Linda Musthaler

Linda Musthaler is a principal analyst with Essential Solutions Corp., which researches the practical value of information technology and how it can make individual workers and entire organizations more productive. Essential Solutions offers consulting services to computer industry and corporate clients to help define and fulfill the potential of IT.

Network-as-a-Service: A modern solution to today’s networking challenges

Network-as-a-Service: A modern solution to today’s networking challenges

Cloud migration and mobility are putting huge pressure on networks. Enterprises need a better option, and NaaS delivers, providing network connectivity and security as a service.

Mist’s wireless network lets companies personalize the user experience

Mist’s wireless network lets companies personalize the user experience

Mist Systems solves the problem of personalizing a user’s experience while they are connected to a wireless network and improves user engagement.

Apcela advises how to build a hybrid IT platform for better performance and stronger security

Apcela advises how to build a hybrid IT platform for better performance and stronger security

WAN architectures today are not optimized to handle hybrid applications. Mark Casey, president and CEO of Apcela, advises on how to build a new cloud-ready architecture to improve the security and performance of hybrid applications.

Skyport Systems plugs the agility, security gaps of hybrid cloud

Skyport Systems plugs the agility, security gaps of hybrid cloud

Skyport Systems’ SkySecure Hybrid Cloud Edge securely runs application gateways at the network edge, providing agility and security for apps in the cloud and the data center.

Area 1 Security stops phishing campaigns before they become attacks

Area 1 Security stops phishing campaigns before they become attacks

Area 1 Security scours the web to find signs of brewing phishing campaigns in order to stop them before they can become actual attacks.

VeloCloud launches an SD-WAN security ecosystem

The company's rich security ecosystem provides security on the network and in the cloud

Sift Science uses machine learning to help businesses reduce fraud while enhancing the user experience​

For online businesses, fraud is a serious and growing problem that rule-based systems can no longer address. Machine learning is instrumental in detecting and stopping fraud in real-time, without causing an impact to the user...

Forget signatures for malware detection. SparkCognition says AI is 99% effective  

The volume of malicious software in the wild has exceeded researchers’ ability to write signatures for all of it. The most effective way to detect malware today is through the use of artificial intelligence

Silver Peak enhances its SD-WAN edge device to improve the branch experience  

The goal is more granular Internet breakout for better application performance and tighter security

CyberX assesses industrial environments for cyber risks, provides continuous monitoring

As plants integrate their large-scale physical processes with IT systems for data analytics, it increases the plant’s cyberattack surface, creating a need to continuously monitor the operational environment for threats.

SaferVPN says it takes the risk out of using public Wi-Fi connections  

SaferVPN’s cloud-based VPN automatically establishes a secure connection to take the risk out of using public Wi-Fi

SS8’s time machine is designed to automate the hunt for compromises  

Company says it can detect and predict where breaches are coming from without the need for human intervention

A cybersecurity risk assessment is a critical part of M&A due diligence  

As corporate boards get more deeply involved in understanding their own company’s cybersecurity posture, it stands to reason they would want to know similar information about an acquisition target.

How to achieve security via whitelisting with Docker containers  

Twistlock has developed techniques that effectively provide whitelisting to Docker containers

How to assess security automation tools

Understanding the differences between the tools that promise to ease your security workload

CyberTech conference showcases cybersecurity solutions originating in Israel  

Israel is developing cybersecurity expertise and solutions as a leading export. The recent CyberTech conference in Tel Aviv showcased both products and talent that are making an impact

TechDemocracy aims to provide a holistic assessment of cyber risk  

The company’s platform measures the effectiveness of existing tools and offers a consolidated view

As Baby Boomers retire, the shortage of mainframe professionals grows more acute  

People who started their careers when the mainframe was king are retiring in droves, yet this computing platform is still vital to many businesses

Secdo automates alert investigation with preemptive incident response  

Secdo automates alert investigation with preemptive incident response  

The company says its platform cuts incident response time by correlating alerts with endpoint forensic data, instantly revealing the attack chain, root cause, entities involved and damage assessment

Small businesses are prime targets for cyber attacks: SIEM-as-a-service can help

Netsurion’s SIEM-at-the-Edge puts enterprise-level detection and response capabilities in the hands of SMBs

Load More