Menu

US Region

Grandmetric LLC
Brookfield Place Office
200 Vesey Street
New York, NY 10281
EIN: 98-1615498
Phone: +1 302 691 94 10

info@grandmetric.com

EMEA Region

GRANDMETRIC Sp. z o.o.
ul. Metalowa 5, 60-118 Poznań, Poland
NIP 7792433527
+48 61 271 04 43
info@grandmetric.com

Network & Wireless Blog for professionals

Over 45 thousand readers come back for our content every month!

 

12.2022

Next-generation firewall mechanisms for threat detection

Before the era of UTM (Unified Threat Management or next-generation firewall), we most often dealt with stateful firewall devices. The principle of operation of the stateful firewall is primarily operating on the headers of the third network layer (L3) and the fourth transport layer (L4) of the OSI model. Thanks to the understanding of headers […]

Author: Marcin Bialy
08.2022

Firewall Network Security – attack vectors

Why is it important to take a comprehensive approach to secure the Internet interfaces, instead of focusing on one area, e.g. a firewall?   In this article, we will take a shot at answering this question, showing potential Internet interfaces that can be critical in case of attack. You will learn what firewall network security is […]

Author: Marcin Bialy
08.2022

Security of wireless networks – how do hackers get in? 

When dealing with networks, both wired and wireless, we can’t fail to mention the security issue. In the case of wireless networks, many users are unaware of the hazards lurking when switching between networks and using unprotected, unverified wireless networks. This article will answer your questions on securing the Wi-Fi network and making it resistant […]

Author: Marcin Bialy
08.2022

LAN security and how it is hacked

To check whether a given IT infrastructure is resilient, and its LAN security strong, first, we need to run audits and penetration tests. While performing these, we use various protection breaching techniques to access the company’s resources. One of the basic tests is an attempt to obtain as much information as possible at a local […]

Author: Marcin Bialy
07.2022

Wireless Network Security – How to Design Enterprise Wi-Fi?

In today’s post, we’ll cover the planning, design, and building of professional, Enterprise-grade wireless networks, i.e. advanced wireless networks. We’ll touch on the selection of equipment and components used in these professional networks. We’ll also review Wi-Fi access network protections in tandem with a component called Cisco ISE, which plays a role of a hub for […]

07.2022

Cisco ISE – What is Identity Service Engine?  

Cisco ISE is a solution designed for controlling the secure network access policy and thus, the organization’s critical resources. It’s a single point providing information on events related to the connection of devices and users to the network.  ISE is much more than a concept of complementary security and an “intuitive” network, but we’ll get […]

03.2022

Cyber Security Audit: Why Your IT Department Should Not Fear It 

A cyber security audit is often the first step to ensuring the security of your business, especially when most employees work remotely. An audit is the starting point for building a continuous safety improvement process in the company. The process starts with non-invasive testing of specific resources in the infrastructure and checking these against given […]

02.2022

The benefits of Nutanix hyperconvergence

Roughly speaking, an administrator will have around 10 interfaces to use to keep the system running. It all takes time. Hence, it is convenient to manage all elements of the system from one place.

Author: Grandmetric
Category:
01.2022

Will Zero Trust answer the problems and challenges of safe factories?

Zero Trust, the concept of securing services and devices based on an implicit lack of trust, which can be applied to Industry 4.0, is a subject that is used in all cases in IT. It may seem that there is no longer a company, that does not use Zero Trust’s complete approach to security. However, the reality is not so bright. What problems and challenges does Industry 4.0 pose in terms of security? We will provide answers to these questions below. They will be based on visible trends in the manufacturing industry, as well as lessons learned from Grandmetric’s safety audits.

Author: Marcin Bialy
09.2021

What can you learn from an ICT security audit?

Online data privacy and security is a particularly important topic when most of us work remotely. There are plenty of traces that we leave behind on the Internet, and we encounter cybercrime on a daily basis. We should, therefore, consider how we can protect ourselves against the loss of both personal data and key company information. The ICT audit is a certain component of the entire security policy. It is most often carried out in order to prevent threats that may occur in the future.  

Author: Marcin Bialy
Category:
Load more
Show all
Grandmetric