Blog
Network Insight.
- Premium Consultancy, Ebooks, Videos and Elearning
Network Connectivity
Network Connectivity To understand network connectivity, we will break networking down into layers. Then we can fit the different networking and security components that make up a network into each layer. This is the starting point for understanding how networks work and carrying out the advanced stages of …
Cisco Firewall with Cisco IPS
Cisco Firewall with Cisco IPS We are constantly under pressure to ensure mission-critical systems are thoroughly safe from bad actors that will try to penetrate your network and attack critical services with a range of attack vectors. So we need to create a reliable way to detect and …
Data Center Security
Data Center Security Data center security is always a significant concern in data center networks. ACI security addresses security concerns with several application-centric infrastructure security options. You may have heard of the allowlist policy model. This is the ACI security starting point, meaning only something can communicate if …
Identity Security
Identity Security Identity security has pushed authentication to a new, more secure landscape, reacting to improved technologies and sophisticated attacks. The need for more accessible and secure authentication has led to the wide adoption of zero trust identity management zero trust authentication technologies like risk-based authentication (RBA), fast identity online (FIDO2), …
Cisco Secure Firewall with SASE Cloud
Cisco Secure Firewall with SASE Cloud In the past, network security was typically delivered from the network using the Firewall. However, these times network security extends well beyond just firewalling. We now have different points in the infrastructure that we can use to expand our security posture while …
SASE Model | Zero Trust Identity
SASE Model | Zero Trust Identity Once you have a SASE solution, you need to evolve it. The SASE model is unlike installing a firewall and configuring policies; you can add and enhance your SASE technology in many ways to increase your security posture. So with Umbrella SASE, …
SASE Visibility with Cisco ThousandEyes
SASE Visibility with Cisco ThousandEyes The following post discusses SASE visibility for the Cisco SASE solution, known as Cisco Umbrella SASE with Cisco ThousandEyes. Combining Cisco ThousandEyes with your SASE VPN gives you end-to-end visibility into the SASE security stacks and all network paths, including any nodes. All …
SD WAN Security
SD WAN Security This post will address Cisco SD WAN security for the control plane elements, data plane forwarding, and the integrated SD-WAN security features that can be used for Direct Internet Access (DIA). Just to let you know, SD-WAN can be combined with Cisco Umbrella via a …
SD-WAN SASE
SD-WAN SASE Although more and more enterprises are moving workloads and applications to the cloud, we also need to consider the secure and fast connection to the Internet with minimal latency and packet loss to affect application performance. The following post discusses SD-WAN SASE and how to start your security SASE journey. …
SASE | SASE Solution
SASE | SASE Solution In this post, we will decompose the Zero Trust SASE, considering the SASE fabric and what a SASE solution entails. The SASE security consists of global PoPs. With network and security functions built into each PoP, they are operated with a single management plane. …
Security Automation
Security Automation If you are only using scripting in the security automation world, it will only get you so far. Eventually, you will need a fully integrated platform with your security and network infrastructure. For secure automation, there are different types of platforms you can use. This post …
Splunk Security
Splunk Security The product set offering Splunk Security has several well-integrated products, such as Splunk Enterprise Security, also known as Splunk ES, which is the Splunk SIEM, Splunk SOAR, and User Behavior Analytics (UBA), to a variety of Observability tools at your disposal. In addition, SOAR Splunk brings …