Nile Access Service
- [{"id":7816,"date":"Dec 3, 2024","author_name":"Sukesh Garg","p_termname":"Nile Access Service","title":"Nile Trust Service: Building a Fortress Based On Modern Campus Zero Trust Security Principles","body_without_editor":"In today's increasingly complex digital landscape, traditional security models have become obsolete. Nile's comprehensive Campus Trust Service offering translates to more efficient and effective enterprise-class security.","post_url":"https:\/\/nilesecure.com\/nile-insights\/nile-trust-service-building-a-fortress-based-on-modern-campus-zero-trust-security-principles","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-2.png","image_alt":"Blog placeholder","termslug":"nile-access-service","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/nile-trust-service-building-a-fortress-based-on-modern-campus-zero-trust-security-principles","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/nile-trust-service-building-a-fortress-based-on-modern-campus-zero-trust-security-principles","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7769,"date":"Nov 18, 2024","author_name":"Savi Venkatachalapathy","p_termname":"Announcements","title":"Securing Campus Networks with Palo Alto Networks Prisma Access and Nile Trust Service","body_without_editor":"Palo Alto Networks has teamed up with Nile. With this integration, Nile Access Service customers can now automatically connect and forward traffic to Prisma Access nodes based on policies defined on Nile to secure all outbound access, including internet and private application access.","post_url":"https:\/\/nilesecure.com\/nile-insights\/securing-campus-networks-with-palo-alto-networks-prisma-access-and-nile-trust-service","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-3.png","image_alt":"Blog placeholder","termslug":"announcements","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/securing-campus-networks-with-palo-alto-networks-prisma-access-and-nile-trust-service","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/securing-campus-networks-with-palo-alto-networks-prisma-access-and-nile-trust-service","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7767,"date":"Nov 13, 2024","author_name":"Karthik Kannan","p_termname":"Nile Access Service","title":"Operational Efficiency by Design: The Heart of Nile's Sustainability Approach","body_without_editor":"Nile's sustainability approach focuses on operational efficiency through eco-friendly design, optimized supply chains, and a proactive \"shift left\" strategy to reduce waste and extend equipment lifespan.","post_url":"https:\/\/nilesecure.com\/nile-insights\/operational-efficiency-by-design-the-heart-of-niles-sustainability-approach","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-2.png","image_alt":"Blog placeholder","termslug":"nile-access-service","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/operational-efficiency-by-design-the-heart-of-niles-sustainability-approach","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/operational-efficiency-by-design-the-heart-of-niles-sustainability-approach","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7716,"date":"Oct 22, 2024","author_name":"Sukesh Garg","p_termname":"Announcements","title":"Leading campus NaaS solution now gives you SSO for wired connected devices","body_without_editor":"We've taken Zero Trust security to a new level that also makes it easy for your users.","post_url":"https:\/\/nilesecure.com\/nile-insights\/leading-campus-naas-solution-now-gives-you-sso-for-wired-connected-devices","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-3.png","image_alt":"Blog placeholder","termslug":"announcements","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/leading-campus-naas-solution-now-gives-you-sso-for-wired-connected-devices","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/leading-campus-naas-solution-now-gives-you-sso-for-wired-connected-devices","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7676,"date":"Oct 10, 2024","author_name":"Andrew Froehlich","p_termname":"Technology & Innovation","title":"The 5 Benefits of Nile\u2019s Cloud-delivered Software Model","body_without_editor":"Explore the benefits of Nile\u2019s cloud-delivered software model, boosting network performance, security, and IT efficiency.","post_url":"https:\/\/nilesecure.com\/nile-insights\/the-5-benefits-of-niles-cloud-delivered-software-model","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-4.png","image_alt":"Blog placeholder","termslug":"technology-innovation","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/the-5-benefits-of-niles-cloud-delivered-software-model","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/the-5-benefits-of-niles-cloud-delivered-software-model","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7662,"date":"Oct 3, 2024","author_name":"Trent Fierro","p_termname":"Technology & Innovation","title":"EDUCAUSE Horizon Report: What This Means For You","body_without_editor":"The 2024 EDUCAUSE Horizon Report on Cybersecurity and Privacy delves into the challenges, emerging trends, key technologies, and possible scenarios shaping the future of these crucial areas. Below is a detailed overview of the report\u2019s key findings and how organizations like Nile can provide essential support to institutions grappling with these challenges.","post_url":"https:\/\/nilesecure.com\/nile-insights\/educause-horizon-report-what-this-means-for-you","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-4.png","image_alt":"Blog placeholder","termslug":"technology-innovation","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/educause-horizon-report-what-this-means-for-you","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/educause-horizon-report-what-this-means-for-you","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7657,"date":"Oct 1, 2024","author_name":"Karthik Nathillvar","p_termname":"Technology & Innovation","title":"Nile AI Networking: Automation That Delivers Guaranteed Performance","body_without_editor":"Karthik Nathillvar dives into the approach Nile has taken with an AI networking and cloud-centric approach that leverages large-scale data collection, continuous monitoring, and closed-loop-automation. This enables us to leverage AI and machine learning throughout the network design and lifecycle management stages of a network. An end-to-end automation approach enables us to deliver the industry\u2019s first financially-backed performance guarantee.","post_url":"https:\/\/nilesecure.com\/nile-insights\/nile-ai-networking-automation-that-delivers-guaranteed-performance","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-4.png","image_alt":"Blog placeholder","termslug":"technology-innovation","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/nile-ai-networking-automation-that-delivers-guaranteed-performance","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/nile-ai-networking-automation-that-delivers-guaranteed-performance","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7618,"date":"Sep 11, 2024","author_name":"Trent Fierro","p_termname":"Points of View","title":"Network Design for Today\u2019s Evolving Business Environment","body_without_editor":"It's time for a new approach to enterprise network design that ensures consistent performance, coverage and availability, in every location.","post_url":"https:\/\/nilesecure.com\/nile-insights\/network-design-for-todays-evolving-business-environment","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-1.png","image_alt":"Blog placeholder","termslug":"points-of-view","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/network-design-for-todays-evolving-business-environment","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/network-design-for-todays-evolving-business-environment","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7593,"date":"Sep 4, 2024","author_name":"Sukesh Garg","p_termname":"Announcements","title":"New AI Feature Enhancements Raise The Bar Tied To User Experience And More","body_without_editor":"We\u2019ve taken our AI networking features and insights, and raised the bar. We\u2019re proud to announce we\u2019re now using a 99.95% baseline for our Nile Access Service coverage, capacity, and availability performance guarantee.","post_url":"https:\/\/nilesecure.com\/nile-insights\/new-ai-feature-enhancements-raise-the-bar-tied-to-user-experience-and-more","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-3.png","image_alt":"Blog placeholder","termslug":"announcements","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/new-ai-feature-enhancements-raise-the-bar-tied-to-user-experience-and-more","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/new-ai-feature-enhancements-raise-the-bar-tied-to-user-experience-and-more","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7590,"date":"Sep 4, 2024","author_name":"Andrew Froehlich","p_termname":"Nile Access Service","title":"From Network Maintenance to Strategy: Embracing Nile Superpowers for Networking","body_without_editor":"Too much time is wasted on network care and upkeep while more strategic, impactful, and fulfilling undertakings fall by the wayside. With Nile, network roles can be elevated into strategic and fulfilling jobs. Nile gives you the time needed to use your expertise in ways that make IT engineering fun and meaningful again. ","post_url":"https:\/\/nilesecure.com\/nile-insights\/from-network-maintenance-to-strategy-embracing-nile-superpowers-for-networking","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-2.png","image_alt":"Blog placeholder","termslug":"nile-access-service","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/from-network-maintenance-to-strategy-embracing-nile-superpowers-for-networking","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/from-network-maintenance-to-strategy-embracing-nile-superpowers-for-networking","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7588,"date":"Sep 3, 2024","author_name":"Dipen Vardhe","p_termname":"Nile Access Service","title":"Automated AI-driven Software Upgrades for Cloud-like LAN Efficiency","body_without_editor":"Thanks to its modern cloud software architecture, Nile Access Service orchestrates rollouts for new software releases including performance validation with closed loop automation powered by AI.","post_url":"https:\/\/nilesecure.com\/nile-insights\/automated-ai-driven-software-upgrades","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-2.png","image_alt":"Blog placeholder","termslug":"nile-access-service","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/automated-ai-driven-software-upgrades","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/automated-ai-driven-software-upgrades","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7586,"date":"Aug 30, 2024","author_name":"Dipen Vardhe","p_termname":"Nile Access Service","title":"AI-powered Site Surveys for Long-term Wireless LAN Optimization","body_without_editor":"Nile Access Service automates traditionally manual wireless site survey actions in real-time, thanks to closed loop automation powered by AI.","post_url":"https:\/\/nilesecure.com\/nile-insights\/ai-powered-site-surveys-for-long-term-wireless-lan-optimization","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-2.png","image_alt":"Blog placeholder","termslug":"nile-access-service","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/ai-powered-site-surveys-for-long-term-wireless-lan-optimization","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/ai-powered-site-surveys-for-long-term-wireless-lan-optimization","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7568,"date":"Aug 27, 2024","author_name":"Karthik Nathillvar","p_termname":"Nile Access Service","title":"AI and Automation that Eliminates Costly Hardware RMAs and On-site Visits","body_without_editor":"Nile Access Service proactively monitors the baseline performance for all software functions across the network deployment and orchestrates deployment of software fixes, thanks to closed loop automation powered by AI.","post_url":"https:\/\/nilesecure.com\/nile-insights\/ai-and-automation-that-eliminates-costly-hardware-rmas-and-on-site-visits","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-2.png","image_alt":"Blog placeholder","termslug":"nile-access-service","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/ai-and-automation-that-eliminates-costly-hardware-rmas-and-on-site-visits","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/ai-and-automation-that-eliminates-costly-hardware-rmas-and-on-site-visits","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7535,"date":"Aug 14, 2024","author_name":"Trent Fierro","p_termname":"Nile Access Service","title":"Why Zero Trust Security Must Extend to Guest Wi-Fi","body_without_editor":"Trent Fierro goes in depth on how Nile's Guest Service empowers IT organizations to take advantage of modern zero trust network principles to protect their guests' devices and data.","post_url":"https:\/\/nilesecure.com\/nile-insights\/why-zero-trust-security-must-extend-to-guest-wi-fi","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-2.png","image_alt":"Blog placeholder","termslug":"nile-access-service","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/why-zero-trust-security-must-extend-to-guest-wi-fi","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/why-zero-trust-security-must-extend-to-guest-wi-fi","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7524,"date":"Aug 7, 2024","author_name":"Mike Landry","p_termname":"Points of View","title":"A Look at the Future of Network Engineering","body_without_editor":"Modern network and security requirements are transforming the networking landscape, offering network engineers new opportunities to enhance their roles and contribute strategically to their organizations.","post_url":"https:\/\/nilesecure.com\/nile-insights\/a-look-at-the-future-of-network-engineering","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-1.png","image_alt":"Blog placeholder","termslug":"points-of-view","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/a-look-at-the-future-of-network-engineering","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/a-look-at-the-future-of-network-engineering","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7512,"date":"Aug 6, 2024","author_name":"Sukesh Garg","p_termname":"Announcements","title":"Nile Access Service Improvements in June Targeted Security and IT Efficiency","body_without_editor":"The engineering team at Nile has been hard at work in June building new features aimed at helping everyone achieve their goals. Enhanced network visibility and security result in greater efficiency, allowing you more time to focus on what matters most to you.","post_url":"https:\/\/nilesecure.com\/nile-insights\/nile-access-service-improvements-in-june-targeted-security-and-it-efficiency","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-3.png","image_alt":"Blog placeholder","termslug":"announcements","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/nile-access-service-improvements-in-june-targeted-security-and-it-efficiency","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/nile-access-service-improvements-in-june-targeted-security-and-it-efficiency","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7493,"date":"Jul 23, 2024","author_name":"Karthik Nathillvar","p_termname":"Nile Access Service","title":"A Unique New AI-powered Network Design and Deployment Efficiency Model","body_without_editor":"Nile Access Service enables deterministic design and install of an enterprise network, thanks to closed loop automation powered by AI. ","post_url":"https:\/\/nilesecure.com\/nile-insights\/a-unique-new-ai-powered-network-design","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-2.png","image_alt":"Blog placeholder","termslug":"nile-access-service","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/a-unique-new-ai-powered-network-design","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/a-unique-new-ai-powered-network-design","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7443,"date":"Jul 17, 2024","author_name":"Karthik Nathillvar","p_termname":"Nile Access Service","title":"AI-driven Insights for Proactive Detection and Resolution of Wired LAN Issues","body_without_editor":"Nile Access Service proactively detects and automates resolution for wired link errors, thanks to closed loop automation powered by AI. ","post_url":"https:\/\/nilesecure.com\/nile-insights\/ai-driven-insights-for-proactive-detection-and-resolution-of-wired-lan-issues","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-2.png","image_alt":"Blog placeholder","termslug":"nile-access-service","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/ai-driven-insights-for-proactive-detection-and-resolution-of-wired-lan-issues","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/ai-driven-insights-for-proactive-detection-and-resolution-of-wired-lan-issues","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7416,"date":"Jul 11, 2024","author_name":"Andrew Froehlich","p_termname":"Technology & Innovation","title":"What is NaaS? A new report reveals that it's time to find out","body_without_editor":"Campus NaaS is a transformational approach that's generating excitement. Find out how it can help you deliver the best user experience possible while saving time and money.","post_url":"https:\/\/nilesecure.com\/nile-insights\/what-is-naas-a-new-report-reveals-that-its-time-to-find-out","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-4.png","image_alt":"Blog placeholder","termslug":"technology-innovation","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/what-is-naas-a-new-report-reveals-that-its-time-to-find-out","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/what-is-naas-a-new-report-reveals-that-its-time-to-find-out","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7363,"date":"Jun 6, 2024","author_name":"Suresh Katukam","p_termname":"Points of View","title":"A Segment of One - Eliminating Lateral Movement and Malware Within the Campus Network","body_without_editor":"In this blog, Nile's Chief Product Officer, Suresh Katukam explains the importance of eliminating lateral movement and malware within the campus network.","post_url":"https:\/\/nilesecure.com\/nile-insights\/a-segment-of-one-eliminating-lateral-movement-and-malware-within-the-campus-network","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-1.png","image_alt":"Blog placeholder","termslug":"points-of-view","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/a-segment-of-one-eliminating-lateral-movement-and-malware-within-the-campus-network","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/a-segment-of-one-eliminating-lateral-movement-and-malware-within-the-campus-network","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7344,"date":"Jun 3, 2024","author_name":"Andrew Froehlich","p_termname":"Nile Access Service","title":"Your Hands-On Experience with the Nile Copilot","body_without_editor":"We're excited to announce the launch of the Nile Copilot Experience Center. This live and interactive demo environment allows IT professionals to freely navigate the Nile Copilot dashboard for IT admins.","post_url":"https:\/\/nilesecure.com\/nile-insights\/your-hands-on-experience-with-the-nile-copilot","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-2.png","image_alt":"Blog placeholder","termslug":"nile-access-service","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/your-hands-on-experience-with-the-nile-copilot","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/your-hands-on-experience-with-the-nile-copilot","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7341,"date":"May 31, 2024","author_name":"Sukesh Garg","p_termname":"Announcements","title":"May just flew by: Nile Access Service optimization and visibility improvements","body_without_editor":"Our focus in May was on providing more information that helps determine if the network was experiencing issues or if problems were due to something else.","post_url":"https:\/\/nilesecure.com\/nile-insights\/may-just-flew-by-nile-access-service-optimization-and-visibility-improvements","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-3.png","image_alt":"Blog placeholder","termslug":"announcements","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/may-just-flew-by-nile-access-service-optimization-and-visibility-improvements","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/may-just-flew-by-nile-access-service-optimization-and-visibility-improvements","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7328,"date":"May 28, 2024","author_name":"Todd Ellison","p_termname":"Points of View","title":"Newly Discovered TunnelVision Attack Exposes Flaws in Legacy Zero Trust Networks","body_without_editor":"One of the most common ways that attackers infiltrate enterprise networks is through lateral movement. The adversary will compromise a low value, easy to exploit target and then use that as a launching point to perform reconnaissance, steal data, or perform a more complex attack against a better protected asset.","post_url":"https:\/\/nilesecure.com\/nile-insights\/newly-discovered-tunnelvision-attack-exposes-flaws-in-legacy-zero-trust-networks","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-1.png","image_alt":"Blog placeholder","termslug":"points-of-view","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/newly-discovered-tunnelvision-attack-exposes-flaws-in-legacy-zero-trust-networks","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/newly-discovered-tunnelvision-attack-exposes-flaws-in-legacy-zero-trust-networks","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7309,"date":"May 21, 2024","author_name":"\u00d6zer Dondurmac\u0131o\u011flu","p_termname":"Technology & Innovation","title":"Wired & Wireless Networks as Agile as the Cloud","body_without_editor":"Campus and branch networks today fail to match the speed of the cloud and its agile operational model. Nile Access Service defines a new path forward, supported by industry\u2019s first service level guarantees. ","post_url":"https:\/\/nilesecure.com\/nile-insights\/wired-wireless-networks-as-agile-as-the-cloud","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-4.png","image_alt":"Blog placeholder","termslug":"technology-innovation","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/wired-wireless-networks-as-agile-as-the-cloud","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/wired-wireless-networks-as-agile-as-the-cloud","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7297,"date":"May 20, 2024","author_name":"Joe Hall","p_termname":"Points of View","title":"Lateral Movement - The Skeleton in your Network Closet","body_without_editor":"Joe Hall discusses the ability for someone to wreak havoc on a business or organization, which is as easy as infiltrating a single device and using the weak spots in a network to explore.","post_url":"https:\/\/nilesecure.com\/nile-insights\/lateral-movement-the-skeleton-in-your-network-closet","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-1.png","image_alt":"Blog placeholder","termslug":"points-of-view","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/lateral-movement-the-skeleton-in-your-network-closet","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/lateral-movement-the-skeleton-in-your-network-closet","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7296,"date":"May 17, 2024","author_name":"Andrew Froehlich","p_termname":"Technology & Innovation","title":"5 Steps to a Successful Nile Transition","body_without_editor":"At Nile, we understand that our as-a-service model requires adjustments to how your network is designed, purchased, procured, deployed, and managed. But if the right organizational changes are addressed, we know the benefits far outweigh the effort.","post_url":"https:\/\/nilesecure.com\/nile-insights\/5-steps-to-a-successful-nile-transition","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-4.png","image_alt":"Blog placeholder","termslug":"technology-innovation","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/5-steps-to-a-successful-nile-transition","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/5-steps-to-a-successful-nile-transition","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7286,"date":"May 14, 2024","author_name":"Michael Kowal","p_termname":"Points of View","title":"Part 1: How I Survived a Network Refresh (A Horror Story)","body_without_editor":"In this blog, Michael Kowal discusses the horror story that is the traditional network refresh.","post_url":"https:\/\/nilesecure.com\/nile-insights\/part-1-how-i-survived-a-network-refresh-a-horror-story","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-1.png","image_alt":"Blog placeholder","termslug":"points-of-view","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/part-1-how-i-survived-a-network-refresh-a-horror-story","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/part-1-how-i-survived-a-network-refresh-a-horror-story","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7191,"date":"May 1, 2024","author_name":"Sukesh Garg","p_termname":"Announcements","title":"Unlocking the potential of the Nile Access Service: Visibility and Operational Simplicity Spring to the Top in April","body_without_editor":"This past month was interesting from an engagement standpoint. As our user community is growing you\u2019re asking for ways to improve the Nile experience to save you time. In fact, the majority of feature improvements being asked for were all geared towards simple and easy to use operational enhancements.","post_url":"https:\/\/nilesecure.com\/nile-insights\/unlocking-the-potential-of-the-nile-access-service-visibility-and-operational-simplicity-spring-to-the-top-in-april","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-3.png","image_alt":"Blog placeholder","termslug":"announcements","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/unlocking-the-potential-of-the-nile-access-service-visibility-and-operational-simplicity-spring-to-the-top-in-april","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/unlocking-the-potential-of-the-nile-access-service-visibility-and-operational-simplicity-spring-to-the-top-in-april","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7190,"date":"Apr 30, 2024","author_name":"Andrew Froehlich","p_termname":"Nile Access Service","title":"The Enterprise Network Refresh, Reimagined","body_without_editor":"Using traditional methods, staggered wired and wireless network infrastructure upgrades lead to inconsistent user experiences, present a massive burden on your IT budget, and consume precious time and resources. With Nile, you gain access to a network infrastructure that is rapidly designed and deployed for you and automatically maintains itself with an all-inclusive lifecycle management service\u2014one that comes with guaranteed outcomes.","post_url":"https:\/\/nilesecure.com\/nile-insights\/the-enterprise-network-refresh-reimagined","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-2.png","image_alt":"Blog placeholder","termslug":"nile-access-service","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/the-enterprise-network-refresh-reimagined","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/the-enterprise-network-refresh-reimagined","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7179,"date":"Apr 25, 2024","author_name":"Michel Davidoff","p_termname":"Points of View","title":"The \"Best Practices\" Paradox: Unmasking IT's Dirty Little Secret","body_without_editor":"In the ever-evolving landscape of information technology, the concept of \"best practices\" is often touted as the cure-all for ensuring successful implementations, optimized performance, and robust security postures.","post_url":"https:\/\/nilesecure.com\/nile-insights\/the-best-practices-paradox-unmasking-its-dirty-little-secret","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-1.png","image_alt":"Blog placeholder","termslug":"points-of-view","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/the-best-practices-paradox-unmasking-its-dirty-little-secret","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/the-best-practices-paradox-unmasking-its-dirty-little-secret","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":7114,"date":"Apr 1, 2024","author_name":"Sukesh Garg","p_termname":"Announcements","title":"New Zero Trust Security improvements dominate March Madness","body_without_editor":"This February we introduced four new security enhancements as well as various improvements tied to the use of Nile\u2019s DHCP service and simplified troubleshooting features. As our install base expands, the suggestions we\u2019ve received from our customers have continued to help us improve and this makes everyone a winner. Consistency. Performance. Trust.","post_url":"https:\/\/nilesecure.com\/nile-insights\/new-zero-trust-security-improvements-dominate-march-madness","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-3.png","image_alt":"Blog placeholder","termslug":"announcements","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/new-zero-trust-security-improvements-dominate-march-madness","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/new-zero-trust-security-improvements-dominate-march-madness","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":6087,"date":"Mar 12, 2024","author_name":"Trent Fierro","p_termname":"Points of View","title":"Real-time data matters if you want to join the AI networking game","body_without_editor":"Nile's Director of Services Marketing, Trent Fierro offers his insight into real-time data in AI networking.","post_url":"https:\/\/nilesecure.com\/nile-insights\/real-time-data-matters-if-you-want-to-join-the-ai-networking-game","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-1.png","image_alt":"Blog placeholder","termslug":"points-of-view","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/real-time-data-matters-if-you-want-to-join-the-ai-networking-game","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/real-time-data-matters-if-you-want-to-join-the-ai-networking-game","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":5404,"date":"Mar 7, 2024","author_name":"Suresh Katukam","p_termname":"Points of View","title":"AI for the Access Network, Building a Recipe for Success","body_without_editor":"Nile's Chief Product Officer, Suresh Katukam offers a few problem statements that AI can tackle in the enterprise networking space.","post_url":"https:\/\/nilesecure.com\/nile-insights\/ai-for-the-access-network-building-a-recipe-for-success","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-1.png","image_alt":"Blog placeholder","termslug":"points-of-view","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/ai-for-the-access-network-building-a-recipe-for-success","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/ai-for-the-access-network-building-a-recipe-for-success","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":5121,"date":"Feb 27, 2024","author_name":"Dipen Vardhe","p_termname":"Nile Access Service","title":"Wi-Fi 6 and Wi-Fi 6E Working Together","body_without_editor":"A look at where Wi-Fi 6E makes sense today","post_url":"https:\/\/nilesecure.com\/nile-insights\/wi-fi-6-and-wi-fi-6e-working-together","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-2.png","image_alt":"Blog placeholder","termslug":"nile-access-service","button":{"asstes_cta_links":[{"text":"Read Now","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/wi-fi-6-and-wi-fi-6e-working-together","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/wi-fi-6-and-wi-fi-6e-working-together","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":5123,"date":"Feb 27, 2024","author_name":"Sukesh Garg","p_termname":"Nile Access Service","title":"Unlocking the potential of the Nile Access Service","body_without_editor":"An up close look at our latest set of service improvements","post_url":"https:\/\/nilesecure.com\/nile-insights\/unlocking-the-potential-of-the-nile-access-service","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-2.png","image_alt":"Blog placeholder","termslug":"nile-access-service","button":{"asstes_cta_links":false},"target":"_self","link_text":"Read Now","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/unlocking-the-potential-of-the-nile-access-service","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":3186,"date":"Jan 25, 2024","author_name":"Austin Hawthorne","p_termname":"Nile Access Service","title":"Why Choosing Nile is a Calculated Risk Worth Taking","body_without_editor":"In the rapidly evolving world of technology, choosing a startup like Nile over established giants may seem daunting. But as someone who has navigated the enterprise network and security industry for over 25 years, and been part of some startups that have become giants, I\u2019ve come to see such decisions as opportunities for embracing change.","post_url":"https:\/\/nilesecure.com\/nile-insights\/why-choosing-nile-is-a-calculated-risk-worth-taking","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-2.png","image_alt":"Blog placeholder","termslug":"nile-access-service","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/why-choosing-nile-is-a-calculated-risk-worth-taking","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/why-choosing-nile-is-a-calculated-risk-worth-taking","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":3184,"date":"Jan 11, 2024","author_name":"Louis Serlenga","p_termname":"Points of View","title":"A Networking Perspective For IT Leaders","body_without_editor":"Being responsible for the life cycle of your organizations network comes with challenges. Let\u2019s explore your options.","post_url":"https:\/\/nilesecure.com\/nile-insights\/a-networking-perspective-for-it-leaders","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-1.png","image_alt":"Blog placeholder","termslug":"points-of-view","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/a-networking-perspective-for-it-leaders","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/a-networking-perspective-for-it-leaders","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":3180,"date":"Jan 4, 2024","author_name":"Suresh Katukam","p_termname":"Points of View","title":"Bold Predictions for Enterprise Networking in 2024","body_without_editor":"Read Suresh Katukam\u2019s predictions on the enterprise network and how the technologies it employs will be used in new and interesting ways in 2024.","post_url":"https:\/\/nilesecure.com\/nile-insights\/bold-predictions-for-enterprise-networking-in-2024","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-1.png","image_alt":"Blog placeholder","termslug":"points-of-view","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/bold-predictions-for-enterprise-networking-in-2024","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/bold-predictions-for-enterprise-networking-in-2024","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":3178,"date":"Dec 18, 2023","author_name":"\u00d6zer Dondurmac\u0131o\u011flu","p_termname":"Points of View","title":"Charting the Digital Campus: Got a Minute to Dive In?","body_without_editor":"Ever tried getting a stubborn coffee machine to work, only to find out it just needed a simple reboot? Sometimes, our network connectivity in university and college campuses feel like that old coffee machine. They\u2019re thirsting for a digital revamp.","post_url":"https:\/\/nilesecure.com\/nile-insights\/charting-the-digital-campus-got-a-minute-to-dive-in","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-1.png","image_alt":"Blog placeholder","termslug":"points-of-view","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/charting-the-digital-campus-got-a-minute-to-dive-in","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/charting-the-digital-campus-got-a-minute-to-dive-in","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":3175,"date":"Dec 7, 2023","author_name":"\u00d6zer Dondurmac\u0131o\u011flu","p_termname":"Points of View","title":"Rethinking Access Networks: A Call for Transformation in Higher Education","body_without_editor":"In an era dominated by digitalization, our higher education institutions are paradoxically trapped in a time warp. As academia takes giant strides forward, the underlying technology infrastructure across the campus \u2014 specifically, the wired and wireless network connectivity \u2014 often remains mired in practices and frameworks of a bygone age. This status quo isn\u2019t just outdated; it\u2019s becoming a liability.","post_url":"https:\/\/nilesecure.com\/nile-insights\/rethinking-access-networks-a-call-for-transformation-in-higher-education","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-1.png","image_alt":"Blog placeholder","termslug":"points-of-view","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/rethinking-access-networks-a-call-for-transformation-in-higher-education","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/rethinking-access-networks-a-call-for-transformation-in-higher-education","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":3156,"date":"Nov 16, 2023","author_name":"Michel Davidoff","p_termname":"Points of View","title":"Building a Resilient Framework for Higher Education Campus Infrastructure","body_without_editor":"This article explores how optimizing efficiency while supporting staff is essential to overcoming current challenges. By taking a data-driven approach, fostering agility, transforming IT management, and rallying collaborative efforts, institutions can infuse resilience into all facets of the organization.","post_url":"https:\/\/nilesecure.com\/nile-insights\/building-a-resilient-framework-for-higher-education-campus-infrastructure","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-1.png","image_alt":"Blog placeholder","termslug":"points-of-view","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/building-a-resilient-framework-for-higher-education-campus-infrastructure","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/building-a-resilient-framework-for-higher-education-campus-infrastructure","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":3153,"date":"Nov 14, 2023","author_name":"\u00d6zer Dondurmac\u0131o\u011flu","p_termname":"Points of View","title":"Rethinking School Networks: A New Dawn for Primary Education","body_without_editor":"The digital revolution has undeniably permeated primary education, ushering in an era where classrooms extend beyond four walls, where teaching tools have evol","post_url":"https:\/\/nilesecure.com\/nile-insights\/rethinking-school-networks-a-new-dawn-for-primary-education","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-1.png","image_alt":"Blog placeholder","termslug":"points-of-view","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/rethinking-school-networks-a-new-dawn-for-primary-education","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/rethinking-school-networks-a-new-dawn-for-primary-education","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":3151,"date":"Oct 31, 2023","author_name":"Victor Lam","p_termname":"Announcements","title":"Nile and Net One Systems Usher In a New Era in Wired & Wireless LAN to Japan","body_without_editor":"Nile has signed a Memorandum of Understanding (MOU) with the prominent Japanese systems integrator, Net One Systems.","post_url":"https:\/\/nilesecure.com\/nile-insights\/nile-and-net-one-systems-usher-in-a-new-era-in-wired-wireless-lan-to-japan","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-3.png","image_alt":"Blog placeholder","termslug":"announcements","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/nile-and-net-one-systems-usher-in-a-new-era-in-wired-wireless-lan-to-japan","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/nile-and-net-one-systems-usher-in-a-new-era-in-wired-wireless-lan-to-japan","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":3148,"date":"Oct 6, 2023","author_name":"Pankaj Patel","p_termname":"Points of View","title":"Pulse Check with Pankaj","body_without_editor":"Precisely five years ago today, we launched Nile with the goal of creating a fundamentally new approach to the enterprise access network. About a year ago, the Nile Access Service became generally available to enterprises everywhere as the first, major step in fulfilling that goal.","post_url":"https:\/\/nilesecure.com\/nile-insights\/pulse-check-with-pankaj","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-1.png","image_alt":"Blog placeholder","termslug":"points-of-view","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/pulse-check-with-pankaj","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/pulse-check-with-pankaj","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":3143,"date":"Sep 18, 2023","author_name":"Shaman Anderson","p_termname":"Points of View","title":"The Fallacy of the \u2018Set It and Forget It\u2019 Wireless Network for Schools","body_without_editor":"In an age of ever-increasing network complexity, the number of resources and time required to manage it are in short supply.","post_url":"https:\/\/nilesecure.com\/nile-insights\/the-fallacy-of-the-set-it-and-forget-it-wireless-network-for-schools","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-1.png","image_alt":"Blog placeholder","termslug":"points-of-view","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/the-fallacy-of-the-set-it-and-forget-it-wireless-network-for-schools","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/the-fallacy-of-the-set-it-and-forget-it-wireless-network-for-schools","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":3136,"date":"Sep 7, 2023","author_name":"Vernon Shure","p_termname":"Technology & Innovation","title":"How Nile Access Service Integrates with Infoblox NIOS (Enterprise DDI)","body_without_editor":"Nile has entered into a technology partnership with Infoblox\u24c7, an IT industry leader that offers networking and IT security products. Infoblox was founded in 1999 and is headquartered in Santa Clara, California. This blog entry describes how Infoblox NIOS and Nile Access Service integrate, and how that will yield important benefits for customers that want to use both offerings together.","post_url":"https:\/\/nilesecure.com\/nile-insights\/how-nile-access-service-integrates-with-infoblox-nios-enterprise-ddi","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-4.png","image_alt":"Blog placeholder","termslug":"technology-innovation","button":{"asstes_cta_links":[{"text":"Read More ","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/how-nile-access-service-integrates-with-infoblox-nios-enterprise-ddi","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More ","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/how-nile-access-service-integrates-with-infoblox-nios-enterprise-ddi","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":3129,"date":"Aug 29, 2023","author_name":"Karthik Nathillvar","p_termname":"Technology & Innovation","title":"Nile Dramatically Reduces the Burden on IT Operations","body_without_editor":"Nile Access Service eliminates the burden on IT operations by sharing responsibility for network infrastructure and proactively driving closed-loop automation to ensure guaranteed performance, coverage, and capacity.","post_url":"https:\/\/nilesecure.com\/nile-insights\/nile-dramatically-reduces-the-burden-on-it-operations","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-4.png","image_alt":"Blog placeholder","termslug":"technology-innovation","button":{"asstes_cta_links":[{"text":"Read More ","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/nile-dramatically-reduces-the-burden-on-it-operations","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More ","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/nile-dramatically-reduces-the-burden-on-it-operations","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":3124,"date":"Aug 14, 2023","author_name":"Michel Davidoff","p_termname":"Technology & Innovation","title":"What Are the Key Differences and Similarities between NaaS and an MSP?","body_without_editor":"The emergence of Network as a Service (NaaS) has sparked inquiries regarding its difference from and similarities to a Managed Service Provider (MSP), and how the two may work together.","post_url":"https:\/\/nilesecure.com\/nile-insights\/what-are-the-key-differences-and-similarities-between-naas-and-an-msp","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-4.png","image_alt":"Blog placeholder","termslug":"technology-innovation","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/what-are-the-key-differences-and-similarities-between-naas-and-an-msp","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/what-are-the-key-differences-and-similarities-between-naas-and-an-msp","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":3121,"date":"Jun 28, 2023","author_name":"Suresh Katukam","p_termname":"Technology & Innovation","title":"Taking the Road Less Traveled: The Uncharted Path for Enterprise Wired and Wireless as a Service","body_without_editor":"Customers go through a series of stages as they embrace true Network as a Service (NaaS). It requires letting go of old knowledge and unlearning decades of habits. But once they grasp the new paradigm, they fall head over heels in love with it.","post_url":"https:\/\/nilesecure.com\/nile-insights\/taking-the-road-less-traveled-the-uncharted-path-for-enterprise-wired-and-wireless-as-a-service","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-4.png","image_alt":"Blog placeholder","termslug":"technology-innovation","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/taking-the-road-less-traveled-the-uncharted-path-for-enterprise-wired-and-wireless-as-a-service","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/taking-the-road-less-traveled-the-uncharted-path-for-enterprise-wired-and-wireless-as-a-service","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":3118,"date":"Jun 15, 2023","author_name":"Kevin Burgess","p_termname":"Technology & Innovation","title":"IaaS vs PaaS vs NaaS","body_without_editor":"Read about the key differences between IaaS, PaaS, and NaaS. See what drove a customer to become a true NaaS champion and believer.","post_url":"https:\/\/nilesecure.com\/nile-insights\/iaas-vs-paas-vs-naas","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-4.png","image_alt":"Blog placeholder","termslug":"technology-innovation","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/iaas-vs-paas-vs-naas","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/iaas-vs-paas-vs-naas","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":3114,"date":"Jun 13, 2023","author_name":"Calvin Nguyen","p_termname":"Technology & Innovation","title":"NaaS integrates Day 0 \/ Day 1 network operations","body_without_editor":"Network as a Service (NaaS) is a cloud-delivered model that offloads these burdens from an organization to a vendor by having the entire network\u2019s lifecycle included as a Service (aaS).","post_url":"https:\/\/nilesecure.com\/nile-insights\/naas-integrates-day-0-day-1-network-operations","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-4.png","image_alt":"Blog placeholder","termslug":"technology-innovation","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/naas-integrates-day-0-day-1-network-operations","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/naas-integrates-day-0-day-1-network-operations","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":3098,"date":"Jun 7, 2023","author_name":"Sangita Patel","p_termname":"Announcements","title":"Nile and Palo Alto Networks partner for more granular security","body_without_editor":"Nile\u2019s extended partnership with PAN brings increased visibility and granularity for centralized policy enforcement.","post_url":"https:\/\/nilesecure.com\/nile-insights\/nile-and-palo-alto-networks-partner-for-more-granular-security","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-3.png","image_alt":"Blog placeholder","termslug":"announcements","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/nile-and-palo-alto-networks-partner-for-more-granular-security","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/nile-and-palo-alto-networks-partner-for-more-granular-security","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":3084,"date":"Apr 25, 2023","author_name":"Michel Davidoff","p_termname":"Announcements","title":"Nile Hits Bullseye in Educause\u2019s 2023 Top 10 IT Issues List","body_without_editor":"Network as a Service delivers on key challenges for IT in 2023.","post_url":"https:\/\/nilesecure.com\/nile-insights\/nile-hits-bullseye-in-educauses-2023-top-10-it-issues-list","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-3.png","image_alt":"Blog placeholder","termslug":"announcements","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/nile-hits-bullseye-in-educauses-2023-top-10-it-issues-list","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/nile-hits-bullseye-in-educauses-2023-top-10-it-issues-list","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":3081,"date":"Apr 20, 2023","author_name":"Jasmine Shah","p_termname":"Points of View","title":"Why St. Albert the Great Expands on Their Nile Network","body_without_editor":"St. Albert the Great expands on their Nile Network across campus to enhance the learning experience, streamline operations and enable teachers to focus on educating students.","post_url":"https:\/\/nilesecure.com\/nile-insights\/why-st-albert-the-great-expands-on-their-nile-network","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-1.png","image_alt":"Blog placeholder","termslug":"points-of-view","button":{"asstes_cta_links":[{"text":"Read more","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/why-st-albert-the-great-expands-on-their-nile-network","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read more","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/why-st-albert-the-great-expands-on-their-nile-network","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":3077,"date":"Apr 13, 2023","author_name":"Dipen Vardhe","p_termname":"Technology & Innovation","title":"NaaS Must Include Extensive WIDS\/WIPS","body_without_editor":"Wireless networks are subject to attack from a variety of security threats. The Nile Access Service includes safeguards to detect and prevent wireless intrusion. \t\t\t\t\t\t","post_url":"https:\/\/nilesecure.com\/nile-insights\/naas-must-include-extensive-wids-wips","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-4.png","image_alt":"Blog placeholder","termslug":"technology-innovation","button":{"asstes_cta_links":[{"text":"Read more","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/naas-must-include-extensive-wids-wips","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read more","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/naas-must-include-extensive-wids-wips","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":3073,"date":"Mar 14, 2023","author_name":"Shiv Mehra","p_termname":"Technology & Innovation","title":"NaaS Network Visibility Troubleshoots Customer Issue in <1-min","body_without_editor":"To give visibility to Nile\u2019s SLAs, infrastructure, devices and applications, we designed the Nile Customer Portal. Our goal was to provide administrators insight into where issues lie within the datapath of users\/devices to applications.","post_url":"https:\/\/nilesecure.com\/nile-insights\/naas-network-visibility-troubleshoots-customer-issue-in-1-min","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-4.png","image_alt":"Blog placeholder","termslug":"technology-innovation","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/naas-network-visibility-troubleshoots-customer-issue-in-1-min","file":false,"target":true,"video":""}]},"target":"_blank","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/naas-network-visibility-troubleshoots-customer-issue-in-1-min","link_style":"link-external-pink","this_category_slug":"nile-access-service"},{"id":2944,"date":"Feb 14, 2023","author_name":"Calvin Nguyen","p_termname":"Points of View","title":"What does building a cabinet have in common with deploying current NaaS offerings?","body_without_editor":"What does building a cabinet have in common with deploying current enterprise networks and current NaaS offerings?","post_url":"https:\/\/nilesecure.com\/nile-insights\/what-does-building-a-cabinet-have-in-common-with-deploying-current-naas-offerings","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-1.png","image_alt":"Blog placeholder","termslug":"points-of-view","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/what-does-building-a-cabinet-have-in-common-with-deploying-current-naas-offerings","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/what-does-building-a-cabinet-have-in-common-with-deploying-current-naas-offerings","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":2943,"date":"Jan 24, 2023","author_name":"Prem Andrzejek","p_termname":"Points of View","title":"The One Way Nile\u2019s NaaS is Analogous to ChatGPT","body_without_editor":"The ChatGPT experience reminded me of the Nile service in as much as it saves time.","post_url":"https:\/\/nilesecure.com\/nile-insights\/the-one-way-niles-naas-is-analogous-to-chatgpt","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-1.png","image_alt":"Blog placeholder","termslug":"points-of-view","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/the-one-way-niles-naas-is-analogous-to-chatgpt","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/the-one-way-niles-naas-is-analogous-to-chatgpt","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":2931,"date":"Jan 18, 2023","author_name":"Shiv Mehra","p_termname":"Technology & Innovation","title":"Automating Network Operations to Eliminate Network Complexity","body_without_editor":"The network is complex and operating it can be a huge burden even for seasoned IT professionals. To compensate, IT teams adopt different automation tools and\/or features.","post_url":"https:\/\/nilesecure.com\/nile-insights\/automating-network-operations-to-eliminate-network-complexity","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-4.png","image_alt":"Blog placeholder","termslug":"technology-innovation","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/automating-network-operations-to-eliminate-network-complexity","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/automating-network-operations-to-eliminate-network-complexity","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":2930,"date":"Dec 28, 2022","author_name":"Sangita Patel","p_termname":"Announcements","title":"Nile recognized for NaaS in 2022 Gartner\u00ae Magic Quadrant\u2122 for Enterprise Wired and Wireless LAN Infrastructure","body_without_editor":"Nile recognized for NaaS in 2022 Gartner\u00ae Magic Quadrant\u2122 for Enterprise Wired and Wireless LAN Infrastructure","post_url":"https:\/\/nilesecure.com\/nile-insights\/nile-recognized-for-naas-in-2022-gartner-magic-quadrant-for-enterprise-wired-and-wireless-lan-infrastructure","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-3.png","image_alt":"Blog placeholder","termslug":"announcements","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/nile-recognized-for-naas-in-2022-gartner-magic-quadrant-for-enterprise-wired-and-wireless-lan-infrastructure","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/nile-recognized-for-naas-in-2022-gartner-magic-quadrant-for-enterprise-wired-and-wireless-lan-infrastructure","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":2924,"date":"Nov 21, 2022","author_name":"Neil Clover","p_termname":"Points of View","title":"What do Dairy Farms and Networks Have In Common?","body_without_editor":"Neil Clover, CTO at SDI shares his views on Nile\u2019s journey to simplify enterprise networks. Neil makes a delightful correlation between dairy farming and legacy network architectures, inspired by Thoreau\u2019s Walden.","post_url":"https:\/\/nilesecure.com\/nile-insights\/what-do-dairy-farms-and-networks-have-in-common","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-1.png","image_alt":"Blog placeholder","termslug":"points-of-view","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/what-do-dairy-farms-and-networks-have-in-common","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/what-do-dairy-farms-and-networks-have-in-common","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":2904,"date":"Nov 9, 2022","author_name":"Krishna Athur","p_termname":"Announcements","title":"Nile Successfully Achieves SOC 2 Compliance","body_without_editor":"Protecting privacy and security is foundational for today\u2019s organizations. At Nile, safeguarding customer data and securing operational practices is a foundational tenet.","post_url":"https:\/\/nilesecure.com\/nile-insights\/nile-successfully-achieves-soc-2-compliance","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-3.png","image_alt":"Blog placeholder","termslug":"announcements","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/nile-successfully-achieves-soc-2-compliance","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/nile-successfully-achieves-soc-2-compliance","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":2818,"date":"Oct 5, 2022","author_name":"Sumant Mandal","p_termname":"Points of View","title":"Investment Thesis: Why March Capital Went All in on Nile","body_without_editor":"Rarely are we presented with a simple idea big enough to truly disrupt. Read how Nile redefines enterprise networking technology.","post_url":"https:\/\/nilesecure.com\/nile-insights\/investment-thesis-why-march-capital-went-all-in-on-nile","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-1.png","image_alt":"Blog placeholder","termslug":"points-of-view","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/investment-thesis-why-march-capital-went-all-in-on-nile","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/investment-thesis-why-march-capital-went-all-in-on-nile","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":2800,"date":"Oct 3, 2022","author_name":"Austin Hawthorne","p_termname":"Technology & Innovation","title":"Introducing the Network Built for Security","body_without_editor":"Network security consists of network and security teams adopting Zero Trust to combat ransomware and other threats to the network.","post_url":"https:\/\/nilesecure.com\/nile-insights\/introducing-the-network-built-for-security","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-4.png","image_alt":"Blog placeholder","termslug":"technology-innovation","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/introducing-the-network-built-for-security","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/introducing-the-network-built-for-security","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":2810,"date":"Sep 21, 2022","author_name":"Sangita Patel","p_termname":"Technology & Innovation","title":"The Elusive Network-as-a-Service Becomes Reality","body_without_editor":"Nile transforms the enterprise campus network with secure, always-on connectivity \u2014 it\u2019s the myth of NaaS, finally realized.","post_url":"https:\/\/nilesecure.com\/nile-insights\/the-elusive-network-as-a-service-becomes-reality","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-4.png","image_alt":"Blog placeholder","termslug":"technology-innovation","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/the-elusive-network-as-a-service-becomes-reality","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/the-elusive-network-as-a-service-becomes-reality","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":2792,"date":"Sep 20, 2022","author_name":"Louis Serlenga","p_termname":"Technology & Innovation","title":"(Finally) Upleveling Networking Experiences with NaaS","body_without_editor":"Introducing enterprise NaaS delivered completely in a singular pay-per user model.","post_url":"https:\/\/nilesecure.com\/nile-insights\/finally-upleveling-networking-experiences-with-naas","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-4.png","image_alt":"Blog placeholder","termslug":"technology-innovation","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/finally-upleveling-networking-experiences-with-naas","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/finally-upleveling-networking-experiences-with-naas","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":2785,"date":"Sep 19, 2022","author_name":"Zane Buckley","p_termname":"Technology & Innovation","title":"The Herculean Task of Containing Complexity","body_without_editor":"Only 25% of features shipped by traditional network vendors are used. Nile delivers only what is needed for secure connectivity.","post_url":"https:\/\/nilesecure.com\/nile-insights\/the-herculean-task-of-containing-complexity","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-4.png","image_alt":"Blog placeholder","termslug":"technology-innovation","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/the-herculean-task-of-containing-complexity","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/the-herculean-task-of-containing-complexity","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":2777,"date":"Sep 14, 2022","author_name":"Suresh Katukam","p_termname":"Points of View","title":"Time for Disruption: Networking as We Know It Is Dead","body_without_editor":"Why are decades of networking complexity bogging organizations down? We are ready for change, are you?","post_url":"https:\/\/nilesecure.com\/nile-insights\/time-for-disruption-networking-as-we-know-it-is-dead","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-1.png","image_alt":"Blog placeholder","termslug":"points-of-view","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/time-for-disruption-networking-as-we-know-it-is-dead","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/time-for-disruption-networking-as-we-know-it-is-dead","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":2772,"date":"Sep 14, 2022","author_name":"Pankaj Patel","p_termname":"Technology & Innovation","title":"Keeping it Simple \u2013 Reliable & Secure Network Connectivity","body_without_editor":"Nile CEO, Pankaj Patel expounds upon developing the next generation of enterprise networking.","post_url":"https:\/\/nilesecure.com\/nile-insights\/keeping-it-simple-reliable-secure-network-connectivity","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-4.png","image_alt":"Blog placeholder","termslug":"technology-innovation","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/keeping-it-simple-reliable-secure-network-connectivity","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/keeping-it-simple-reliable-secure-network-connectivity","link_style":"link-pink","this_category_slug":"nile-access-service"},{"id":2766,"date":"Sep 14, 2022","author_name":"John Chambers","p_termname":"Points of View","title":"My Lightbulb Moment \u2013 Why I\u2019m Excited to Disrupt Networking","body_without_editor":"John Chambers explains his \u201clightbulb\u201d moment behind Nile and why he\u2019s excited to bring Nile to the market.","post_url":"https:\/\/nilesecure.com\/nile-insights\/my-lightbulb-moment-why-im-excited-to-disrupt-networking","img":"\/wp-content\/themes\/nile\/dist\/images\/placeholder\/image-1.png","image_alt":"Blog placeholder","termslug":"points-of-view","button":{"asstes_cta_links":[{"text":"Read More","type":"internal","url":"","internal":"https:\/\/nilesecure.com\/nile-insights\/my-lightbulb-moment-why-im-excited-to-disrupt-networking","file":false,"target":false,"video":""}]},"target":"_self","link_text":"Read More","landing_redirection":"https:\/\/nilesecure.com\/nile-insights\/my-lightbulb-moment-why-im-excited-to-disrupt-networking","link_style":"link-pink","this_category_slug":"nile-access-service"}]
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.
The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.