Application Security Architecture Authentication
CertificationsCorporate ComplianceCryptology
Disaster RecoveryEnterprise SecurityExploits
FirewallsIncident HandlingIntrusion Detection
OS SecurityPolicies and ProceduresSecurity Basics
Security ManagementSecurity ToolsServers
StandardsVoIPVulnerability Management
Web SecurityWiFi SecurityWorms and Viruses

Response redefined – ICT and the future of public safety

by Ericsson

Mobile broadband and distributed computing, coupled with industry-wide standardization efforts, can transform emergency response. This paper explains how to use ICT architecture and consulting frameworks to create truly mission-critical, multiagency platforms that enable effective communications and information sharing. At the same time, factors such as affordability and ease of implementation should lead agencies to embrace solutions based on open standards.
» Read more

5G systems – enabling the transformation of industry and society

by Ericsson

A digital transformation is taking place in almost every industry, disrupting and making us rethink our ways of working. Through an unprecedented ability to share information, people and industries are collaborating more, creating solutions that combine many different areas of expertise and overturning traditional business models. This cross-industry transformation has created a need to evolve wireless connectivity for the fifth generation of mobile technology. The goal is to expand the broadband capability of mobile networks, and to provide specific capabilities for consumers and for various industries and society at large unleashing the potential of the Internet of Things.
In this paper, the 5G use cases and their respective requirements are outlined first. The evolution of the network components toward 5G is then presented, followed by a description of the 5G system. Finally, the 5G system is exemplified through three concrete use cases.
» Read more

5G radio access – capabilities and technologies

by Ericsson

The capabilities of 5G wireless access must extend far beyond previous generations of mobile communication. Examples of these capabilities include very high data rates, very low latency, ultra-high reliability, energy efficiency and extreme device densities, and will be realized by the development of LTE in combination with new radio-access technologies. Key technology components include extension to higher frequency bands, access/backhaul integration, device-to-device communication, flexible duplex, flexible spectrum usage, multi-antenna transmission, ultra-lean design, and user/control separation.
» Read more

Hyperscale cloud – reimagining data centers from hardware to applications

by Ericsson

The hyperscale approach can help industries meet the IT capacity demands of the Networked Society. Transforming data centers in this way goes beyond hardware to impact the software layer, including hypervisors, operating systems, cloud platforms and – ultimately – applications.
However, challenges must be overcome if hyperscale is to be fully realized. As well as revealing the scope of this vision, this paper sets out the key considerations and questions for data center operators at every layer – from hardware to applications.
» Read more

Cybersecurity Risk Reduction

by David Simpson, Rear Admiral (ret.) USN Bureau Chief

This whitepaper describes the risk reduction portfolio of the current Commission and suggests actions that would continue to affirmatively reduce cyber risk in a manner that incents competition, protects consumers, and reduces significant national security risks.
» Read more

Optimize Multicloud Strategies for Enterprise Digital Transformation

by Mary Johnston Turner

In the era of digital transformation, organizations will compete based on their ability to rapidly develop, deploy, and optimize online and mobile innovations using multicloud services. This IDC white paper explores the obstacles you are going to have to overcome in order to find success with your multicloud strategy.
» Read more

IDC Innovators: Multicloud Management, 2017

by Mary Johnston Turner

Many organizations are deploying multiple cloud environments, which can be difficult to manage. The market for multicloud management tools is going to grow quickly. This IDC paper explores what look for in a multicloud management platform, as well as what it is going to take for an organization to stand out as an innovator in the field.

Read More

IoT Security

by Ericsson

The IoT brings a new set of issues, such as the security, safety, and robustness of cyber-physical systems. Novel types of attack, as well as new privacy and cybersecurity regulations, may take many industries by surprise. Yet the economic benefits of the IoT as an enabler for analytics, automation, and process and resource optimization cannot be overstated. To succeed with the transformation that the IoT brings about, industries need to gather competence and understand new threats and how to mitigate them.
This white paper provides an insight into the major security and privacy challenges due to be met in the Networked Society. Specifically, it addresses security, safety, and privacy in the entire IoT value chain, which includes devices, networks, cloud, infrastructure, applications, and services. The paper also identifies the main security challenges and approaches that need to be taken in the IoT sphere to withstand attacks, and discusses how IoT security and privacy need to be addressed through technology, standardization, and regulation.
» Read more

1 2 3 7