Blog
Network Insight.

DMVPN

DMVPN Cisco DMVPN is based on a virtual private network (VPN), which provides private connectivity over a public network like the Internet. Furthermore, the DMVPN network takes this concept of VPN further by allowing multiple VPNs to be deployed over a shared infrastructure in a manageable and scalable way. This shared …

Computer Networking

    Creating a computer network requires a lot of preparation and knowledge of the right components used. One of the first steps in computer networking is identifying what components to use and where to place them. This includes selecting the proper hardware, such as the Layer 3 routers, Layer …

In the following ebook, we will address the key points: Challenging Landscape The rise of SASE based on new requirements SASE definition Core SASE capabilities Final recommendations     For pre-information, you may find the following links useful: SD WAN SASE Zero Trust SASE SASE Model SASE Solution Cisco Secure …

Cisco CloudLock

    Cisco CloudLock Cloud computing is becoming more popular due to its cost-savings, scalability, and accessibility. However, there is a drawback when it comes to security posture. Firstly, you no longer have as much visibility or control as you used to with on-premise application access. Cloud providers assume more …

Network Connectivity

    Network Connectivity To understand network connectivity, we will break networking down into layers. Then we can fit the different networking and security components that make up a network into each layer. This is the starting point for understanding how networks work and carrying out the advanced stages of …

    Cisco Firewall with Cisco IPS We are constantly under pressure to ensure mission-critical systems are thoroughly safe from bad actors that will try to penetrate your network and attack critical services with a range of attack vectors. So we need to create a reliable way to detect and …

Data Center Security

    ACI Security: L4-L7 Services Data center security is always a significant concern in data center networks. The following post will address data center security considerations with Cisco ACI, including context on the ACI service graph, ACI L4-L7 services, and ACI segments‘ use. The ACI service graph is how Layer …

Identity Security

    Identity Security Identity security has pushed authentication to a new, more secure landscape, reacting to improved technologies and sophisticated attacks. The need for more accessible and secure authentication has led to the wide adoption of zero trust identity management zero trust authentication technologies like risk-based authentication (RBA), fast identity online (FIDO2), …

    Cisco Secure Firewall with SASE Cloud Cisco SASE (Secure Access Service Edge) is an integrated platform that provides secure access to applications, data, and users while supporting cloud-native architectures. It is a cloud-native platform built on a microservices architecture and designed to enable secure access for mobile, distributed, …

    SASE Model | Zero Trust Identity Once you have a SASE solution, you need to evolve it. The SASE model is unlike installing a firewall and configuring policies; you can add and enhance your SASE technology in many ways to increase your security posture. So with Umbrella SASE, …

    SASE Visibility with Cisco ThousandEyes The following post discusses SASE visibility for the Cisco SASE solution, known as Cisco Umbrella SASE with Cisco ThousandEyes. Combining Cisco ThousandEyes with your SASE VPN gives you end-to-end visibility into the SASE security stacks and all network paths, including any nodes. All …

SD WAN Security

    SD WAN Security   SD WAN security allows end users to connect directly to cloud applications and resources without backhauling through a remote data center or hub. This allows organizations to offload guest traffic to the Internet directly instead of using up WAN and data center resources. The …