Blog
Network Insight.
- Premium Consultancy, Ebooks, Videos and Elearning
Cisco Umbrella CASB
Cisco Umbrella CASB We must opt for a platform approach to visibility and control. More specifically, a platform that works in a 3rd party environment. So for cloud security, this is where secure access service edge (SASE) can assist. In particular, the Cisco version is …
DNS Security Solutions
DNS Security Solutions This post will outline the domain name system: the DNS structure, the vulnerabilities and abuses of DNS security designs, and guidance on implementing DNS protection with examples of DNS security solutions with Cisco, like Cisco Umbrella DNS. Unfortunately, like many Internet protocols, the DNS system …
Ansible Tower
Ansible Tower To operationalize your environment and drive automation to production, you need to have everything centrally managed and better role-based access. So you understand who is automating and what they are doing, along with a good audit trail. This is where Red Hat Ansible and Ansible Tower …
Network Visibility
Network Visibility The traditional network visibility tools give you the foundational data to see what’s going on in your network. Network visibility solutions are familiar, and the network visibility tools such as NetFlow and IPFIX have been around for a while. However, they give you an incomplete part …
WAN Monitoring
WAN Monitoring By examining performance parameters, SD-WAN can classify, select, and switch traffic paths across your WAN. Now we have reactive rerouting and load balancing that will help improve network availability and performance. But to gain the benefits, one needs to consider operationalizing SD WAN visibility and whether …
Implementing Network Security
Implementing Network Security Appropriate network visibility is critical to understanding network performance and implementing network security components. Much of the technology used in the network performance, such as Netflow, is very much security-focused. There is a challenging landscape; workloads move to the cloud without monitoring or any security …
Network Security Components
Network Security Components Design and implement a network security architecture is a composite of different technologies working at different network security layers in your infrastructure, spanning on-premises and in the cloud. So we can have different point systems operating at the network security layers or look for an …
Open Networking
Open Networking To undertake an effective SDN data center transformation strategy, we must accept that demands on data center networks come from internal end-users, external customers, and considerable changes in the application architecture. All of which put pressure on traditional data center architecture. Dealing effectively …
Zero Trust Security Strategy
Zero Trust Security Strategy Today’s networks are complex beasts, and considering yourself an entirely zero trust network design is a long journey. It means different things to different people. Networks these days are heterogeneous, hybrid, and dynamic. Over time, technologies have been adopted, from punch card coding to …
ACI Cisco
ACI Cisco The legacy data center topologies have a static infrastructure that specifies the constructs to form the logical topology. We have to configure the VLAN, Layer 2/Layer 3 interfaces, and the protocols we need on the individual devices. Also, the process we used to …
Zero Trust SASE
Zero Trust SASE Today’s digital transformation and strategy initiatives require speed and agility in I.T. However, there is a lag, and that lag is with security. Security can either hold them back or not align with the fluidity needed for agility. As a result, we have decreased an …
Microservices Observability
Microservices Observability The following post discusses critical areas for microservices monitoring. Monitoring microservices can be done with a new practice called Observability. Teams increasingly adopt new technologies as companies transform and modernize applications to leverage container- and microservices development. IT infrastructure monitoring has always been complex but is …