A senior engineer at Juniper Networks wasn’t happy with me mentioning resource hogs and Junos platforms in the same statement. Instead of engaging in never-ending angels dancing on pins deliberations comparing the virtues of Junos with other network operating systems, I decided to throw a bit of real-life data into the mix – I created a simple script that measures:
Today's Tech Bytes podcast dives into the notion of applying Zero Trust Network Access (ZTNA) to users on campus as well as remote workers. Our sponsor is Fortinet and we discuss bringing ZTNA to users on prem, as well as IoT devices.
The post Tech Bytes: Extending ZTNA To Remote And Office Workers With Fortinet (Sponsored) appeared first on Packet Pushers.
This week's Network Break looks at who takes a haircut in Avaya's Chapter 11 restructuring, GoDaddy's ongoing security issues, new photonics from Nokia, a huge quarter for Arista and more tech news.
The post Network Break 418: Avaya Goes Chapter 11 Again; Cisco, Arista See Revenues Rise appeared first on Packet Pushers.
Authentication is a key technology that underpins large portions of the online world, and so it's worth exploring in a bit more detail. In this episode of the Full Stack Journey podcast, Scott talks with Dan Moore of FusionAuth about all things authentication.
The post Full Stack Journey 075: Authentication’s Role In The Online World appeared first on Packet Pushers.
It might be curmudgeon day. Johna and Greg ask what are mistakes that we have seen in technology strategies.
The post HS040 Top Mistakes Technology Strategists Make appeared first on Packet Pushers.
Efficiency, scalability, and security are critical for modern telco networks. Operating modern 5G network infrastructure requires the ability to manage complex network operations across large-scale multi-cloud and edge environments while also meeting complex security requirements.
The VMware Telco Cloud Platform was built from the ground up to help Communications Service Providers (CSPs) meet these challenges. It combines the capabilities of VMware’s cloud infrastructure and network virtualization software (VMware vSphere, vSAN, and NSX) with a set of networking, security, and management tools built for the telco industry. The platform helps CSPs deploy and manage virtualized network functions and containerized network functions (VNFs and CNFs), reduce costs, and enhance network security while enabling new revenue-generating services.
At MWC 2023, the VMware team will demonstrate four key use cases for the VMware Telco Cloud Platform.
Networking and Security performance acceleration powered by Data Processing Units (DPUs) enables a telco-grade virtualized 5G infrastructure. VMware is announcing the General Availability of DPU-based acceleration for NSX Continue reading
Over the last few years the topic of cyber security has moved from the IT department to the board room. The current climate of geopolitical and economic uncertainty has made the threat of cyber attacks all the more pressing, with businesses of all sizes and across all industries feeling the impact. From the potential for a crippling ransomware attack to a data breach that could compromise sensitive consumer information, the risks are real and potentially catastrophic. Organizations are recognizing the need for better resilience and preparation regarding cybersecurity. It is not enough to simply react to attacks as they happen; companies must proactively prepare for the inevitable in their approach to cybersecurity.
The security approach that has gained the most traction in recent years is the concept of Zero Trust. The basic principle behind Zero Trust is simple: don't trust anything; verify everything. The impetus for a modern Zero Trust architecture is that traditional perimeter-based (castle-and-moat) security models are no longer sufficient in today's digitally distributed landscape. Organizations must adopt a holistic approach to security based on verifying the identity and trustworthiness of all users, devices, and systems that access their networks and data.
Ish wrote an interesting comment on my Network Automation Expert Beginners blog post. He started with:
[Our network has] about 40 sites, but we don’t do total refresh cycles in bulk, just as needed. Everything we do is sporadic, and I’m trying to see the ROI on learning automation for things that are done once in a while that don’t take much time to do manually anyway.
There are two aspects to this part of his comment: