Blog
Network Insight.

Security Automation

    Security Automation If you are only using scripting in the security automation world, it will only get you so far. Eventually, you will need a fully integrated platform with your security and network infrastructure. For secure automation, there are different types of platforms you can use. This post …

Splunk Security

Splunk Security

    Splunk Security  The product set offering Splunk Security has several well-integrated products, such as Splunk Enterprise Security, also known as Splunk ES, which is the Splunk SIEM, Splunk SOAR, and User Behavior Analytics (UBA), to a variety of Observability tools at your disposal. In addition, SOAR Splunk brings …

Cisco Umbrella CASB

    Cisco Umbrella CASB We must opt for a platform approach to visibility and control. More specifically, a platform that works in a 3rd party environment. So for cloud security, this is where secure access service edge (SASE) can assist. In particular, the Cisco version is SASE, known as …

DNS Security

DNS Security Solutions

    DNS Security Solutions This post will outline the domain name system: the DNS structure, the vulnerabilities and abuses of DNS security designs, and guidance on implementing DNS protection with examples of DNS security solutions with DNS security Cisco such as Cisco Umbrella DNS. Like many Internet protocols, the …

Ansible Tower

    Ansible Tower To operationalize your environment and drive automation to production, you need to have everything centrally managed and better role-based access. So you understand who is automating and what they are doing, along with a good audit trail. This is where Red Hat Ansible and Ansible Tower …

Network visibility

Network Visibility

    Network Visibility The traditional network visibility tools give you the foundational data to see what’s going on in your network. Network visibility solutions are not new, and the network visibility tools such as NetFlow and IPFIX have been around for a while. However, they give you an incomplete …

wan monitoring

WAN Monitoring

    WAN Monitoring By examining performance parameters, SD-WAN can classify, select, and switch traffic paths across your WAN. Now we have reactive rerouting and load balancing that will help improve network availability and performance. But to gain the benefits, one needs to consider operationalizing SD WAN visibility and whether …

Implementing Network Security

    Implementing Network Security Having the appropriate network visibility is key to understanding network performance and implementing network security components. Now, much of the technology used in the network performance world, such as Netflow, is very much security-focused. There is a challenging landscape, we have workloads moving to the …

network security components

Network Security Components

    Network Security Components To design and implement a network security architecture is a composite of different technologies working at different layers in your infrastructure spanning on-premises and in the cloud. So we can have different point systems operating at each layer or look for an approach where each …

data center design

Open Networking

          Open Networking To undertake an effective SDN data center transformation strategy, we need to accept that demands on data center networks come from internal end-users, external customers, and considerable changes in the application architecture. All of which put pressure on traditional data center architecture. Dealing …

micro segmentation technology

Zero Trust Security Strategy

    Zero Trust Security Strategy Today’s networks are complex beasts, and considering yourself a fully zero trust network design is a long journey. It means different things to different people. Networks these days are heterogeneous, hybrid, and dynamic. Over time, technologies have been adopted, from punch card coding to …

Cisco ACI

ACI Cisco

          ACI Cisco The legacy data center topologies have a static infrastructure that specifies the constructs to form the logical topology. On the individual devices, we have to configure the VLAN, Layer 2/Layer 3 interfaces, and the protocols we need. Also, the process we used to …