Industry’s First SD-WAN Standard

MEF has published the industry’s first standard (MEF 70) defining SD-WAN service and its service attributes. SD-WAN service standardization is part of the initiative to define, deliver and certify a family of Carrier Ethernet, Optical Transport, IP, SD-WAN, and security services across automated networks using orchestration APIs. This SD-WAN standardization effort has included inputs and contributions from numerous companies, such as Silver Peak, Cisco, Nuage Networks, Nokia, TDS Telecom, Verizon…

Read more

Is it Time to Replace the Traditional VPN?

Virtual Private Networks (VPNs) were developed over 20 years ago to provide users with the ability to access corporate resources located within the company’s local data center. Since most employees worked on-site and usually only a handful worked remote, the traditional VPN approach worked fine. However, today with the proliferation of laptops and mobile devices, along with the increased use of cloud (SaaS) solutions, the traditional model is in the…

Read more

Securing Your Network Through Segmentation

The concept of segmenting networks to enhance security is not new, but with the increase in cyberattacks and the scope of data breaches growing with every new disclosure, making it harder for the adversaries to succeed should be considered a priority by all organizations. While segmenting a network can be a major effort and often competing with other priorities, if properly planned and designed, it will not only help secure…

Read more

R.I.P. – Is it time to kill the traditional Network Core Switch?

Publicized data breaches or network compromises are becoming almost a daily event, with probably hundreds or more event occurring that are not disclosed. In order for companies to protect their users, data and resources measures must be taken that isolate and protect critical systems and resources. The recent breach of the National Bank of Blacksburg in Virginia resulted in the theft of over $2.4 million over an eight-month period. This…

Read more

Change is Hard

“If you want to make enemies, try to change something.” was once said by former US President Woodrow Wilson. Any engineer or architect who has ever been involved in network engineering or security would probably agree. Any change in an organization is hard, but when dealing with network administrators and “managers” that don’t acknowledge the existing problems or how the new solution will solve those problems – you have a…

Read more

Do You Have a Crystal Ball?

How do you prepare for the next cyber attack? Do you know what’s coming and are you prepared or do you have to scramble when an attack hits? Even with the best technology and security platforms deployed in your enterprise you can be caught flat-footed if you are not prepared. Threat intelligence plays an important role in helping protect an organization. Along with helping you see what’s happening within your…

Read more

Survived WannaCry? Now What?

So, you survived WannaCry ransomware attack, now what do you do to avoid the next attack? WannaCry targeted a vulnerability that existed in Windows from XP to the latest version of Windows 10 using an exploit developed by the NSA. Microsoft released a patch back in March, but many organizations failed to update. The widespread impact of this attack should be a wake-up call to businesses, governments and consumers alike.…

Read more

What is ‘Zero Trust’?

Traditional network security approaches are no longer adequate in today’s ecosystem and a new method to protect your network is needed. Many security professionals have begun implementing a new architecture called Zero-Trust Networking, which changes the entire security paradigm. The underlying principle of Zero-Trust Networking, originally developed by Forrester Research, is exactly as it sounds: Trust Nothing. A Zero-Trust network abolishes the notion that everything inside your corporate perimeter can…

Read more

Information Security in Bizarro World

The enterprise firewall is not a security device. The Intrusion Protection System will break the network. SSL inspection is an invasion of privacy. Network segmentation is hard. Welcome to Information Security in Bizarro World. Yes, I have heard all those excuses. The Internet is not a friendly place anymore with bunnies and unicorns frolicking in the meadows. Nation states, professional hackers spreading ransomware, and script kiddies are just some of…

Read more

The Threat is Real. Protecting Your Organization.

Target, Home Depot, Office of Personnel Management (OPM), Democrat National Committee (DNC), Yahoo; almost every day we hear about some sort of data breach or network attack. It seems to have become a fact of life on the Internet. However, organizations can take simple measures to strengthen their networks without major network redesigns or exorbitant expenditures. Target was breached when a subcontractor’s system was compromised and the attacker gained valid…

Read more