Menu

US Region

Grandmetric LLC
Brookfield Place Office
200 Vesey Street
New York, NY 10281
EIN: 98-1615498
Phone: +1 302 691 94 10

info@grandmetric.com

EMEA Region

GRANDMETRIC Sp. z o.o.
ul. Metalowa 5, 60-118 Poznań, Poland
NIP 7792433527
+48 61 271 04 43
info@grandmetric.com

Network & Wireless Blog for professionals

Over 45 thousand readers come back for our content every month!

 

03.2023

End-of-life for Cisco ASA 5500-X [Updated]

Cisco ASA EoL EoS – what does EoL / EoS status of Cisco products mean, what does it mean for Cisco ASA lines and could be a replacement line of product?

Author: Marcin Bialy
03.2023

Technological End of Life – what does it mean?

End-of-life (EoL) is a general term used when the vendor plans to cease the production of a certain product or product line. Taking into account that millions of end clients around the world might be using the product, the EoL comes with a group of milestones that all together form the End of Live of […]

Author: Marcin Bialy
Category:
02.2023

6 Ways to Secure Your Network & Users with Cisco Security

Investments in cyber-security are gaining importance more than ever before, and taking care of network security, access, users and data is no longer just a matter of responding to ad hoc threats when they appear. A new reality, where many processes happen virtually or in a cloud environment, requires proactive steps towards achieving effective protection […]

02.2023

Managing Cisco Catalyst Switches via Meraki Dashboard – Step-by-Step Guide

Migrating to a data & service cloud is a thing that resembles a gigantic cargo rolling stock gaining momentum. Its inception is already very far behind us, and currently we’re at a point, where this monstrosity of scrap metal has accelerated so much that it’s impossible to stop. It still picks up speed, grows stronger, […]

02.2023

Three Models of Cisco Umbrella Deployment

There is no need to convince anyone of the fact that phishing is one of the most widespread methods of attacks on enterprises. The Data Breach Investigation Report 2022 from Verizon shows that phishing is the second greatest (after login credential theft) threat for companies.  It’s worth asking yourself, is there a mechanism that preempts […]

Author: Marcin Bialy
Category:
12.2022

Next-generation firewall mechanisms for threat detection

Before the era of UTM (Unified Threat Management or next-generation firewall), we most often dealt with stateful firewall devices. The principle of operation of the stateful firewall is primarily operating on the headers of the third network layer (L3) and the fourth transport layer (L4) of the OSI model. Thanks to the understanding of headers […]

Author: Marcin Bialy
09.2022

Cisco Duo MFA Solution in Practice

According to Verizon in their 2022 report, over 82% of security incidents were related to human-side negligence, such as password leaks or phishing. Moreover, passwords being stolen have various lengths and degrees of complexity. Considering the scale and improvements in methods used by malicious actors, it’s not that difficult to see even a strong password […]

Author: Marcin Bialy
Category:
08.2022

Firewall Network Security – attack vectors

Why is it important to take a comprehensive approach to secure the Internet interfaces, instead of focusing on one area, e.g. a firewall?   In this article, we will take a shot at answering this question, showing potential Internet interfaces that can be critical in case of attack. You will learn what firewall network security is […]

Author: Marcin Bialy
08.2022

Security of wireless networks – how do hackers get in? 

When dealing with networks, both wired and wireless, we can’t fail to mention the security issue. In the case of wireless networks, many users are unaware of the hazards lurking when switching between networks and using unprotected, unverified wireless networks. This article will answer your questions on securing the Wi-Fi network and making it resistant […]

Author: Marcin Bialy
08.2022

LAN security and how it is hacked

To check whether a given IT infrastructure is resilient, and its LAN security strong, first, we need to run audits and penetration tests. While performing these, we use various protection breaching techniques to access the company’s resources. One of the basic tests is an attempt to obtain as much information as possible at a local […]

Author: Marcin Bialy
Load more
Show all
Grandmetric