Início Produtos Representadas Notícias Informações Exposições Mapa do Site

Networking Computing


The most stringent network security is demanded by SMEs, telecom data centers, machine to machine communications and small office/home office (SOHO) networks.

Read the following success stories to find out how Lanner's products and technologies are meeting and transforming the increasing demand for more sophisticated network and telecommunications security hardware designed for bandwidth management, IDP/IPS, load balancing, content delivery, firewall, SSL VPN, UTM and network access control.


Network Computing Solution Brief
(PDF, 5.99 MB)


Network Computing Brochure
(PDF, 1.86 MB)

 

 

Implementing SD-WAN for Streamlining Healthcare Network Communications


Telehealth could potentially be the future of medicine; it has been proven extremely crucial to those who are not ambulatory and are in compromised health because it provides almost instant access to doctors in a virtual environment.

 

Creating Network Overlay Using SD-WAN for Industrial Automation Applications


Industry 4.0’s promising technology trends encompass areas and applications such as the Internet of Things, cyber security, the cloud datacenter, horizontal/vertical system integration, data mining/analytics, AR, VR, 3D printing and robotics; what all these technologies have in common is that they must rely on some sort of networking architecture/framework in order to deliver the innovation, profits, benefits and convenience promised.

 

Managing Integrated Maritime Network and Communications


As more ships are being connected to broadband internet through either VSAT bands, L-band or 3G/4G/LTE mobile phone networks, there has been a significant rise in the demand for integrated gateway solutions capable of not only managing vessel voice and data communications but also mitigating cyber risks.

 

Delivering Real-time 100 Gbps DDoS Protection with Reduced Time to Mitigation and Operational Complexity


The IoT era has ushered in not only constantly increasing demands for connectivity but also growing concerns about tenacious and complex attacks. DDoS attacks today target not only connection bandwidth, but multiple devices that make up an enterprise’s existing security infrastructure, such as firewall/IPS devices and awide variety of applications such as HTTP, HTTPS, VoIP, DNS and SMTP.

 

Mitigating Sophisticated Cyber Threats with Modularized Next-Generation Firewall


Nowadays most enterprises and organizations have fortified themselves with some network protection measures, such as basic encryptions, anti-virus and web-filtering. However, as cyber attacks are constantly evolving and becoming more innovative than ever, these conventional protections are encountering their limits against the sophisticated cyber intrusions like social engineering, zero day attack and advanced persistent threat. Therefore, cyber security measures also have to evolve and the answer is next-generation threat prevention firewall.

 

Securing Cloud-based Web Applications with Next-Generation WAF


In today’s business landscape, enterprises are relying more and more on cloud-based web applications to offer 24/7 serviceability, enhance competitiveness and expand user bases. Whether these web applications are deployed on –premises with private cloud settings or in cloud infrastructure with large data center, they have become frequently exposed to cyber criminals and suffered from web service outages caused by advanced cyber attacks, such as DDoS, spear-phishing, and SQL injection. According to Q3, 2016 State of Internet Security released by Akamai, in the Web Application Attack Frequency, SQLi accounted for nearly 50% of observed web attacks.

 

Protect Enterprise Data Center from DDoS Attacks with Next-generation Firewalls


The massive DDoS attack on Dynamic Network Service (Dyn) which caused severe network outages and disruptions to Dyn’s major clients including Twitter, Raddit, Spotify, Tumblr, and many other well-known websites. When a DDoS attack penetrates its targeted service website, users of the victimized site may experience disruptions or outages when accessing the services and functions. The crisis was regarded as a loud wake-up call on how vulnerable our cloud services and data centers are in terms of DDoS attack.

 

Optimized Solutions for Accelerating SD-WAN Deployments


SD-WAN is one of the most applied enterprise networking models among SDN applications. According to IHS market research, there will be approximately 45% of enterprises in North America to adopt SD-WAN in the next two years. The era of “software-defined everything” is happening in real-time and SD-WAN is already a booming sector.

 

Deploying Multi-service Gateway for SMB to Secure Cloud Computing Services


Nowadays, small and medium enterprises are relying more and more on smart cloud services in order to stay connected anytime and anywhere. Indeed, cloud-based service solutions provide SMEs the flexibility and scalability for connections among their branches and client devices, at a lower investment in physical hardware. However, while enjoying the convenience and flexibility of cloud service solutions, the SMB communication networks are also exposed to cyber threats and are sometimes the victims to cyber attacks as well.

 

Real-Time Network Performance Monitoring and Diagnosis for Network Edge


Businesses today rely more and more on high-speed network to achieve profitability and sustainability. As enterprise networks are connected to more devices than ever, high-speed, high-volume network traffic is required, but network monitoring tools for service assurance, traffic/data analytics, application performance and bandwidth management are far below the required capacity. According to researched surveys, over 50% of the surveyed enterprise IT personnel have reported data loss or dropped packets during traffic. The real-time network performance management and diagnosis platforms are the key factors for optimal performance, and minimal downtimes.

 

Establishing Edge Security Gateways to Protect Against Ransomware


Due to the rapid evolution of cyber attacks, businesses and organizations across the world, no matter large or small scale, are exposed to extremely high risks of data security threats. The recent widespread of ransomware attacks has disrupted operations and profitability to many corporations and institutions. According to statistics, the top three victimized countries are United States, Taiwan and Japan. Recently, even well-known religious organizations and hospitals in Taiwan have been attacked by ransomware. In 2016 alone, experts have determined the most infamous global ransomware attacks: CryptoWall, Locky and Cerber, each accounted for approximately 41%, 34% and 24% respectively.

 

Establishing Secure Maritime Network Communications


Network connectivity and communications have drastically transformed how the maritime industry carries out its critical business operations. Tasks such as voyage planning, vessel performance analysis, maintenance/manning expense estimation and onboard physical security can now be conducted with reduced cost, greater efficiency and better-defined accuracy, resulting in stronger revenues, enhanced profitability and competitive advantages.

 

Building Next Generation Threat Prevention Platform for Enterprises


Today’s enterprises are highly driven by cloud computing, cloud storage and mobile services in order to stay competitive in the market. However, this attracts more and more advanced cyber attacks to get through the network protocols. According to official reports, around 80% of organizations have experienced data breaches, no matter the scale and size of the institutes. In other words, even small and medium sized organizations are also at risks. In fact, the issue is occurring more frequently as more and more companies and government offices are targeted for spear phishing, malware, ransomware and other types of hacks.

 

Survival of the Most Agile: Evolving from Enterprise WAN to Enterprise SD-WAN


Software-defined wide area network refers to WAN connections built and provisioned using software-defined networking (SDN) technology instead of proprietary hardware. Such virtualized WAN connections are intended for establishing highly agile and manageable enterprise networks at the compute and application tiers, between corporate HQs and branch offices or between data centers spanning large geographic distances.

 

Providing the Hardware Gateway from Conventional CPE to Software-Defined CPE


The trend of cloud computing presents an opportunity to replace physical CPE (Customer Premises Equipment) with virtualized, software-defined CPE in order to establish flexible branch-to-cloud connections. Over the past few years in the industry, many enterprises have implemented virtual branch network by focusing on virtualized network services. In other words, virtual machines are replacing physical equipments to assure branch network connectivity while saving hardware costs. Therefore, enterprises today are seeking a reliable yet compact gateway solution that help them optimize and monitor their cloud connectivity between enterprise centers and branches.

 

Software-Defined vCPE Solution for WAN and Internet Optimization


IT managers in charge of administering network services for most of today’s multi-location businesses are expected to fulfill rules and levels of authentication based on the types of network services demanded by the local offices or transnational branches. These conventional network infrastructures, more often than not, are intended for delivering services that require almost no flexibility or scalability, which in turn making deploying new services over such wide area and long distance networks a costly and time-consuming task.

 

Building the Best Network Security Platforms


Internet usage continues to rapidly expand and evolve, and with it network infrastructure is changing and evolving. The use of general-purpose processors to provide network functionality has changed the face of the networking market and dramatically reduced costs for enterprises and telecom service providers. For the most part, these general-purpose servers have kept pace with Internet application usage. Network traffic, however, has increased dramatically with new applications that have extensive data plane requirements. Traffic has multiplied to a point where specialized technology is needed to keep up.

 

Building Advanced Threat Protections Against Data Breaches


Data breaches are usually intentional leaks of information without authorization, normally by hacking actions. Data breaches are destructive nightmares to major corporations and organizations because it severely damages not only their profitability, but also trust and reputations. Victims are usually giant corporations or organizations with huge base of users or member, which means gigantic amount of data as the target for hackers. In fact, some user or member data are highly sensitive or confidential and this will severely ruin the serviceability and reliability of the service providers.

 

Dedication and Commitment in Customization Excellence


The highly competitive business environment requires high degree of flexibility and customizations to meet diversified application demands. In today’s competitive, fragmented and diversified market, commercially off-the-shelf solutions can no longer satisfy application-oriented industries. Customization is crucial to the success of manufacturing businesses. As a global leading supplier in network appliances, Lanner has been dedicated in customizing hardware platforms for clients with high degrees of flexibility and scalability.

 

Accelerating Multi-service Network Deployment and Management with Lanner’s Grantley Solutions


Network performance and sustainability for high-volume networking functions such as application delivery, firewalls, unified threat management (UTM) and WAN optimization are determined by both the maximum throughput the network hardware can achieve and the maximum number of users it can support; this is especially true for today’s network environments on which several tiers of service are made available for large number of users with varying sets of system requirements and privileges.

 

Enhancing Network Edge Security with Flexible Solutions


The rapid increase of connected devices leads to the growing complexity of network infrastructure at the edge, which demands a more flexible network appliance that not only protects the network edge by offering security measures such as VPN, intrusion protection, content filtering and data encryption, but also offers a quick, easy-to-implement solution with efficiency in size, performance and power consumption.

 

Simplifying Converged Networks for SMEs with An All-In-One Platform


Due to the rise of cloud computing and IoT (Internet of Things), enterprises all over the world have become highly concerned towards cyber security threats. For small and medium enterprises (SMEs), they need an economical solution for converged networking applications in data processing, cyber security and wireless management.

 

Enterprise Messaging Platforms Made Secured And Steady


A client in Asia Pacific with expertise in enterprise messaging software came to Lanner for hardware backend platform to reinforce an efficient mobile enterprise messaging environment. The main objective from the client is to build up a secured enterprise messaging platform different from other commercial or consumer level counterparts.

 

Securing Wireless Networks for Hospital Wards


Today, many hospitals wards have been implemented with wireless network infrastructures for healthcare uses. By leveraging the concepts of IoT (Internet of Things) to connect medical devices and patient data to the cloud, medical staff can optimize their efficiency while reducing unnecessary workloads when traveling around wards.

 

Preventing DDoS Attacks with High Performance Network Appliances


DDoS, the abbreviation of “Distributed Denial-of-Service”, is a malicious attempt against websites, servers, or networks unavailable to provide its services or resources to its intended users. The following article will discuss the background and types of DDoS attacks, and also get into the methods of prevention and protection.

 

Simplifying Network Management for BYOD Environment


With the rapid rise of BYOD (Bring Your Own Device) phenomenon contributed by the widespread of smart mobile devices, the increasing implementations of wireless accessing points (APs) in corporate environments have become an attraction for potential network intrusion and data theft. As software-based measures have been found with numerous loopholes, corporations have to rely on hardware-assistance for total solution in BYOD environment. The following will discuss the BYOD situations in details and present a hardware-assisted total solution with multiple advantages including Intel x86 firewall architecture and high-port density, which are optimally deployable for BYOD settings.

 

Accelerating Network Computing Performance with All New Architecture


With the exponential growth of mobile Internet devices and the rise of Cloud Computing, end-users demand faster, more powerful and more secured Internet services. This unprecedented demand has presented a new challenge which Internet service provider and IT system operators maintain and manage their network traffic. To ensure smooth network traffic, an all new enhanced architecture is necessary in order to handle the various types of data packets and security instructions. In other words, performance, power efficiency, scalability and reliability are the major factors in network traffic management.

 

Next Generation IP Video Delivery Solutions


In an era where high speed networks are affordable and readily available, video streaming in high quality over IP has replaced the costly video broadcasting over analog or lease lines as a more flexible and cost-effective solution. Compare with regular data transmission, stricter requirements must be met for streaming broadcast-level video over an open Internet, where uneven deliveries, packet loss and buffering are unacceptable. For high quality video broadcast services such as video on demand (VOD) and over the top (OTT), user experience very much depends on continuous and seamless packet delivery over an open Internet.

 

Enhancing Network Simplicity and Agility with Unified Wired-to-Wireless LAN on Lanner Network Appliances


Nowadays people connect to the Internet wherever they go with whatever devices they use.

 

Head-to-Head Comparison: x86 Servers versus Lanner's x86 Network Appliances


Generally speaking, the term “x86 servers” refers to computing systems that are based on Intel architecture, which is widely adopted by manufacturers due to its backward compatibility with instruction sets and scalability.

 

Lanner's x86 Network Appliances and the Intel QuickAssist Technology


Network security measures deployed across most of today’s enterprise network architecture usually involve SSL, data compression, VPNs or a combination of either three.

 

Wireless Controller: Managing the Wireless Networks More Efficiently


Wireless Internet has moved from being a luxury to being an expected staple of life in hotels, conference venues, hospitals, university campuses and numerous places besides. With the proliferation of smart phones and tablet PCs the demand for wireless coverage in public spaces has increased dramatically.

 

WAN Optimization: Meeting the Challenge


One of the largest vendors in the US of WAN optimization and network bandwidth management solutions found this appliance perfect for their requirements. Their WAN optimization appliances provide network management functions covering: network optimization, application visibility, traffic control, and application acceleration. This enables organizations to see, control, accelerate, and optimize traffic on their WANs.

 

A Next-generation Application Delivery Controller

A strategically deployed application delivery controller (ADC) provides not only improved security, visibility and acceleration; it ensures the availability of mission-critical applications. One of the global leaders in ADCs approached Lanner when they were developing their latest product. As a global leader, they were not looking for a standard run-of-the-mill application networking appliance. They were looking for hardware suited for a next generation application delivery controller.

 

From Firewalls to UTM and Next Generation Firewalls


Firewalls started to become a commodity many years ago. One of the US-based companies that saw this trend early is one of Lanner’s customers today. It has taken 8 years, but today they are considered a leading company in universal threat management and next generation firewalls. Together with Lanner they’ve designed three generations of network security product lines and climbed up to their leadership position fueled by their advantages in both cost and technology.

 

Multi-service Gateway


A multi-service gateway (MSG) is a highly integrated device that combines multiple network functions and data communications into one single service, a very budgetary solution targeted at small and medium enterprises (SMEs) and retail setting. The functions of a multi-service gateway include routing, VoIP, and security instructions like VPN, firewall and IPS/IDS. More advanced smart gateways may also be programmed with web filtering, email server, high-volume storage and wireless networking hub.

 

Application Delivery


Application Delivery Controllers are networking devices that reside in the data center and serve as a key part of an application delivery network. With the explosion in Internet traffic, business applications, and the number of Internet-enabled devices, application delivery controllers provide the front-end intelligence that supplements and enhances enterprise application flows like traffic offloading, load balancing and DMZ buffering.

 

Wired and Wireless Management


In order to provide access to data on any device at locations such as stadiums, shopping centers and medium-sized branch offices as well as campuses, content providers and telecom companies are required to build their information superhighways on both wired and wireless networks that deliver enterprise-scale capacity, stringent performance and reliability.

 

WAN Optimization


WAN optimization, also known as WAN acceleration, is a set of technologies and/or techniques applied to maximize the efficiency of data flow across a wide area network (WAN). In an enterprise WAN, the goal of optimization is to increase the data transfer speed and bandwidth regarding accesses to critical applications and information.

 

Unified Threat Management (UTM)


Unified Threat Management, frequently abbreviated as UTM, is a single appliance that specializes in all-inclusive security functions, such as network firewall, intrusion detection/prevention system (IDS/IPS), anti-virus gateway, anti-spam gateway, VPN, content filtering, load balancing, data loss prevention and appliance monitoring.

 

Next Generation Firewall (NGFW)


Today’s rapidly evolved cyber threats have proved that legacy protection methods are incapable of preventing malicious attempts from attacking enterprise networks. Therefore, it is time for “next-generation firewall” or “NGFW” for short, a term coined by Gartner, to mitigate the advanced cyber attacks and protect enterprise serviceability.

 

 

copyright | bl.representações - bl@blbrasil.com.br