Search
Close this search box.

In the NEWS

Showing 72 Results

72 Results

TechNative logo

Navigating the rising tide of DDoS attacks

As DDoS attacks grow more sophisticated, understanding the latest tactics and defense strategies is crucial. In this TechNative article, GTT's Erik Nordquist explores the dual role of AI in intensifying and defending against DDoS attacks, offering valuable perspectives on robust cybersecurity. Enhance your organization's resilience with these expert insights.

Automation World logo

How SD-WANs Increase Manufacturing Equipment Security

By combining SD-WAN network technology with security systems, manufacturers can swiftly detect and mitigate abnormalities, address vulnerabilities, secure access points and ensure the flow of network traffic. Read this Automation World article by GTT’s Eric Hyman to learn more.

TotalRetail logo

Technology Stacks Retail CIOs and CTOs Can Build to Boost Secure In-Store Shopping Experiences and Sales

The CIOs and CTOs of today's retail organizations play a central role in maximizing sales through the modernization of their technology stacks. This allows them to optimize supply chains, enable real-time data analysis, personalize marketing efforts, and enhance online and in-store shopping experiences. Such initiatives help create seamless omnichannel experiences that meet the demands of tech-savvy consumers, ultimately driving greater loyalty, sales conversion rates, and revenue. Discover more in this Total Retail article by GTT's Jonathan Tinner. 

Telecom Reseller logo

How to Safeguard SIP Trunking to Prevent Security Attacks

As cloud phone systems communications services continue to advance, SIP remains a proven constant at the heart of how we communicate. Implementing SIP trunking security features to reduce vulnerabilities and establishing a culture that promotes hardware and software protection can help safeguard businesses. Read more in this article by GTT Director of Voice Product Management, James McCall.

Preventing Supply Chain Cyberattacks

Why are cybercriminals targeting manufacturing and what can be done about it? Embracing a Zero Trust architecture can significantly enhance security postures for smart manufacturing, reduce vulnerabilities and help safeguard operations. Find out more in this article by Tom Major in Manufacturing.net here.

Media Contact

Americas

MaryLynn Heath, GTT +1-646-214-4078 [email protected]

Europe

Siria Nielsen, GTT +31-6-2835-4259 [email protected]

In the NEWS Archive

Contact Us

Learn more about how GTT can help support your business collaboration, mobility and growth.

OUR GARTNER RATING

Gartner Peer Insights logo
4.2

62 Reviews

88%
as of the last 12 months
Scroll to Top