What Are You Doing to Inspect Encrypted Traffic? [Video]
Adversaries are using sophisticated tactics to bypass security defenses and infiltrate networks. Along with employing HTTPS, they’ve begun using SSH and other advanced protocols for data exfiltration. SSH, for example, is often used for remote management access because it performs well. Adversaries now use remote desktop protocol (RDP) and data exfiltration over SSH. And when… (0 comment)

Airheads Vegas 2014 Breakout Video – Fundamentals of Location Based Services
In this session you will learn the basics of Wi-Fi based location, mobile engagement using Aruba’s Meridian app development platform for places, and presence based push notifications. For more information, visit us at http://www.meridianapps.com. Join the discussion at https://community.arubanetworks.com. Click here to learn more about Aruba’s wireless networking solutions… (0 comment)

Video- Invito di Italtel al Cisco Live 2015
Anche quest’anno Italtel sarà presente al Cisco Live Europe 2015, che si terrà a Milano dal 26 al 30 Gennaio, nell’area espositiva “World of Solutions” presso lo stand #G12. Venite a scoprire le nostre soluzioni:  ALL IP NETWORK TRANSFORMATION  COLLABORATION AT WORK 2.0  PROGRAMMABLE NETWORK AND DATA CENTER  INTERNET OF THINGS… (0 comment)

Aruba S3500 Series Video Data Sheet
Aruba S3500 Mobility Access Switches enable secure, role-based network access for users, independent of their location, device or application. It’s the only wired networking solution designed for today’s enterprise mobile workforce. For more details, please go to: http://www.arubanetworks.com/product/mobility-access-switches/ Click here to learn more about Aruba’s wireless networking solutions… (0 comment)