Blog
Network Insight.

Cisco Secure Workload

Cisco Umbrella CASB

          Cisco Umbrella CASB We must opt for a platform approach to visibility and control. More specifically, a platform that works in a 3rd party environment. So for cloud security, this is where secure access service edge (SASE) can assist. In particular, the Cisco version is …

DNS Security

DNS Security Solutions

    DNS Security Solutions This post will outline the domain name system: the DNS structure, the vulnerabilities and abuses of DNS security designs, and guidance on implementing DNS protection with examples of DNS security solutions with Cisco, like Cisco Umbrella DNS. Unfortunately, like many Internet protocols, the DNS system …

Ansible Tower

    Ansible Tower To operationalize your environment and drive automation to production, you need to have everything centrally managed and better role-based access. So you understand who is automating and what they are doing, along with a good audit trail. This is where Red Hat Ansible and Ansible Tower …

Network visibility

Network Visibility

    Network Visibility The traditional network visibility tools give you the foundational data to see what’s going on in your network. Network visibility solutions are familiar, and the network visibility tools such as NetFlow and IPFIX have been around for a while. However, they give you an incomplete part …

wan monitoring

WAN Monitoring

    WAN Monitoring By examining performance parameters, SD-WAN can classify, select, and switch traffic paths across your WAN. Now we have reactive rerouting and load balancing that will help improve network availability and performance. But to gain the benefits, one needs to consider operationalizing SD WAN visibility and whether …

Implementing Network Security

    Implementing Network Security Appropriate network visibility is critical to understanding network performance and implementing network security components. Much of the technology used in the network performance, such as Netflow, is very much security-focused. There is a challenging landscape; workloads move to the cloud without monitoring or any security …

network security components

Network Security Components

    Network Security Components Design and implement a network security architecture is a composite of different technologies working at different network security layers in your infrastructure, spanning on-premises and in the cloud. So we can have different point systems operating at the network security layers or look for an …

data center design

Open Networking

          Open Networking To undertake an effective SDN data center transformation strategy, we must accept that demands on data center networks come from internal end-users, external customers, and considerable changes in the application architecture. All of which put pressure on traditional data center architecture. Dealing effectively …

micro segmentation technology

Zero Trust Security Strategy

    Zero Trust Security Strategy Today’s networks are complex beasts, and considering yourself an entirely zero trust network design is a long journey. It means different things to different people. Networks these days are heterogeneous, hybrid, and dynamic. Over time, technologies have been adopted, from punch card coding to …

Cisco ACI

ACI Cisco

          ACI Cisco The legacy data center topologies have a static infrastructure that specifies the constructs to form the logical topology. We have to configure the VLAN, Layer 2/Layer 3 interfaces, and the protocols we need on the individual devices. Also, the process we used to …

Reverse Route Injection

Zero Trust SASE

    Zero Trust SASE Today’s digital transformation and strategy initiatives require speed and agility in I.T. However, there is a lag, and that lag is with security. Security can either hold them back or not align with the fluidity needed for agility. As a result, we have decreased an …

microservices development

Microservices Observability

    Microservices Observability The following post discusses critical areas for microservices monitoring. Monitoring microservices can be done with a new practice called Observability. Teams increasingly adopt new technologies as companies transform and modernize applications to leverage container- and microservices development. IT infrastructure monitoring has always been complex but is …