Home Susnigdha Tripathy Bio
Image of Susnigdha Tripathy
Susnigdha Tripathy

Susnigdha Tripathy is a full-time writer and editor based in Singapore, and a regular contributor to Enterprise Networking Planet. She has over 10 years of experience writing, editing, and delivering exceptional content for a variety of international technology brands such as Virtasant, a cloud technology company, and Krista Software, a provider of intelligent automation solutions. She has also appeared in ServerWatch and other industry publications.1

What Is a Router in Networking? Core Function Explained
Almost every network has a router, but do you know how they work? Discover everything you need to know to ensure you overcome issues with your...
Secure Shell (SSH) Protocol: Encryption Over Insecure Networks
Secure Shell (SSH) allows you to establish a connection from one computer to another over insecure networks. Here’s how SSH works, and how it compares to other...
LAN vs. WAN: How These Network Types Are Different
Local area networks (LAN) and wide area networks (WAN) are both useful, but for very different purposes. Discover which suits your organization’s specific needs...
What Is Ethical Hacking in Cybersecurity? Ultimate Guide
Uncover the world of ethical hacking. Learn what ethical hacking is, its benefits, and its role in fortifying the cybersecurity of...
What Is Endpoint Detection and Response (EDR) Software?
Endpoint detection and response (EDR) software protects your network at the most vulnerable points of entry. Here’s how it works, and why your business needs...
What Is Network Monitoring? Definition, Benefits, and Types
Understand the power of network monitoring in optimizing performance, detecting threats, and preventing downtime. Learn how to safeguard your network...
What Is Firewall as a Service? Cloud-Based Firewalls Explained
Firewall as a Service (FWaaS) has revolutionized network security in the age of hybrid work. Explore features, benefits, drawbacks, and use cases in this comprehensive...
What Is Spam? Tips for Fighting Spam Calls and Emails
Learn how to recognize spam, avoid clicking on suspicious links, and protect your computer from malicious emails with this...
What Is Network Hacking? How to Avoid Being Hacked
Discover what network hacking is and the different types of hacking, as well as how to protect yourself and your systems from malicious...
What Is a Sovereign Cloud? Meaning, Purpose & User Tips
Sovereign clouds help government agencies and highly regulated industries protect their data from competing entities. Here’s how they work, who needs them, and how to get...