Blog
Network Insight.

Brownfield Network Automation

Brownfield Network Automation In today’s rapidly advancing technological landscape, the efficient management and automation of networks has become crucial for businesses to thrive. While greenfield networks are often designed with automation in mind, brownfield networks present a unique set of challenges. In this blog post, we will explore the world …

Zero Trust Networking

Zero Trust Networking In today’s increasingly digital world, where cyber threats are becoming more sophisticated, traditional security measures are no longer enough to protect sensitive data and networks. This has led to the rise of a revolutionary approach known as zero trust networking. In this blog post, we will explore …

Zero Trust Network ZTN

Zero Trust Network ZTN In today’s rapidly evolving digital landscape, ensuring the security and integrity of sensitive data has become more crucial than ever. Traditional security approaches are no longer sufficient to protect against sophisticated cyber threats. This is where the concept of Zero Trust Network (ZTN) comes into play. …

    Software Defined Perimeter Solutions The following post discusses the Software Defined Perimeter solution, the need for a new software perimeter solution, and how this can be integrated. Many companies use SD-WAN and multiprotocol label switching (MPLS) based architectures to attack the same problem. However, the application is changing, …

Cloud Native Meaning

Cloud-native meaning In today’s technology-driven world, the term “cloud native” has gained significant attention. It is often used in discussions surrounding modern software development, deployment, and scalability. But what exactly does it mean to be cloud native? In this blog post, we will unravel the true meaning behind this concept …

Hello, I have created a Network World column and will be releasing a few blogs per month. Kindly visit the following link to view my full profile and recent blogs – Matt Conran Network World. The list of individual blogs can be found here: Data Center – > SDN and agility …

Hello, I have created an “Enterprise Networking Tech Brief” Series. Kindly click on the link to view the video. I’m trying out a few videos styles. Enterprise Networking A –  LISP Components & DEMO – > https://youtu.be/PBYvIhxwrSc Enterprise Networking B – SD-Access & Intent-based networking – > https://youtu.be/WKoGSBw5_tc ” In campus networking, there are a …

Hello, I have created a “Cloud Computing Tech Brief” Series. Below, we have videos that can assist you in the learning process of cloud computing. Kindly click on the link to view the video. I’m trying out a few video styles. Cloud Computing A – Cloud – Introducing Immutable Server …

UNIKEN – Connecting Safe

Hello, I recently completed a 3 part package for Uniken. Part 1 can be found here – Matt Conran & Uniken. Stayed tuned for Part 2 and Part 3!

Correlate Disparate Data Points In today’s data-driven world, the ability to extract meaningful insights from diverse data sets is crucial. Correlating disparate data points allows us to uncover hidden connections and gain a deeper understanding of complex phenomena. In this blog post, we will explore effective strategies and techniques to …

Paessler purchased a three package article on NetFlow for Cybersecurity. Generally, the three posts relate to how NetFlow can be used to battle the ongoing threats of cybercriminals. Kindly, click the links. Part 1 – Matt Conran Paessler, Part 2 – Matt Conran Outbound DDoS, Part 3 – Matt Conran …

Internet of Things Access Technologies In today’s interconnected world, the Internet of Things (IoT) has become a significant part of our lives. From smart homes to industrial automation, IoT devices rely on access technologies to establish connectivity. This blog post aims to delve into the world of IoT access technologies, …