Blog Posts for IT Security

How SD-WAN Can Take on Branch Office Security Challenges

By
sd-wan-complex-branch-management.jpg

Prior to SD-WAN, multi-location enterprise networks needed to rely solely on local protection at the branch office level from a data security perspective. This typically meant point security appliances at the network boundary in the branch office, which combine functionality including firewalls and unified threat management for local use (content filters, data loss protection, data encryption services, etc.). Moving to SD-WAN introduces new options for taking on typical multi-office network security challenges. Following is a summary of those challenges, and an explanation of how SD-WAN, along with other security solutions, can help mitigate them.

Windstream Invests in Detroit Expansion

Detroit_blog.png

There are few cities in America as interesting as Detroit. It has such a variety of influences that people can't agree on a nickname. Whatever you call it -- the Motor City, the Arsenal of Democracy, Motown, Hockeytown, the 313 – there is no question that Droit is beloved by its residents.

We are proud to invest in our hometown of Little Rock

1948 LR skyline_278x278_color.jpg

Those of us who work at Windstream are proud to call Little Rock, Arkansas, home. Windstream is headquartered here, and our company’s connection to the city goes back nearly 75 years.

So you can imagine how excited we are to announce a major expansion of the local metro fiber network in our community. That’s because it creates a new level of connectivity and network stability for all local businesses, and expands the services that are available to our local customers.

Standing Up for Businesses in Dallas that Need Fiber Deployments, Not Empty Promises

Dallas Skyline

When it comes to high-speed fiber deployments, Dallas has had its heart broken in the past. In fact, the city’s most recent “left at the altar” moment happened just last fall when a major provider announced it would hit the “pause” button on a planned fiber roll-out.

If You Think Network Security is Costly…

By
Cost of Security Failures Pie Chart tn

The high cost of network security failures just might have you rethinking network and data security costs. Get the “You Will Be Breached: How Much Will It Set Back Your Business?” IDC/Windstream study. See how the high cost of network security breaches are driving network security management decisions.

Live from Enterprise Connect: Inside the Mind of a Voice Hacker: The Evolution of Voice Threats

By
Enterprise Connect Vert

Live from the “Inside the Mind of a Voice Hackers: The Evolution of Enterprise Voice Threats” session at Enterprise Connect, our Windstream blogger shares panelists’ first-hand knowledge of some of the complex tools and techniques hackers use to attack UC and voice systems—with tips on how to counter measure and address these attacks.