Blog

Human Error to Intentional Misdeeds: From Downtime to Disaster

Human Error to Intentional Misdeeds: From Downtime to Disaster

The hot news lately has been about the compromise of networks by outside intruders. The facts show that internal breaches, whether intentional or accidental, done innocently or with malicious intent, comprise nearly half of all hacks. Here are a few statistics:

Oct 04, 2017 Read More→
Will Legacy Infrastructure Strike Back?

Will Legacy Infrastructure Strike Back?

Despite all of the investments being made in transforming networks, both those of service providers and the enterprises they serve, legacy equipment sitting in today’s networks will be around for some time. Why?

Oct 04, 2017 Read More→
Protect What You Connect: Krontech’s Vision, Our Collective Mission

Protect What You Connect: Krontech’s Vision, Our Collective Mission

Today Krontech introduced our new theme and tagline: Protect What You Connect™. We have not taken the common path – we are disrupters and innovators, not because it is cool to be, but because we all share a common desire to protect what we connect.

Oct 04, 2017 Read More→
As the Utility Grid Merges with Communications Networks, the Air Gap My Not Protect Critical Assets

As the Utility Grid Merges with Communications Networks, the Air Gap My Not Protect Critical Assets

It’s deja vu all over again! As the utility grid becomes even more connected, and converges with communications networks to support new applications, including Internet of Things capabilities, new threats and security risks are emerging. The evolution of applications to the cloud is only making the environment more challenging to understand and secure.

Oct 04, 2017 Read More→
Privileged Task Automation Myths and Realities: Rolling A Boulder Up a Hill

Privileged Task Automation Myths and Realities: Rolling A Boulder Up a Hill

As more and more network functions are being virtualized, it only follows that the tasks associated those virtualized functions be automated. Privileged Task Automation (PTA), done properly, ensures that tasks which may previously been assigned privileged users (network operations teams, administrators, contractors, and vendors who need access to networks for maintenance and updates) are done with more accuracy and far less cost through scheduled software actions.

Oct 04, 2017 Read More→