Blog
Network Insight.
- Premium Consultancy, Ebooks, Videos and Elearning
DMVPN
DMVPN Cisco DMVPN is based on a virtual private network (VPN), which provides private connectivity over a public network like the Internet. Furthermore, the DMVPN network takes this concept of VPN further by allowing multiple VPNs to be deployed over a shared infrastructure in a manageable and scalable way. This shared …
Computer Networking
Creating a computer network requires a lot of preparation and knowledge of the right components used. One of the first steps in computer networking is identifying what components to use and where to place them. This includes selecting the proper hardware, such as the Layer 3 routers, Layer …
eBOOK – SASE Capabilities
In the following ebook, we will address the key points: Challenging Landscape The rise of SASE based on new requirements SASE definition Core SASE capabilities Final recommendations For pre-information, you may find the following links useful: SD WAN SASE Zero Trust SASE SASE Model SASE Solution Cisco Secure …
Cisco CloudLock
Cisco CloudLock Cloud computing is becoming more popular due to its cost-savings, scalability, and accessibility. However, there is a drawback when it comes to security posture. Firstly, you no longer have as much visibility or control as you used to with on-premise application access. Cloud providers assume more …
Network Connectivity
Network Connectivity To understand network connectivity, we will break networking down into layers. Then we can fit the different networking and security components that make up a network into each layer. This is the starting point for understanding how networks work and carrying out the advanced stages of …
Cisco Firewall with Cisco IPS
Cisco Firewall with Cisco IPS We are constantly under pressure to ensure mission-critical systems are thoroughly safe from bad actors that will try to penetrate your network and attack critical services with a range of attack vectors. So we need to create a reliable way to detect and …
Data Center Security
ACI Security: L4-L7 Services Data center security is always a significant concern in data center networks. The following post will address data center security considerations with Cisco ACI, including context on the ACI service graph, ACI L4-L7 services, and ACI segments‘ use. The ACI service graph is how Layer …
Identity Security
Identity Security Identity security has pushed authentication to a new, more secure landscape, reacting to improved technologies and sophisticated attacks. The need for more accessible and secure authentication has led to the wide adoption of zero trust identity management zero trust authentication technologies like risk-based authentication (RBA), fast identity online (FIDO2), …
Cisco Secure Firewall with SASE Cloud
Cisco Secure Firewall with SASE Cloud Cisco SASE (Secure Access Service Edge) is an integrated platform that provides secure access to applications, data, and users while supporting cloud-native architectures. It is a cloud-native platform built on a microservices architecture and designed to enable secure access for mobile, distributed, …
SASE Model | Zero Trust Identity
SASE Model | Zero Trust Identity Once you have a SASE solution, you need to evolve it. The SASE model is unlike installing a firewall and configuring policies; you can add and enhance your SASE technology in many ways to increase your security posture. So with Umbrella SASE, …
SASE Visibility with Cisco ThousandEyes
SASE Visibility with Cisco ThousandEyes The following post discusses SASE visibility for the Cisco SASE solution, known as Cisco Umbrella SASE with Cisco ThousandEyes. Combining Cisco ThousandEyes with your SASE VPN gives you end-to-end visibility into the SASE security stacks and all network paths, including any nodes. All …
SD WAN Security
SD WAN Security SD WAN security allows end users to connect directly to cloud applications and resources without backhauling through a remote data center or hub. This allows organizations to offload guest traffic to the Internet directly instead of using up WAN and data center resources. The …