The Rise of the Guest Network. How we Predict Threats and Restrict Information Access based on Device Types and Users

Network Design and Network Security

20 years ago, it was easy to create and administer your own company network. You cabled the computers (typically desktops) in a daisy chain or to a central switch, connected to a modem and accessed the early wonders of Internet and email. There was no such thing as ransomware, data theft was confined to government