Blog Posts by Rob Anderson

Live from CompTel PLUS: Carrier Assurance Team—A Carrier’s Support Dream

By

With CompTel PLUS in full swing, I’m reflecting over the past few years here at Windstream. I do this before every tradeshow, wondering who I’ll see, which service providers will be around, how things have changed…I can’t help but get a little nostalgic, thinking about all the changes carrier service providers and the communications industry as a whole has experienced. Like most major organizations, Windstream has been through countless transitions, acquisitions, reorganizations—pretty much every “tion” other carrier services providers have experienced. We’ve revamped processes, realigned workgroups, revisited product solutions…basically, we’ve “re’d” a lot, too. 

Summer Reading Series: Assignment #2 Carrier Solutions

By

One of the most critical keys to success in this industry, especially when working with various carriers, is to remain updated—not just on IT and telecom network technology, but on the communications business itself. Staying on top of who’s buying what, who’s implementing new services, who’s expanding in markets across the United States—well, it’s almost dizzying some days!

Thoughts on Expanding: Carrier Switched Ethernet

By

It’s been over a month since COMPTEL PLUS, where we announced the nationwide expansion of our Carrier Switched Ethernet service, and we’re finding even more carriers seeking cost-effective multi-location data solutions to provide to their end-users. The demand for Ethernet service and higher bandwidth hasn’t slowed down and as data consumption continues to climb, we anticipate carrier needs will climb just as rapidly. With access to our Carrier Switched Ethernet and other carrier products in major metro areas such as New York, Washington, Denver, Phoenix, Chicago, Philadelphia, Baltimore and Dallas (just to name a few), we’re confident we’re providing viable solutions for our carrier customers as they strive to meet the needs of their customers.

Replacing Network Security Solutions

By

“Businesses should rarely upgrade or replace network security solutions” is the latest myth we bust open in The Top Network Security Myths series. Sure, time flies when you’re working hard in our hurry-up culture, but neglecting to upgrade and replace network security solutions like firewalls, URL filters and other network security technology at regularly scheduled intervals is risky.  

PCI Compliance is Possible in the Cloud

By

For companies required to be PCI compliant, the idea of making a move to the cloud has been daunting. While cloud computing adoption among businesses continues to increase dramatically every year, complex PCI compliance standards have often made it difficult to know if a business could store sensitive credit card information in the cloud—and if they could, how to do so and remain compliant. Now, many questions have been answered.

Is Your Biggest Network Security Threat “Who’s Getting In” or “What’s Getting Out”?

By

It seems that every week there is a story of another high profile IT network security breach and attacks are undoubtedly becoming smarter and more sophisticated. But some of the most critical damage to a company’s network security can be done by people on the inside. Security threats posed by company employees can be just as dangerous as outsider attacks. 

Firewalls Are Still Must-Haves In Today's Network Defenses

By

There have been articles circulating questioning the demise of firewalls. I’ll come right out and say that the accusations about these network security staples are ludicrous and dangerous. Statements like this, while sparking intriguing debate, may encourage security professionals to do-away with a tried and true firewall solution that has continuously proven to be effective.

Injecting Clarity: Learn from Yahoo!’s SQL Injection Password Security Breach

By

It’s happened again.

As the New York Times reported, “Yahoo confirmed Thursday that a file containing approximately 400,000 usernames and passwords to Yahoo and other companies was stolen Wednesday.” That’s bad enough. We’ve repeatedly written in this blog about the constant cat-and-mouse game going on between hackers and infosec professionals, who seek to keep information private.