Sample Solution: Automating L3VPN Deployments

A long while ago I published my solution for automated L3VPN provisioning… and I’m really glad I can point you to a much better one ;)

Håkon Rørvik Aune decided to tackle the same challenge as his hands-on assignment in the Building Network Automation Solutions course and created a nicely-structured and well-documented solution (after creating a playbook that creates network diagrams from OSPF neighbor information).

Want to be able to do something similar? You missed the Spring 2019 online course, but you can get the mentored self-paced version with Expert Subscription.

NDSS 2019 Honors Timeless Papers

The papers and presentations are done, the awards and appreciation certificates have been handed out, and the boxes are packed and labeled for shipping. NDSS 2019 has come to a successful close. It was a record setting event with over 550 registrations, 89 papers, 36 posters, and four workshops. It was inspiring to see such energetic and passionate security research professionals gathered together in one place discussing their work. All of the highlights can be found at the NDSS 2019 website, including the Distinguished Paper and Distinguished Poster Awards for this year and the full program. It is worthwhile, however, to highlight a new award series initiated this year.

NDSS Test of Time Awards

This year, to kick off the second 25 years of NDSS, an NDSS Test of Time annual award was created. This award is for papers that were published more than ten years ago and have had a significant impact on both academia and industry in the years since. There were three awardees in the inaugural class.

The first Test of Time award is from 1996: SKEME: A Versatile Secure Key Exchange Mechanism for Internet by Hugo Krawczyk. SKEME was an integral component of early versions of Continue reading

VMware preps milestone NSX release for enterprise-cloud push

Looking to ease deployments of software-defined networks while reinforcing automation and security for hybrid and multicloud customers, VMware has taken the wraps off of a major release of its NSX-T Data Center software.While the NSX-T 2.4 announcement includes over 100 upgrades, VMware said the release anoints NSX-T as the company’s go-to platform for future software-defined cloud developments.[ Also see How to plan a software-defined data-center network and Efficient container use requires data-center software networking.] “This is NSX-T’s coming out party—it is now our primary platform and includes all the tools, services, security and support for future growth,” said Tom McCafferty, VMware’s senior director of product marketing for NSX.To read this article in full, please click here

VMware preps milestone NSX release for enterprise-cloud push

Looking to ease deployments of software-defined networks while reinforcing automation and security for hybrid and multicloud customers, VMware has taken the wraps off of a major release of its NSX-T Data Center software.While the NSX-T 2.4 announcement includes over 100 upgrades, VMware said the release anoints NSX-T as the company’s go-to platform for future software-defined cloud developments.[ Also see How to plan a software-defined data-center network and Efficient container use requires data-center software networking.] “This is NSX-T’s coming out party—it is now our primary platform and includes all the tools, services, security and support for future growth,” said Tom McCafferty, VMware’s senior director of product marketing for NSX.To read this article in full, please click here

Give Meaning to 100 Billion Events a Day — The Shift to Redshift

In part one, we described our Analytics data ingestion pipeline, with BigQuery sitting as our data warehouse. However, having our analytics events in BigQuery is not enough. Most importantly, data needs to be served to our end-users.

TL;DR — Teads Analytics big picture

In this article, we will detail:

  • Why we chose Redshift to store our data marts,
  • How it fits into our serving layer,
  • Key learnings and optimization tips to make the most out of it,
  • Orchestration workflows,
  • How our data visualization apps (Chartio, web apps) benefit from this data.

Data is in BigQuery, now what?

History Of Networking – MPLS-TE – George Swallow

George Swallow is an early and significant contributor to MPLS Traffic Engineering. In this History of Networking episode, we sit down with George to talk about his involvement in MPLS-TE, how it developed, and some of the challenges along the way.

George Swallow
Guest
Russ White
Host
Donald Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – MPLS-TE – George Swallow appeared first on Network Collective.

IoT security plans: 3 things you must include

With many IT projects, security is often an afterthought, but that approach puts the business at significant risk. The rise of IoT adds orders of magnitude more devices to a network, which creates many more entry points for threat actors to breach. A bigger problem is that many IoT devices are easier to hack than traditional IT devices, making them the endpoint of choice for the bad guys.IoT is widely deployed in a few industries, but it is in the early innings still for most businesses. For those just starting out, IT and security leaders should be laying out their security plans for their implementations now. However, the landscape of security is wide and confusing so how to secure an IoT deployment may not be obvious. Below are three things you must consider when creating an IoT security plan.To read this article in full, please click here

Protecting the IoT: 3 things you must include in an IoT security plan

With many IT projects, security is often an afterthought, but that approach puts the business at significant risk. The rise of IoT adds orders of magnitude more devices to a network, which creates many more entry points for threat actors to breach. A bigger problem is that many IoT devices are easier to hack than traditional IT devices, making them the endpoint of choice for the bad guys.IoT is widely deployed in a few industries, but it is in the early innings still for most businesses. For those just starting out, IT and security leaders should be laying out their security plans for their implementations now. However, the landscape of security is wide and confusing so how to secure an IoT deployment may not be obvious. Below are three things you must consider when creating an IoT security plan.To read this article in full, please click here

Protecting the IoT: 3 things you must include in an IoT security plan

With many IT projects, security is often an afterthought, but that approach puts the business at significant risk. The rise of IoT adds orders of magnitude more devices to a network, which creates many more entry points for threat actors to breach. A bigger problem is that many IoT devices are easier to hack than traditional IT devices, making them the endpoint of choice for the bad guys.IoT is widely deployed in a few industries, but it is in the early innings still for most businesses. For those just starting out, IT and security leaders should be laying out their security plans for their implementations now. However, the landscape of security is wide and confusing so how to secure an IoT deployment may not be obvious. Below are three things you must consider when creating an IoT security plan.To read this article in full, please click here

The big picture: Is IoT in the enterprise about making money or saving money?

Everyone knows the Internet of Things (IoT) is a transformative technology for consumers, vendors, and enterprises that’s in the process of becoming a historically huge market—measured in trillions, not billions, of dollars. That’s great, and most likely true, but perhaps a little vague in some respects. For example: What, exactly, do enterprises hope to gain from their investments in the IoT? Are they planning to use the IoT to save money on things they’re already doing, or do they see the technology as a way to create new businesses and boost revenue?To read this article in full, please click here