Powerful AI-Based Data Solutions at the Network Edge (11/15/2023) - Powerful AI-based data solutions at the network edge: Our 2U server-based fly-away kit supports up to 3 NVIDIA RTX 4000 SFF GPUs, each individual GPU offers 20GB GDDR6 memory, 6,144 CUDA Cores, and 192 Tensor Cores for outstanding performance in using AI to manage datasets.
NextComputing Hunt Forward FAK Solutions at Alamo ACE 2023 (11/13/2023) - See NextComputing Hunt Forward FAK solutions in person at Alamo ACE 2023, Nov 13-16, where you’ll find the latest and greatest in AIOps and Cyber security solutions. You’ll find us at the booth of our partner and conference sponsor, the Technica Corporation, #70-71. There you’ll be able to see our “Hunt Forward” Fly-Away Kits configured for a variety of use ... Read More
NextComputing Software is Developed in the USA (2/9/2021) - NEXTCOMPUTING’s Packet Continuum and CyberPro software is all internally developed and tested in the USA by US (CONUS) based personnel and generally consistent with the Cybersecurity and Infrastructure Security Agency (CISA) Information and Communications Technology (ICT) Supply Chain Risk Management Task Force objectives for software supply chains https://www.cisa.gov/news/2021/02/04/cisa-announces-extension-information-and-communications-technology-ict-supply-chain For cyber protection teams, SOC, NOC, and quality-of-service analysis use cases, our REST ... Read More
Network Topology Pivot Workflow (4/14/2020) - Using Packet Continuum, an analyst can start from the topology view / connections page to select a connection and then pivot to the global investigator interface to create a search and view packets. The connections page has many pivot points into the global investigator interface. Each node of the Connection Graph pivots to the investigator to show all events with ... Read More
Cyberthreat real-time map by Kaspersky
A stunning look at threats across the world as they are reported. – Click to view
What is a cyberattack? A guide to the different methods cybercriminals use to harm computers and steal data