Blog
Network Insight.

Stateless Network Functions

Stateless Network Functions In the ever-evolving world of networking, the concept of stateless network functions has emerged as a game-changer. This revolutionary approach to network architecture is transforming the way we design, deploy, and manage networks. In this blog post, we will delve into the intricacies of stateless network functions …

What is Remote Browser Isolation In today’s digital landscape, remote browser isolation has emerged as a powerful solution for enhancing cybersecurity and protecting sensitive data. This innovative technology isolates web browsing activities from the local device, creating a secure environment that shields users from potential threats. In this blog post, …

CASB Tools

CASB Tools In today’s digital landscape, cloud-based technologies have become essential for organizations of all sizes. However, with the convenience and flexibility of the cloud comes the need for robust security measures. Cloud Access Security Broker (CASB) tools have emerged as a vital solution for safeguarding sensitive data and ensuring …

Blockchain-Based Applications

Block-Based Applications Blockchain technology has rapidly gained attention and recognition across various industries. In this blog post, we will delve into the world of blockchain-based applications, exploring their potential, benefits, and impact on different sectors. Blockchain technology is the underlying foundation of blockchain-based applications. It is a decentralized and transparent …

Brownfield Network Automation

Brownfield Network Automation In today’s rapidly advancing technological landscape, the efficient management and automation of networks has become crucial for businesses to thrive. While greenfield networks are often designed with automation in mind, brownfield networks present a unique set of challenges. In this blog post, we will explore the world …

Zero Trust Networking

Zero Trust Networking In today’s increasingly digital world, where cyber threats are becoming more sophisticated, traditional security measures are no longer enough to protect sensitive data and networks. This has led to the rise of a revolutionary approach known as zero trust networking. In this blog post, we will explore …

Zero Trust Network ZTN

Zero Trust Network ZTN In today’s rapidly evolving digital landscape, ensuring the security and integrity of sensitive data has become more crucial than ever. Traditional security approaches are no longer sufficient to protect against sophisticated cyber threats. This is where the concept of Zero Trust Network (ZTN) comes into play. …

Cloud Native Meaning

Cloud-native meaning In today’s technology-driven world, the term “cloud native” has gained significant attention. It is often used in discussions surrounding modern software development, deployment, and scalability. But what exactly does it mean to be cloud native? In this blog post, we will unravel the true meaning behind this concept …

Hello, I have created a Network World column and will be releasing a few blogs per month. Kindly visit the following link to view my full profile and recent blogs – Matt Conran Network World. The list of individual blogs can be found here: Data Center – > SDN and agility …

Hello, I have created an “Enterprise Networking Tech Brief” Series. Kindly click on the link to view the video. I’m trying out a few videos styles. Enterprise Networking A –  LISP Components & DEMO – > https://youtu.be/PBYvIhxwrSc Enterprise Networking B – SD-Access & Intent-based networking – > https://youtu.be/WKoGSBw5_tc ” In campus networking, there are a …

Hello, I have created a “Cloud Computing Tech Brief” Series. Below, we have videos that can assist you in the learning process of cloud computing. Kindly click on the link to view the video. I’m trying out a few video styles. Cloud Computing A – Cloud – Introducing Immutable Server …

UNIKEN – Connecting Safe

Hello, I recently completed a 3 part package for Uniken. Part 1 can be found here – Matt Conran & Uniken. Stayed tuned for Part 2 and Part 3!