Before the era of UTM (Unified Threat Management or next-generation firewall), we most often dealt with stateful firewall devices. The principle of operation of the stateful firewall is primarily operating on the headers of the third network layer (L3) and the fourth transport layer (L4) of the OSI model. Thanks to the understanding of headers […]
Why is it important to take a comprehensive approach to secure the Internet interfaces, instead of focusing on one area, e.g. a firewall? In this article, we will take a shot at answering this question, showing potential Internet interfaces that can be critical in case of attack. You will learn what firewall network security is […]
When dealing with networks, both wired and wireless, we can’t fail to mention the security issue. In the case of wireless networks, many users are unaware of the hazards lurking when switching between networks and using unprotected, unverified wireless networks. This article will answer your questions on securing the Wi-Fi network and making it resistant […]
To check whether a given IT infrastructure is resilient, and its LAN security strong, first, we need to run audits and penetration tests. While performing these, we use various protection breaching techniques to access the company’s resources. One of the basic tests is an attempt to obtain as much information as possible at a local […]
Zero Trust, the concept of securing services and devices based on an implicit lack of trust, which can be applied to Industry 4.0, is a subject that is used in all cases in IT. It may seem that there is no longer a company, that does not use Zero Trust’s complete approach to security. However, the reality is not so bright. What problems and challenges does Industry 4.0 pose in terms of security? We will provide answers to these questions below. They will be based on visible trends in the manufacturing industry, as well as lessons learned from Grandmetric’s safety audits.
Online data privacy and security is a particularly important topic when most of us work remotely. There are plenty of traces that we leave behind on the Internet, and we encounter cybercrime on a daily basis. We should, therefore, consider how we can protect ourselves against the loss of both personal data and key company information. The ICT audit is a certain component of the entire security policy. It is most often carried out in order to prevent threats that may occur in the future.
There are at least several reasons for an IT integrator to build in-house software development capabilities and skillset. In this article, we discuss why should an IT integrator build a software development team and how Grandmetric does just that to deliver better networking projects.
Many people wonder why good design and implementation of corporate LAN and Edge features is necessary. There are many answers to this simple question and among them, we require a good network to be least vulnerable to unwanted intrusions along with it to be able to support all our requirements. We have compiled a list that you […]
Cisco ASA EoL EoS – what does EoL / EoS status of Cisco products mean, what does it mean for Cisco ASA lines and could be a replacement line of product?
I will not elaborate on how good or bad this idea is because that’s how the entire subscription world works, whether we like it or not. My post is intended for those who want to have a quick overview of Cisco SD-WAN licensing before they decide which way to go.