Most Recent
The growing adoption of Ethernet and the need to secure data at line rate makes MACsec critical to meeting the performance and se ...
2021 brought a lot of technological advancements. Steve Alexander, Jürgen Hatheier, and Craig Williams discuss what surprised the ...
This session explores how Media Access Control security (MACsec) slams the door shut and protects against cyberattacks.
The mission must continue – and that means networks must be up and secure, no matter what. Now more than ever before, networks ca ...
Residential users need broadband services that are reliable, high performance, secure, and highly cost-effective.
As malicious cyberattacks continue to grow, agencies need to ensure they’re deploying the best possible lines of defense to keep ...
Protect your business and customers’ critical in-flight data with Ciena’s unique, fully BSI-certified WaveLogic Encryption soluti ...
In Europe, full certification from BSI is one of the top security accreditations you can get, and Ciena’s optical encryption solu ...
Tune in as we revisit some of our favorite episodes from the past 3 years. We’ve covered a plethora of hot topics like esports, A ...
This paper examines some ways organizations attempt to manage inventory. It reviews three primary methods, their strengths and we ...
Steve Alexander, Ciena SVP and CTO, talks through his predictions for the future of technologies like 5G, AI, software automation ...
Ciena's Christine Keck talks to Jamie Jefferies about his return to EMEA to lead Ciena's efforts in the region, and the trends he ...
Research by Telindus and Ciena has found that the wide area networks are potentially a data-protection weak link– putting custome ...
To ensure automation becomes a key differentiator, Ciena’s Rebecca Prudhomme explains that companies need to address any concerns ...
Rolling out a comprehensive security plan can be challenging. Fortunately, optical layer encryption provides first-level defense ...
This document describes the concerns surrounding encryption solution testing, and the external certification processes available ...
Ciena’s Patrick Scully explains what technology is needed so your user data and key network information remains private.
Tom Engels of Telindus provides a certification checklist to make sure you get the right level of security and compliance with yo ...
May 25th is fast approaching and with it the deadline for the European General Data Protection Regulation (GDPR) to be enforced a ...
It’s impossible to predict what networks will be required to handle in the coming years, especially when it comes to the internet ...
The phone rings — there’s been a breach. Ciena’s chief security architect Jim Carnes explains how to integrate security into each ...
Large-scale data breaches are reported in the press almost daily, with devastating consequences for the organizations and individ ...
This paper details how a holistic network security strategy can help minimise cyberthreats and streamline compliance in the era o ...
As applications increasingly communicate between different locations – is that data secure? Kent Jordan explains how Layer 1 encr ...