Infradata is now Nomios. Discover our new European brand identity. Learn more


An overview of security and networking definitions, cybersecurity concepts explained and more resources.

Placeholder for Engineer focused behind laptopEngineer focused behind laptop

What is Kaseya ransomware?

On July 2nd 2021 a massive supply-chain ransomware attack on the software company Kaseya took place. The group REvil was behind this attack.

Placeholder for Office building by nightOffice building by night

What is the SOC visibility triad?

The SOC visibility triad provides a multi-layered and network-centric security approach with SIEM, NDR and EDR. Find out what it is and how it works.

Placeholder for Architectural stairs glass roofArchitectural stairs glass roof

What is a managed SOC?

Every organisation wants to be protected against cyber attacks. Protection against cyber attacks gets harder every day, as the attacks become more complex, are ever-evolving, and are increasing in numbers.

Placeholder for Woman smiling holding tabletWoman smiling holding tablet

ZTNA - What is it and why do you want it?

ZTNA stands for Zero Trust Network Access. It ensures that you give secure access to private applications without giving the user access to the enterprise network.

Placeholder for Business woman with laptopBusiness woman with laptop

How to work from home safely?

Recommendations and precautions that are necessary to work from home safely, including secure remote access and what employees can do to improve security when working from home.

Placeholder for Car parking from aboveCar parking from above

What is ransomware?

Ransomware is malicious software used to encrypt computer systems, files and personal information. Once infected by ransomware, a message or ‘ransom note’ is displayed demanding payment for decryption.

Placeholder for Support engineer smilingSupport engineer smiling

What is SOAR?

SOAR (Security Orchestration, Automation and Response) enables organisations to streamline security operations in three key areas: Threat and vulnerability management, incident response and security operations automation.

Placeholder for Woman going up stairwayWoman going up stairway

What is SASE (Secure Access Service Edge)?

SASE or Security Access Service Edge addresses the model of the data centre as the key element in enterprise security that has become obsolete.

Placeholder for Datacenter colocationDatacenter colocation

Next-generation data centre

Simplify IT operations with a next-generation data centre. Important aspects of new cloud infrastructure are agility, simplicity, automation and security.

Placeholder for Developers behind screensDevelopers behind screens

What is REvil ransomware?

REvil ransomware is a file blocking virus considered a serious threat that encrypts files after infection and discards a ransom request message.

Placeholder for Aerial view new york streetsAerial view new york streets

Network switch versus router: What is the difference?

Routers and switches are both computer networking devices that allow one or more computers to be connected to other computers, networked devices, or to other networks.

Placeholder for Video call meetingVideo call meeting

What is secure cloud connect

Discover Secure Cloud Connect Solutions. Securely connected to the public cloud.

Placeholder for Engineer behind screen dark roomEngineer behind screen dark room

What is social engineering?

Social engineering is the practice of duping or tricking people into breaking standard security practices. This non-technical strategy is heavily used by cyber criminals in both targeted and widespread attacks.

Placeholder for Industrial datacenter hallwayIndustrial datacenter hallway


Ethernet VPN-Ethernet Virtual Extensible LAN (EVPN-VXLAN) gives large organisations a common framework used to manage their campus and data centre networks.

Placeholder for Two young engineers officeTwo young engineers office

What is the shared responsibility model?

The shared responsibility model is a framework for cloud security dictating the security obligations of a cloud computing provider and its users to ensure accountability.

Placeholder for Suburban streets and housesSuburban streets and houses

How does multicloud work?

Connect and secure applications across many clouds, as simply as in one cloud.

Placeholder for Facade modern buildingFacade modern building

What is an application layer attack?

An application layer attack, or 'DDoS Attack', targets an application and specific vulnerabilities or issues, so the application is not able to communicate and or deliver content to its user(s).

Placeholder for Aerial view highway flyoversAerial view highway flyovers

What is hybrid cloud?

Hybrid cloud infrastructures allow you to maintain and control dedicated platforms for key systems while benefitting from the flexibility that public cloud solutions offer.