Cutting-edge security begins with a rock-solid foundation that includes knowing with certainty what is in a network. While investments in quantum encryption, artificial intelligence, machine learning, and block-chain are interesting, none of it will matter without a strong foundation. This paper examines some ways organizations attempt to manage inventory. It reviews three primary methods, their strengths and weaknesses, and introduces a new, more effective way to achieve inventory awareness.
Inventory as a Cyber Security Foundation
Related
View more insightsBlog
Building secure, resilient, and AI-ready government networks for Australia’s future
David Fasken, Director, APAC Government Solutions, details how Ciena can help Australia’s federal agencies build secure, resilient, and AI-ready networks that protect critical infrastructure.
ReadInfobriefs
Path-aware IP route analysis for enterprises
Enterprises and government entities depend on their IP/MPLS networks for business continuity. They operate on a diverse range of technologies and support essential business services and traffic, meaning that any change in routing can significantly
DownloadWhite Papers
Verizon, Ciena and Network Modernization
With Ciena, Verizon was able to build a parallel network — minimizing disruptions and reducing risk to end users — that was less complex to roll out and made service migration easier.
Download


