Blog
Network Insight.

Network Connectivity

    Network Connectivity To understand network connectivity, we will break networking down into layers. Then we can fit the different networking and security components that make up a network into each layer. This is the starting point for understanding how networks work and carrying out the advanced stages of …

Cisco Snort

    Cisco Firewall with Cisco IPS We are constantly under pressure to ensure mission-critical systems are thoroughly safe from bad actors that will try to penetrate your network and attack critical services with a range of attack vectors. So we need to create a reliable way to detect and …

Data Center Security

    Data Center Security Data center security is always a significant concern in data center networks. ACI security addresses security concerns with several application-centric infrastructure security options. You may have heard of the allowlist policy model. This is the ACI security starting point, meaning only something can communicate if …

identity security

Identity Security

    Identity Security Identity security has pushed authentication to a new, more secure landscape, reacting to improved technologies and sophisticated attacks. The need for more accessible and secure authentication has led to the wide adoption of zero trust identity management zero trust authentication technologies like risk-based authentication (RBA), fast identity online (FIDO2), …

data center firewall

    Cisco Secure Firewall with SASE Cloud In the past, network security was typically delivered from the network using the Firewall. However, these times network security extends well beyond just firewalling. We now have different points in the infrastructure that we can use to expand our security posture while …

SASE Model

    SASE Model | Zero Trust Identity Once you have a SASE solution, you need to evolve it. The SASE model is unlike installing a firewall and configuring policies; you can add and enhance your SASE technology in many ways to increase your security posture. So with Umbrella SASE, …

    SASE Visibility with Cisco ThousandEyes The following post discusses SASE visibility for the Cisco SASE solution, known as Cisco Umbrella SASE with Cisco ThousandEyes. Combining Cisco ThousandEyes with your SASE VPN gives you end-to-end visibility into the SASE security stacks and all network paths, including any nodes. All …

WAN Security

SD WAN Security

    SD WAN Security This post will address Cisco SD WAN security for the control plane elements, data plane forwarding, and the integrated SD-WAN security features that can be used for Direct Internet Access (DIA). Just to let you know, SD-WAN can be combined with Cisco Umbrella via a …

Cisco Umbrella

SD-WAN SASE

    SD-WAN SASE Although more and more enterprises are moving workloads and applications to the cloud, we also need to consider the secure and fast connection to the Internet with minimal latency and packet loss to affect application performance. The following post discusses SD-WAN SASE and how to start your security SASE journey. …

SASE Cisco

SASE | SASE Solution

    SASE | SASE Solution In this post, we will decompose the Zero Trust SASE, considering the SASE fabric and what a SASE solution entails. The SASE security consists of global PoPs. With network and security functions built into each PoP, they are operated with a single management plane. …

Security Automation

    Security Automation If you are only using scripting in the security automation world, it will only get you so far. Eventually, you will need a fully integrated platform with your security and network infrastructure. For secure automation, there are different types of platforms you can use. This post …

Splunk Security

Splunk Security

    Splunk Security  The product set offering Splunk Security has several well-integrated products, such as Splunk Enterprise Security, also known as Splunk ES, which is the Splunk SIEM, Splunk SOAR, and User Behavior Analytics (UBA), to a variety of Observability tools at your disposal. In addition, SOAR Splunk brings …