Zero Trust, the concept of securing services and devices based on an implicit lack of trust, which can be applied to Industry 4.0, is a subject that is used in all cases in IT. It may seem that there is no longer a company, that does not use Zero Trust’s complete approach to security. However, the reality is not so bright. What problems and challenges does Industry 4.0 pose in terms of security? We will provide answers to these questions below. They will be based on visible trends in the manufacturing industry, as well as lessons learned from Grandmetric’s safety audits.
Online data privacy and security is a particularly important topic when most of us work remotely. There are plenty of traces that we leave behind on the Internet, and we encounter cybercrime on a daily basis. We should, therefore, consider how we can protect ourselves against the loss of both personal data and key company information. The ICT audit is a certain component of the entire security policy. It is most often carried out in order to prevent threats that may occur in the future.
There are at least several reasons for an IT integrator to build in-house software development capabilities and skillset. In this article, we discuss why should an IT integrator build a software development team and how Grandmetric does just that to deliver better networking projects.
Many people wonder why good design and implementation of corporate LAN and Edge features is necessary. There are many answers to this simple question and among them, we require a good network to be least vulnerable to unwanted intrusions along with it to be able to support all our requirements. We have compiled a list that you […]
Cisco ASA EoL EoS – what does EoL / EoS status of Cisco products mean, what does it mean for Cisco ASA lines and could be a replacement line of product?
I will not elaborate on how good or bad this idea is because that’s how the entire subscription world works, whether we like it or not. My post is intended for those who want to have a quick overview of Cisco SD-WAN licensing before they decide which way to go.
I am presenting a video showing how Duo can be used as second factor authentication (push app notification in this case) for VPN remote access connections.
The Zero-Touch Provisioning (called ZTP) is the one of the concept behind SD-WAN that I mentioned here in What is SD-WAN article that I wrote about year ago. Frankly speaking, ZTP is something that every (or almost every) SD-WAN vendor has implemented. In this post I am going to dig into detail to the Cisco SDWAN ZTP.
In this blog post, I am sharing a video showing how to use Multi-Factor Authentication for RDP (Remote Desktop) sessions. We’ll use Cisco Duo Security as the second factor (push app) authentication method. This recording was prepared for one of our Grandmetric Tech Meetings. Lab schema: RDP and second factor authentication live demo […]
About month ago I attended the SD-WAN World Summit organized by Luxatia International in Berlin. Thanks to organizer i was invited as a speaker. My presentation took place in day 2 of the event and the title was “Changing User Experience. Customer WAN to SD-WAN transformation”