Better Services and a Safer Data Center: Tetration in Action at UNC – Charlotte
At the end of the day, technology is at its best when it’s helping people - empowering them to accomplish their goals.
What’s new with ACI Micro Segmentation
I can’t believe it has been a year since I wrote the blog series (part-I, part-II, part-III and
How to Secure Your Data Centre: The Importance of Whitelist Policies
Growing up in Britain, a fair share of our history lessons covered the black death. It was a truly horrible plague that affected all without prejudice, ravaging the young and old throughout towns, cities, countries and the continent with seemingly no end. Surprisingly, it’s hard to remember everything from that class (hey, it was quite […]
Micro Segmentation and Cisco ACI – From Theory to Practice Part IV
This is Part IV in a four part series of blogs. This blog has been co-written with Vincent Esposito (@vesposit) This is the last of a series of blogs...
Micro Segmentation and Cisco ACI – From Theory to Practice Part II
This is Part II in a four part series of blogs. This is the second of a series of blogs where we will illustrate how to leverage Cisco ACI to implement Micro Segmentation. In the first blog we described how to use ACI micro segmentation to implement a web application that uses a tier of […]
Microsegmentation with Cisco ACI
Modern data centers are under unrelenting attack. East-west traffic security breaches are happening every day. According to Cisco, 75 percent of all attacks take only minutes to begin stealing data but take longer to detect. Once discovered, several weeks may pass before full containment and remediation are achieved. Today’s data centers require a variety of […]