Cisco Remote Access VPN architecture for Amazon Web Services (AWS)
This architecture covers DNS based load balancing for RAVPN connections for a single VPC (multi-az) and multi-VPC (multi-az) architecture.
Fingerprint cloning: Myth or reality?
By Paul Rascagneres and Vitor Ventura. Executive summary Passwords are the traditional authentication methods for computers and networks. But passwords can be stolen. Biometric authentication seems the perfect solution for that problem. There are several kinds of biometric authentication, including retina scanning, facial recognition and fingerprint authentication, the most common one. Everyone’s fingerprints are unique, and it is […]
What Next for BYOD?
One of the interesting and challenging aspects of working in the Mobility space is the sheer pace at which the industry is moving. I’m fortunate to work with many Customers in EMEA to help support and shape their strategy towards Mobile technology. A great example of this has been the reaction to BYOD. The influx […]
Check Ins – Why location needs to be part of Authentication and Identity
Dude, where’s my IP? I love to check in on social networks like Foursquare and Google+. Most of the time, there’s no point to it, but it’s fun to see what friends and colleagues are up to or discover new local haunts. Despite the fun and games, location is much more important to the network […]
Have You Registered for Centralize Policy, Control and Enforcement May 15th?
Activate the IT Transformation with Unified Access: Part 4 - Centralized Policy, Control, and Enforcement Wednesday, May 15, 2013 10am-11am PDT | Register Now...
See How Organizations Use Cisco ISE to Centralize Policy and Secure Access
Activate the IT Transformation with Unified Access: Part 4 - Centralized Policy, Control, and Enforcement Wednesday, May 15, 2013 10am-11am PDT | Register...