Cisco Secure workload (Tetration) and VMware NSX Distributed Firewalling (DFW) are famously known for their micro-segmentation use cases. The table below compares some of the key use cases and capabilities. Note: This post is from years of personal working experience on these products and available references. This post should not use against the vendor’s services
The Cisco Umbrella, formerly known as OpenDNS was founded in 2006 by David Ulevitch. It fills traditional gaps in network security by blocking the outbound requests made to malicious domains Key Use Cases DNS protection Visibility into types of activities the internet-connected users and devices are requesting and the cloud services that exist in your
AlgoSec NSPM solution (Network Security Policy Management) offers organizations streamline various aspects of managing security policies that govern devices such as firewalls, SIEMs, ADCs, etc. Founded in 2004 by Yuval and Avishai Wool, it serves 2000 global customers including Fortune 50. Key Use Cases Use Case Modules Description Centralized security policy management and visibility across
Typical OT and IoT inherently lack visibility and are often done using manual work, hence having a large, exposed attack surface. OT systems were initially designed with little to no consideration of security, and as a result — attacks on OT Systems have risen exponentially over the past 10 years. The average cost of a cyber-attack
The VMware Carbon black is an endpoint protection platform (EPP) that claims to protect over 16000+ businesses across the world. The solution combines multiple capabilities such as AV protection, EDR, and behavioral prevention to protect from threats. The solution consists of two main components 1) sensors: that reside on and monitor the endpoints, and 2)
We are now in the post-pandemic phase but still the hybrid work is continuing. There are many of us are settling with the permanent work-from-home option. COVID pushed IT to be distributed, and borderless and raised many challenges. And if you take a look at it from a technology transformation perspective the below figure narrates
Currently, most of the business runs on applications. And apparently, faster infrastructure provisioning is required to support the on-demand nature of modern applications. Secondly, integrating heterogeneous infrastructure solutions to support application hosting is another common challenge faced by the customers. In reality, most of the customers are having top-notch solutions from different vendors, which may
New websites are emerging at astonishing rates. It is really making it challenging for organizations to enforce internet usage policies and keep users safe from online threats. If you look at it, modern admins require more accurate & timely solutions to protect their customers. In this blog – let’s look at how NSX-T uses URL
Segmentation has been around for a long time there’s nothing new. There’s nothing sexy in it, we been doing segmentation for years. However, it is done specifically for network optimization and network performance, and it’s neither for security nor for compliance. Micro-segmentation however is a concept that is designed and purpose-built for security. In this
In the NSX-T Datacenter, segments are virtual layer 2 domains. With NSX-T you can do VLAN based or overlay-backed segmentation. The VLAN backed segments are usually done for bridging traffic to the devices usually outside of the NSX-T deployment. Such as gateway, physical firewall, etc. In this blog, we will discuss how easy segmentation and