Author: Muhammad Marakkoottathil

Securing Internet Access Using Cisco Umbrella

The Cisco Umbrella, formerly known as OpenDNS was founded in 2006 by David Ulevitch. It fills traditional gaps in network security by blocking the outbound requests made to malicious domains Key Use Cases DNS protection Visibility into types of activities the internet-connected users and devices are requesting and the cloud services that exist in your

AlgoSec – NSPM Solution Quick Review

AlgoSec NSPM solution (Network Security Policy Management) offers organizations streamline various aspects of managing security policies that govern devices such as firewalls, SIEMs, ADCs, etc. Founded in 2004 by Yuval and Avishai Wool, it serves 2000 global customers including Fortune 50. Key Use Cases Use Case Modules Description Centralized security policy management and visibility across

Wireless Standards and Cisco Solutions

The number of wireless devices connected to the network increases yearly (roughly 11.930 billion mobile devices globally). This includes data and voice connectivity for the employees, wireless internet access for guests, and connectivity for IoT devices. In this blog, we will explore  wireless standards and terminologies and Cisco’s latest wireless solutions Wireless Standards Standard Frequencies

VMware NSX Security Solution Analysis

Historically VMware is into virtualization. With the acquisition of Last-line VMware firmly started attacking the $5B security market.  With the ongoing trend of distributed applications and with the growing east-west traffic the traditional approach of physical firewall appliances becomes very inefficient. For example, network changes have to occur to get the traffic funneled in and

VMware Carbon Black Solution Analysis

The VMware Carbon black is an endpoint protection platform (EPP) that claims to protect over 16000+ businesses across the world.  The solution combines multiple capabilities such as AV protection, EDR, and behavioral prevention to protect from threats. The solution consists of two main components 1) sensors: that reside on and monitor the endpoints, and 2)