SCALABLE Network Technologies

5 Requirements Your Network Simulator Tool Must Satisfy

By |2019-11-05T16:19:37-05:00November 5th, 2019|Categories: Cyber Defense, Cybersecurity, Network Security, Network Simulation, Network Solutions, SCALABLE Networks|Tags: , , , , , , |

As communication networks become ubiquitous, there is continuous innovation both in the technologies they employ and the services they are expected to provide, creating new challenges for equipment manufacturers, service providers, network planners, and operators. Network simulation can assist in addressing many of these challenges, including: Comprehensively assess network behavior under different operating conditions, such as types and [...]

Understanding How Your Networked Enterprise Behaves Under a Cyber Attack

By |2019-10-22T16:28:27-05:00October 22nd, 2019|Categories: Cyber Defense, Cybersecurity, Network, network operators, SCALABLE Networks|Tags: , , , , , |

  What are Cyber Attacks? A cyber attack is a deliberate attempt, using malicious software, to degrade or disable the target network’s operations or to steal or corrupt sensitive data. No organization is safe from cyber attacks on its infrastructure. Former Cisco CEO John Chambers once said, “There are two types of companies: those that have been [...]

SCALABLE and OPAL-RT Release Latest Technology

By |2019-10-17T18:43:28-05:00October 17th, 2019|Categories: Cyber Defense, Cybersecurity, Digital Networking, digital twins|Tags: , , , , , , |

SCALABLE Network Technologies, Inc. (SCALABLE) has released their latest high-fidelity network emulator, EXata for Cyber-Physical Systems (EXata CPS), which simulates the network communications of electrical grids. EXata CPS is integrated with OPAL-RT’s HYPERSIM real-time simulator on the same hardware to offer a complete real-time cyber- physical solution for the development, testing, and assessment of electrical grids. [...]

Zero-Day Attacks and What Organizations Can Do to Prevent Them

By |2019-10-01T20:30:07-05:00October 1st, 2019|Categories: Cyber Defense, Cybersecurity, software|Tags: , , , , , , , |

Zero-day attacks. If the term conjures up images of a sci-fi movie with doomsday scenarios, the associations are not entirely without relevance given their potentially destructive nature, particularly for financial services, healthcare, and government organizations that represent the most frequently targeted. According to the Ponemon Institute’s 2018 State of Endpoint Security Risk Report, the average cost [...]