Cyber Resiliency through Out-of-Band

The Uplogix out-of-band platform brings a combination of network independence, intelligence and automation to give your team the tools to make your network more resilient -- especially during a network hack. Here's how it works. Uplogix locates with — and directly connects to — managed devices. Like a virtual technician, Uplogix performs the monitoring, config [...]

A first responder for cyber resiliency

In an emergency, you call first responders because they are stationed in your neighborhood for rapid response and have the tools and skills needed for the situation. Uplogix is your day zero first responder when it comes to response and recovery from a network hack. Uplogix deploys in the rack with your network infrastructure and utilizes advanced out-of-band capabilities and automation [...]

Ransomware brings down county services

Montgomery County in Alabama was hit by a ransomware attack that left IT staff scrambling to regain control of their systems. Among other impacts, vehicle tags and registrations are unable to be processed as officials investigate the cause of the breach and their options to regain control and clean up their system. The debilitating ransomware [...]

DDOS attacks growing at a faster rate

DDOS attacks are the most common threat for enterprise, government and educational IT networks, according to an Arbor Networks security report, and to make matters worse, the attacks are getting bigger.  Distributed denial of service attack size grew at a compound annual growth rate of 44 percent from 2005 until 2011. Since then, the rate has [...]

Network recovery after the hack

Today we live in a world of "when." And when you're affected by a security breach, you need to think beyond just data protection and backup. You need a clear plan for network recovery after the hack that doesn't rely on the network itself or slow trips to remote sites for "sneaker net" repairs. This [...]

Critical infrastructure cybersecurity gains new awareness

It's a common refrain that when it comes to critical infrastructure cybersecurity, it's not a matter of if; it's a matter of when. Cyberattacks around the world have shown the potential dangers of such an attack. Industrial control systems (ICS) are increasingly under attack, with the number of reported incidents in the US alone up 17 percent [...]