

The activereach blog offers education and inspiration in #security and #connectivity. Our aim is to share vital knowledge with business professionals across all functions – so that they can understand the impact of emerging technology trends and gain insight into how these could be adopted in their organisations.

All content is our own, created by our salesteam, support engineers, tech consultants, and directors. We also pick the best of our technology partners’ blogs, re-published with their kind permission. Opinions expressed are the authors’ own. Comments gratefully received at marketing@activereach.net.

Blog

Cumulus and Mellanox – Are we about to see mainstream adoption of open networking?

Sharon Holland

activereach is a partner to both Cumulus Networks and Mellanox Technologies so it was great to see the recent news that the NVIDIA purchases bring them together under the one banner.  Could this be the sign that open networking is about to make a big leap forward in terms of mainstream adoption (something we mentioned in a previous blog)? 

more →

Blog

What Is CASB and Where Does It Sit In The Modern Threat Landscape?

CASBs (Cloud Access Security Brokers) sit between an organization’s on-premises infrastructure and the cloud provider to ensure enterprise security policies are enforced. CASBs allow enterprises to go beyond their own infrastructure to ensure network traffic between on-premises devices and the cloud comply with their security policies.

Although still relatively young, CASBs have matured a lot recently, having evolved to the point where many analysts feel CASB will soon be as important as firewalls were when we were all working on PCs instead of laptops. 

more →

Blog

Threat Management In The Cloud

This month we are sharing a blog from our partner Netskope who explain the current threat trends in the cloud.

Bad actors are constantly looking for new ways to attack the enterprise. There are many known patterns of execution that are still very effective such as phishing, BEC scams, vulnerability searches on exposed websites/systems, lack of hardened systems, and misconfigurations left unaddressed/unscreened before releasing to production, leaving company’s assets exposed.

more →