Category: Cyber Security – IT and OT

Comparing Cisco Tetration with VMware NSX

Cisco Secure workload (Tetration) and VMware NSX Distributed Firewalling (DFW) are famously known for their micro-segmentation use cases.  The table below compares some of the key use cases and capabilities. Note: This post is from years of personal working experience on these products and available references. This post should not use against the vendor’s services

Securing Internet Access Using Cisco Umbrella

The Cisco Umbrella, formerly known as OpenDNS was founded in 2006 by David Ulevitch. It fills traditional gaps in network security by blocking the outbound requests made to malicious domains Key Use Cases DNS protection Visibility into types of activities the internet-connected users and devices are requesting and the cloud services that exist in your

AlgoSec – NSPM Solution Quick Review

AlgoSec NSPM solution (Network Security Policy Management) offers organizations streamline various aspects of managing security policies that govern devices such as firewalls, SIEMs, ADCs, etc. Founded in 2004 by Yuval and Avishai Wool, it serves 2000 global customers including Fortune 50. Key Use Cases Use Case Modules Description Centralized security policy management and visibility across

VMware Carbon Black Solution Analysis

The VMware Carbon black is an endpoint protection platform (EPP) that claims to protect over 16000+ businesses across the world.  The solution combines multiple capabilities such as AV protection, EDR, and behavioral prevention to protect from threats. The solution consists of two main components 1) sensors: that reside on and monitor the endpoints, and 2)

VMware Design Bootcamp-4: NSX-T and AVI Load-balancer

Currently, most of the business runs on applications. And apparently, faster infrastructure provisioning is required to support the on-demand nature of modern applications. Secondly, integrating heterogeneous infrastructure solutions to support application hosting is another common challenge faced by the customers. In reality, most of the customers are having top-notch solutions from different vendors, which may

Zero-Trust Security with Micro-Segmentation

Segmentation has been around for a long time there’s nothing new. There’s nothing sexy in it, we been doing segmentation for years. However, it is done specifically for network optimization and network performance, and it’s neither for security nor for compliance. Micro-segmentation however is a concept that is designed and purpose-built for security. In this

Easy Segmentation & Operation with NSX-T 3.0

In the NSX-T Datacenter, segments are virtual layer 2 domains. With NSX-T you can do VLAN based or overlay-backed segmentation. The VLAN backed segments are usually done for bridging traffic to the devices usually outside of the NSX-T deployment. Such as gateway, physical firewall, etc. In this blog, we will discuss how easy segmentation and