Zero Trust Networking (ZTN): don’t trust anything

Zero Trust Networking (ZTN): don’t trust anything

I don’t even want you to knock on my door! Let’s craft a new story.

09/18/18

The rise of EVPN in the modern data center

The rise of EVPN in the modern data center

Layer 2 networks: what you learn from watch and learn.

09/05/18

The future of devops for network engineers

The future of devops for network engineers

Script-driven approach is a playground. Let’s finally mature.

08/28/18

Securing microservice environments in a hostile world

Securing microservice environments in a hostile world

If you build bridges you have to go where the water is.

08/20/18

Scalable groups tags with SD-Access

Scalable groups tags with SD-Access

An effective security posture starts with the right visibility.

08/06/18

A primer on closed-loop automation

A primer on closed-loop automation

The shortest path to achieving intent-based networking.

08/01/18

The rise of artificial intelligence DDoS attacks

The rise of artificial intelligence DDoS attacks

The leaves may change color, but the roots are the same. Are you ready for AI-based DDoS attacks?

07/11/18

SD-WAN: Hardening external connectivity

SD-WAN: Hardening external connectivity

Traditionally, SD-WAN was used to connect internal resources. Nowadays challenges arise as to how we connect external identities such as remote partners and mobile workers from multiple locations.

06/20/18

A new era of campus network design

A new era of campus network design

Technologies invented 30 years ago won’t cut it in today’s networking environments. A new era of campus fabric design has evolved, providing consistent management, contextual insights and intelligent segmentation.

06/14/18

Overcoming kludges to secure web applications

Overcoming kludges to secure web applications

Nothing is easy when applications lay upon multiple kludges of network architecture and flawed protocols. Without adequate safeguards, security results in a hit and miss approach.

05/21/18

IPSec – A swiss army knife of kludges

IPSec – A swiss army knife of kludges

One shoe does not fit all when it comes to SD-WAN providers. There are a variety of ways to tunnel user traffic. Stay clear of anyone who hasn't made the right extensions to IPSec.

05/10/18

Container security: crafting application identity

Container security: crafting application identity

Containers are not like traditional workloads and as a result, they require a new security model. Traditional methods such as IP address and ACLs are no longer effective.

05/07/18

Why carriers aren't ready for SD-WAN services

Why carriers aren't ready for SD-WAN services

An insider's guide to SD-WAN services.

04/30/18

Load More