Blog

Efficient operations—Using Security Analytics to optimize your user’s experience 

Efficiency often means synergies and savings. It means making good use of resources—both operational manpower, bandwidth and energy—but also time and effort. Running an efficient network is a big challenge as it requires the administrator to take tight control of each packet, analyze it and take appropriate action. It’s tempting for an IT administrator to use the…
Read more

Follow the breadcrumbs

Like the story of Hansel and Gretel, following the small bits of information is often the way to find your way home, or in this case to the attack perpetrator.  Security analytics is a vital part of managing your cybersecurity solution: without analytics there is no way to understand your true protection status. Vendors providing full stack solutions is a…
Read more

What you don’t know, does hurt you!

You can read about cyberattacks in the news almost every day. Security is on top of the agenda at most companies across all industries but how do you know your protection status?   Security is complex and it’s no surprise that analytics plays an important role. It’s common to have limited or siloed visibility to what’s happening across…
Read more

Keynote at SDN NFV World Congress – 2019

Clavister’s Keynote at SDN NFV World Congress – 2019

In the end of October Clavister had the opportunity to present a keynote at the SDN NFV World Congress in The Hague, The Netherlands. We delivered a pitch on Elastic Secure SD-WAN – an emerging way to deliver security use-cases.

FBI Warns of Multi Factor Authentication SMSs Being Vulnerable

Instead, they advise Biometrics as the new base line for authentication. Multi-Factor-Authentication (MFA) has been under attack recently by prominent government instances. The American FBI issued a firm warning to enterprises that MFA with OTP SMS is not as safe as it appears to be with wide press coverage in media such as forbes.com and…
Read more

The Future of Network Security Is in the Cloud – Introducing Elastic Secure SD-WAN

Security needs are evolving quickly. Twenty years ago, it was enough with a firewall at your network door—ten years ago you sufficed with segmentation—today this is not enough. Users are connecting to your data from everywhere as your business support systems have evolved from a server-room only approach to a hybrid mix of cloud services,…
Read more

Smart Networks with Edge Computing

Smart Networks with Edge Computing – How to Achieve Robust Security?

Some datacenter functions are moving closer to the user, to the edge of the networks. Welcome to the world of Edge Cloud Computing—but how does security evolve? We’re in the midst of an IoT revolution with smart cities, factories and homes that require systems and devices to be connected at all times, producing a massive…
Read more

Is 5G more secure than 4G?

Is 5G more secure than 4G?

It’s a fact: there’s a growing buzz around 5G right now as carriers start to launch their first services. But the question few ask is if 5G is more secure than 4G? Is 5G even needed? And how does 5G play out from a security perspective? By now, we’ve all heard probably of the coming…
Read more

Empower users with more than MFA

Empower users with more than MFA

We all know that Two Factor Authentication (2FA) is the foundation of good perimeter security—but it’s often perceived as cumbersome to use. Users want a smooth way to login, it’s why they save passwords in the login dialogues when possible—or choose poor quality, easy to remember variations of passwords. Convenience is, in some ways, the…
Read more

Reflections on Identity and Automation from Gartner’s Security Summit

The recent Gartner summit in London pointed to one inescapable conclusion: Authentication is the hottest topic in security. Businesses have spent billions on security solutions—but does any CEO feel safer for all that investment? Data breaches, ransomware situations and corporate hacks reach the headlines with financial impacts reaching into the hundreds of millions USD. I…
Read more