The startup plans to launch its decentralized cloud this year.
Netscout talked to Ethan Banks about how they are unifying visibility fabrics inside of an IT team with features like security tool chains.
The post BiB 32: Netscout Adds Security Chaining To nGenius PFS5000 appeared first on Packet Pushers.
The bolstered platform includes core to edge support for mission critical operations.
Primary adoption drivers for OCP are power efficiency, cost reductions, standardization, and quick deployment.
The CloudGuard technology takes a device- and application-centric approach.
The hype cycle for SD-WAN vendors has moved fast.
Yet another CVSS 10 for Cisco security products
Last week we added a new CCNA Cyber Ops Course. This course is available to AAP members through your members and to everyone else through ine.com
Why You Should Watch:
Cisco’s CCNA Cyber Ops certification provides individuals with the knowledge to identify and respond to security incidents. This certification provides a path to working in a Security Operations Center (SOC) and security positions. As a CCNA level certification, Cyber Ops provides introductory knowledge so one may be aware of the security landscape, understand security concepts and general networking.
About the Course:
This course will cover the exam topics of the Understanding Cisco Cybersecurity Fundamentals (SECFND 210-250) Exam.This course is taught by Andrew Crouthamel and is 7 hours and 32 minutes long.
What You’ll Learn:
We will dive into topics such as networking concepts and IP addressing, as well as security concepts including access control models, risk assessment and the CIA triad. We will also review cryptography methods and host-based analysis details, as well as security monitoring tools and attack methods used by threat actors.
About the Author:
Andrew is a seasoned IT engineer with over 12 years of experience. He started out in IT as an assistant Continue reading
A new white paper from OpenCT features detailed technical examples of OpenCT’s two telco solutions: Blockchain as a Transport (BaaT) and Blockchain-Defined Wide Area Networks (BD-WAN).
Summary: With Context-awareness, NSX for vSphere 6.4 enables customers to enforce policy based on Application and Protocol Identification and expands the Identity Firewall support to Multiple User Sessions.
A few weeks ago, VMware released version 6.4 of NSX for vSphere. The 6.4 release brings many new features, with Context-awareness being key from a security perspective. Micro-segmentation enables East-West security controls, and is a key building block to a secure datacenter. Context-awareness builds-on and expands Micro-segmentation by enabling customers even more fine-grained visibility and control. NSX has supported the use infrastructure or application-centric constructs such as Security Groups based on criteria like VM name or OS version, or Dynamic Security Tags describing things like the workload function, the environment it’s deployed in, or any compliance requirements the workload falls under, enabling fine-grained control and allowing customers to automate the lifecycle of a security policy from the time an application is provisioned to the time it’s decommissioned. Prior to 6.4, rules with infrastructure or application-centric grouping constructs on the Management plane, are eventually translated to 5-tuple based rules in the dataplane.
Figure: NSX drives policy based on Network, User and Workload Context
A crucial aspect of Context-awareness Continue reading
The company will also welcome a new CFO.
In this episode of Network Collective, Hank Yeomans and Jonathan Davis join us to take a look at some of our favorite tools as network engineers. Whether it’s hardware or software, tools are the things that help us do our jobs well, and if used correctly, can help set you apart.
We would like to thank Cumulus Networks for sponsoring this episode of Network Collective. Cumulus invites you to find out more about how Linux is changing the data center networking space by downloading their free ebook “Linux Networking 101” here: http://cumulusnetworks.com/NetworkCollectiveLinux
Show Notes:
I got some great comments from my readers on the first part of this post. I love engaging with readers! So I thought I would write a part two to explain some of my thinking which I described in some of the comments.
Does a network architect need to be technical?
Yes, he/she needs to be technical but what does that mean? Let’s say that two datacenters need to be connected. Layer two needs to be stretched between the two DCs. The architect should be able to know different solutions to the problem such as using fibres between the two DCs, clustering technologies, TRILL, OTV and so on. Does the architect need to be able to configure OTV off the bat? Nope. Does the architect need to know what different timers OTV uses? Nope. Those are not things that need to be considered at that point in time. Now, often the architect is involved in the actual design as well and in that case the architect is involved in creating the design and documenting what commands are needed and so on. So the architect needs to be technical but not super technical.
Does the network architect need operational experience?
Preferably Continue reading
At Bilkent University in Ankara, students sit at desks littered with bookbags and bottles of water. It looks like a typical classroom, except for the makeup of the students – school-age girls – and when the instructor asks a question, the room comes alive. “Who wants to code again after today?”
The hands shoot up.
The students are participating in Coding Sisters, a program that teaches coding to girls. Soon they are grinning as they raise their certificates of completion into the air. They yell in unison, “Hello world!”
The project was funded by the Internet Society’s “Digital schools!” Chapterthon 2017, in partnership with Wikimedia Foundation. From October to November 2017, 30 projects from around the world came together to bring educational opportunities to children, especially girls. Chapterthon has been nominated for a series of prizes to be given out at the World Summit on the Information Society (WSIS), an annual United Nations-sponsored summit focused on the role information and communication plays in our world. TheWSIS Prizes recognize individuals and organizations that advance the Sustainable Development Goals: 17 global goals dedicated to building a better world by 2030.
Four other innovative, Internet Society-funded projects Continue reading