{"id":1316,"date":"2024-05-22T15:42:37","date_gmt":"2024-05-22T15:42:37","guid":{"rendered":"http:\/\/14.241.231.23\/?page_id=1316"},"modified":"2024-05-22T15:43:09","modified_gmt":"2024-05-22T15:43:09","slug":"security","status":"publish","type":"page","link":"https:\/\/www.omniconnect.com.vn\/?page_id=1316","title":{"rendered":"SECURITY"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"alignleft size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"570\" height=\"190\" src=\"http:\/\/14.241.231.23\/wp-content\/uploads\/2024\/05\/PS_MB_Security_Apr16-570x190-1.jpg\" alt=\"\" class=\"wp-image-246\" style=\"width:773px;height:auto\" srcset=\"https:\/\/www.omniconnect.com.vn\/wp-content\/uploads\/2024\/05\/PS_MB_Security_Apr16-570x190-1.jpg 570w, https:\/\/www.omniconnect.com.vn\/wp-content\/uploads\/2024\/05\/PS_MB_Security_Apr16-570x190-1-300x100.jpg 300w\" sizes=\"(max-width: 570px) 100vw, 570px\" \/><\/figure>\n<\/div>\n\n\n<div style=\"height:9px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Your network \u2026 secured<\/h3>\n\n\n\n<p>Network hacks, data breaches, information theft, and other malicious network attacks are on the rise:<\/p>\n\n\n\n<p><strong><em>33% increase in total cost of data breach in 2 years<br>$154 is the average cost per lost or stolen record<\/em><\/strong><br>-Source: 20151 Cost of Data Breach Study: Global Analysis Ponemon Institute, May 2015<\/p>\n\n\n\n<p>So should your concern for overall network security. Nearly one million malware threats are released worldwide every day, and it takes an average of 46 days to resolve a malicious attack, threatening critical operations, organizational reputations, and even the financial viability of many companies.<\/p>\n\n\n\n<p>Alcatel-Lucent Enterprise can help protect your company\u2019s digital assets with a in-depth defense approach that translates into multiple layers of security:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Security concern:<\/strong><\/td><td><strong>Alcatel-Lucent Enterprise security strategy:<\/strong><\/td><\/tr><tr><td><strong>Router &amp; switch operating system vulnerability<\/strong><\/td><td>Multiple embedded operating system techniques mitigate or prevent attacks, including flood control gates, port scanning detection, task CPU usage monitor and control, etcOptional extra-hardened Operating System with the innovative CodeGuardian technology<\/td><\/tr><tr><td><strong>Network access<\/strong><\/td><td>&nbsp;Consistent network access control at both wired and wireless interfacesAuthentication and authorization required throughout entire networkEnforced role based access and quarantine process for unauthorized or non-compliant users<\/td><\/tr><tr><td><strong>Firewall<\/strong><\/td><td>API\u2019s to firewall vendors like Palo Alto Networks, enable more granular firewall rules based on user and device information, providing a more customized fit to your business needs<\/td><\/tr><tr><td><strong>BYOD &amp; corporate devices<\/strong><strong>&nbsp;<\/strong><\/td><td>&nbsp;Device health check supports a secure adoption of BYODEnsures device is compliant before allowing access to the networkIsolates infected devices and limits access only to remediation servers<\/td><\/tr><tr><td><strong>Insecure applications<\/strong><strong>&nbsp;<\/strong><\/td><td>Deep Packet Inspection (DPI) technology, identifies in real time applications traversing the network and blocking the utilization of insecure &amp; undesirable applications<\/td><\/tr><tr><td><strong>Malicious attacks<\/strong><\/td><td>Predictive analysis provides traffic anomaly alert, identification of potential DoS attacks<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><a href=\"http:\/\/enterprise.alcatel-lucent.com\/docs\/?id=100254\">ALE partners with LGS Innovations<\/a>&nbsp;to offer CodeGuardian on the OmniSwitch product line. This innovative technology mitigates larger enterprise risks at the source, enabling an enhanced security profile through:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Independent verification and validation of OmniSwitch source code<\/li>\n\n\n\n<li>Software diversification of OmniSwitch object code to prevent exploitation<\/li>\n\n\n\n<li>Secure delivery of OmniSwitch software to customers<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Related Products &amp; Solutions<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/enterprise.alcatel-lucent.com\/?product=OmniVista2500NetworkManagementSystem&amp;page=overview\">OmniVista 2500<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/enterprise.alcatel-lucent.com\/?product=ClearPass&amp;page=overview\">ClearPass policy management system<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/enterprise.alcatel-lucent.com\/docs\/?id=100252\">CodeGuardian<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/enterprise.alcatel-lucent.com\/?solution=ConvergedCampusNetwork&amp;page=UnifiedAccess\">Unified Access<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/enterprise.alcatel-lucent.com\/?solution=ConvergedCampusNetwork&amp;page=Network-Analytics\">Smart Analytics<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Key Resources<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/enterprise.alcatel-lucent.com\/docs\/?id=100254\">CodeGuardian brochure<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/enterprise.alcatel-lucent.com\/docs\/?id=20805\">Mobile Campus Solution brochure<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/enterprise.alcatel-lucent.com\/docs\/?id=26790\">Delivering application analytics for an application fluent network<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/enterprise.alcatel-lucent.com\/videos\/?id=23067\">Unified Management for an Application Fluent Network<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/enterprise.alcatel-lucent.com\/videos\/?id=22913\">Unified Access for a Converged World<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/enterprise.alcatel-lucent.com\/videos\/?id=22948\">Benefits of an Application Fluent Network<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Related News<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/www.techrepublic.com\/article\/why-the-linux-mint-hack-is-an-indicator-of-a-larger-problem\/\">Why the Linux Mint hack is an indicator of a larger problem<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/threatpost.com\/deliberate-backdoor-removed-from-secure-conferencing-gear\/115993\/\">\u2018Deliberate\u2019 backdoor removed from AMX secure conferencing gear<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/motherboard.vice.com\/read\/one-of-the-largest-hacks-yet-exposes-data-on-hundreds-of-thousands-of-kids\">One of the largest hacks yet exposes data on hundreds of thousands of kids<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.wired.com\/2012\/04\/ruggedcom-backdoor\/\">Equipment maker caught installing backdoor account in control system code<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/www.cio.com\/article\/3016791\/security\/5-information-security-trends-that-will-dominate-2016.html\">5 information security trends that will dominate 2016<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/techcrunch.com\/2016\/03\/26\/software-security-needs-a-new-perspective\/\">Software Security Needs a new Perspective<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Your network \u2026 secured Network hacks, data breaches, information theft, and other malicious network attacks are on the rise: 33% increase in total cost of data breach in 2 years$154 is the average cost per lost or stolen record-Source: 20151 Cost of Data Breach Study: Global Analysis Ponemon Institute, May 2015 So should your concern for overall network security. Nearly one million malware threats are released worldwide every day, and it takes an average of 46 days to resolve a malicious attack, threatening critical operations, organizational reputations, and even the financial viability of many companies. Alcatel-Lucent Enterprise can help protect your company\u2019s digital assets with a in-depth defense approach that translates into multiple layers of security: Security concern: Alcatel-Lucent Enterprise security strategy: Router &amp; switch operating system vulnerability Multiple embedded operating system techniques mitigate or prevent attacks, including flood control gates, port scanning detection, task CPU usage monitor and control, etcOptional extra-hardened Operating System with the innovative CodeGuardian technology Network access &nbsp;Consistent network access control at both wired and wireless interfacesAuthentication and authorization required throughout entire networkEnforced role based access and quarantine process for unauthorized or non-compliant users Firewall API\u2019s to firewall vendors like Palo Alto Networks, enable more granular firewall rules based on user and device information, providing a more customized fit to your business needs BYOD &amp; corporate devices&nbsp; &nbsp;Device health check supports a secure adoption of BYODEnsures device is compliant before allowing access to the networkIsolates infected devices and limits access only to remediation servers Insecure applications&nbsp; Deep Packet Inspection (DPI) technology, identifies in real time applications traversing the network and blocking the utilization of insecure &amp; undesirable applications Malicious attacks Predictive analysis provides traffic anomaly alert, identification of potential DoS attacks ALE partners with LGS Innovations&nbsp;to offer CodeGuardian on the OmniSwitch product line. This innovative technology mitigates larger enterprise risks at the source, enabling an enhanced security profile through: Related Products &amp; Solutions Key Resources Related News<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/template-no-sidebar.php","meta":{"footnotes":""},"class_list":["post-1316","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SECURITY - OMNICONNECT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.omniconnect.com.vn\/?page_id=1316\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SECURITY - OMNICONNECT\" \/>\n<meta property=\"og:description\" content=\"Your network \u2026 secured Network hacks, data breaches, information theft, and other malicious network attacks are on the rise: 33% increase in total cost of data breach in 2 years$154 is the average cost per lost or stolen record-Source: 20151 Cost of Data Breach Study: Global Analysis Ponemon Institute, May 2015 So should your concern for overall network security. Nearly one million malware threats are released worldwide every day, and it takes an average of 46 days to resolve a malicious attack, threatening critical operations, organizational reputations, and even the financial viability of many companies. Alcatel-Lucent Enterprise can help protect your company\u2019s digital assets with a in-depth defense approach that translates into multiple layers of security: Security concern: Alcatel-Lucent Enterprise security strategy: Router &amp; switch operating system vulnerability Multiple embedded operating system techniques mitigate or prevent attacks, including flood control gates, port scanning detection, task CPU usage monitor and control, etcOptional extra-hardened Operating System with the innovative CodeGuardian technology Network access &nbsp;Consistent network access control at both wired and wireless interfacesAuthentication and authorization required throughout entire networkEnforced role based access and quarantine process for unauthorized or non-compliant users Firewall API\u2019s to firewall vendors like Palo Alto Networks, enable more granular firewall rules based on user and device information, providing a more customized fit to your business needs BYOD &amp; corporate devices&nbsp; &nbsp;Device health check supports a secure adoption of BYODEnsures device is compliant before allowing access to the networkIsolates infected devices and limits access only to remediation servers Insecure applications&nbsp; Deep Packet Inspection (DPI) technology, identifies in real time applications traversing the network and blocking the utilization of insecure &amp; undesirable applications Malicious attacks Predictive analysis provides traffic anomaly alert, identification of potential DoS attacks ALE partners with LGS Innovations&nbsp;to offer CodeGuardian on the OmniSwitch product line. This innovative technology mitigates larger enterprise risks at the source, enabling an enhanced security profile through: Related Products &amp; Solutions Key Resources Related News\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.omniconnect.com.vn\/?page_id=1316\" \/>\n<meta property=\"og:site_name\" content=\"OMNICONNECT\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-22T15:43:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.omniconnect.com.vn\/wp-content\/uploads\/2024\/05\/PS_MB_Security_Apr16-570x190-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"570\" \/>\n\t<meta property=\"og:image:height\" content=\"190\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.omniconnect.com.vn\/?page_id=1316\",\"url\":\"https:\/\/www.omniconnect.com.vn\/?page_id=1316\",\"name\":\"SECURITY - OMNICONNECT\",\"isPartOf\":{\"@id\":\"https:\/\/www.omniconnect.com.vn\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.omniconnect.com.vn\/?page_id=1316#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.omniconnect.com.vn\/?page_id=1316#primaryimage\"},\"thumbnailUrl\":\"http:\/\/14.241.231.23\/wp-content\/uploads\/2024\/05\/PS_MB_Security_Apr16-570x190-1.jpg\",\"datePublished\":\"2024-05-22T15:42:37+00:00\",\"dateModified\":\"2024-05-22T15:43:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.omniconnect.com.vn\/?page_id=1316#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.omniconnect.com.vn\/?page_id=1316\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.omniconnect.com.vn\/?page_id=1316#primaryimage\",\"url\":\"http:\/\/14.241.231.23\/wp-content\/uploads\/2024\/05\/PS_MB_Security_Apr16-570x190-1.jpg\",\"contentUrl\":\"http:\/\/14.241.231.23\/wp-content\/uploads\/2024\/05\/PS_MB_Security_Apr16-570x190-1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.omniconnect.com.vn\/?page_id=1316#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.omniconnect.com.vn\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SECURITY\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.omniconnect.com.vn\/#website\",\"url\":\"https:\/\/www.omniconnect.com.vn\/\",\"name\":\"OMNICONNECT\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.omniconnect.com.vn\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SECURITY - OMNICONNECT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.omniconnect.com.vn\/?page_id=1316","og_locale":"en_US","og_type":"article","og_title":"SECURITY - OMNICONNECT","og_description":"Your network \u2026 secured Network hacks, data breaches, information theft, and other malicious network attacks are on the rise: 33% increase in total cost of data breach in 2 years$154 is the average cost per lost or stolen record-Source: 20151 Cost of Data Breach Study: Global Analysis Ponemon Institute, May 2015 So should your concern for overall network security. Nearly one million malware threats are released worldwide every day, and it takes an average of 46 days to resolve a malicious attack, threatening critical operations, organizational reputations, and even the financial viability of many companies. Alcatel-Lucent Enterprise can help protect your company\u2019s digital assets with a in-depth defense approach that translates into multiple layers of security: Security concern: Alcatel-Lucent Enterprise security strategy: Router &amp; switch operating system vulnerability Multiple embedded operating system techniques mitigate or prevent attacks, including flood control gates, port scanning detection, task CPU usage monitor and control, etcOptional extra-hardened Operating System with the innovative CodeGuardian technology Network access &nbsp;Consistent network access control at both wired and wireless interfacesAuthentication and authorization required throughout entire networkEnforced role based access and quarantine process for unauthorized or non-compliant users Firewall API\u2019s to firewall vendors like Palo Alto Networks, enable more granular firewall rules based on user and device information, providing a more customized fit to your business needs BYOD &amp; corporate devices&nbsp; &nbsp;Device health check supports a secure adoption of BYODEnsures device is compliant before allowing access to the networkIsolates infected devices and limits access only to remediation servers Insecure applications&nbsp; Deep Packet Inspection (DPI) technology, identifies in real time applications traversing the network and blocking the utilization of insecure &amp; undesirable applications Malicious attacks Predictive analysis provides traffic anomaly alert, identification of potential DoS attacks ALE partners with LGS Innovations&nbsp;to offer CodeGuardian on the OmniSwitch product line. This innovative technology mitigates larger enterprise risks at the source, enabling an enhanced security profile through: Related Products &amp; Solutions Key Resources Related News","og_url":"https:\/\/www.omniconnect.com.vn\/?page_id=1316","og_site_name":"OMNICONNECT","article_modified_time":"2024-05-22T15:43:09+00:00","og_image":[{"width":570,"height":190,"url":"https:\/\/www.omniconnect.com.vn\/wp-content\/uploads\/2024\/05\/PS_MB_Security_Apr16-570x190-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.omniconnect.com.vn\/?page_id=1316","url":"https:\/\/www.omniconnect.com.vn\/?page_id=1316","name":"SECURITY - OMNICONNECT","isPartOf":{"@id":"https:\/\/www.omniconnect.com.vn\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.omniconnect.com.vn\/?page_id=1316#primaryimage"},"image":{"@id":"https:\/\/www.omniconnect.com.vn\/?page_id=1316#primaryimage"},"thumbnailUrl":"http:\/\/14.241.231.23\/wp-content\/uploads\/2024\/05\/PS_MB_Security_Apr16-570x190-1.jpg","datePublished":"2024-05-22T15:42:37+00:00","dateModified":"2024-05-22T15:43:09+00:00","breadcrumb":{"@id":"https:\/\/www.omniconnect.com.vn\/?page_id=1316#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.omniconnect.com.vn\/?page_id=1316"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.omniconnect.com.vn\/?page_id=1316#primaryimage","url":"http:\/\/14.241.231.23\/wp-content\/uploads\/2024\/05\/PS_MB_Security_Apr16-570x190-1.jpg","contentUrl":"http:\/\/14.241.231.23\/wp-content\/uploads\/2024\/05\/PS_MB_Security_Apr16-570x190-1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.omniconnect.com.vn\/?page_id=1316#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.omniconnect.com.vn\/"},{"@type":"ListItem","position":2,"name":"SECURITY"}]},{"@type":"WebSite","@id":"https:\/\/www.omniconnect.com.vn\/#website","url":"https:\/\/www.omniconnect.com.vn\/","name":"OMNICONNECT","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.omniconnect.com.vn\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.omniconnect.com.vn\/index.php?rest_route=\/wp\/v2\/pages\/1316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.omniconnect.com.vn\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.omniconnect.com.vn\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.omniconnect.com.vn\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.omniconnect.com.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1316"}],"version-history":[{"count":2,"href":"https:\/\/www.omniconnect.com.vn\/index.php?rest_route=\/wp\/v2\/pages\/1316\/revisions"}],"predecessor-version":[{"id":1318,"href":"https:\/\/www.omniconnect.com.vn\/index.php?rest_route=\/wp\/v2\/pages\/1316\/revisions\/1318"}],"wp:attachment":[{"href":"https:\/\/www.omniconnect.com.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}