SMB Protocol Explained


by David Zomaya

Server Message Block (SMB) is one of the most popular file server protocols today. When implemented properly, SMB enables secure, efficient, and scalable network resource and file sharing. A common challenge facing many organizations is finding SMB software that meets licensing, performance, portability, and security requirements without becoming too complex to manage. Here, we’ll take a look at the SMB protocol and popular software options for implementing it both on corporate networks and in commercial products.


by Christopher R. Hertel

The story behind jCIFS


by Tal Wideman

Visuality NQ Meets RPC Security Feature Update of Microsoft for Secure Netlogon Channels and RPC Calls


 YNQ™ Adds Server/Client SMBv3 Capabilities To Linux OS


by Tal Wideman

The Recently Revealed SMBv3 Vulnerability: Facts and highlights


YNQ™ Adds Server/Client SMBv3 Capabilities To WinCE


by Tal Widerman

SMB 3: What is SMB? SMB, or Server Message Block, is one of the pillars of mass data transfers across networks. In the age of data centers and virtualized servers, this is the protocol that is doing the hard lifting, by moving, copying and modifying terabytes of user data, and keeping it secure and encrypted from hackers and ransom attacks. The protocol itself has undergone a rapid evolution from its early days, and the latest Microsoft SMB 3.1.1 version is aimed at speed, flexibility and extreme security. For virtualized data centers, the SMBv3.x family of dialects is the de-facto standard for high performance, offering a rich set of functions that weren’t available earlier.  


by Tal Widerman

What made WannaCry such big news is not the financial impact but the fact that it locked up a hospital to the point where operations were delayed and lives were in jeopardy.


by Mark Rabinovich

In my younger days, cameras were cameras – not digital devices. In those days, connectivity meant keeping exposed films out of light, avoiding X-rays of airport scanners, and choosing the best film development kiosk. And all this did not require any digital intelligence, but rather human intelligence. Older folks can even recall choosing the right exposure, playing around with aperture and other, what some now consider cumbersome, duties for a non-professional guy.


by Tal Widerman

The firewalls of routers we work behind and consider secure may not really be so. The makers of network hardware are moving too slow to catch up with new hacking exploits, and so the markets are still selling routers that haven’t been upgraded. The situation presents great dangers to users, and this has been confirmed by research findings from the security giant, Akamai.


Networking In The Middle East

Networking In The Middle East Tal Widerman How Visuality Systems overcame technical difficulties with the aim of developing proprietary CIFS/SMB solutions while helping bridge a geo-political

Read More »


Please fill in your contact information and the product you would like to evaluate, and a Visuality representative will contact you shortly.

    Evaluate NQ Products

    This website uses cookies. By continuing to browse the site, you are agreeing to our use of cookies. see our privacy policy here