Cisco is introducing intelligent switches (the Smart Switches series). This isn’t just the next step after the Catalyst 9200 and 9300. According to the manufacturer, it’s a completely new approach to designing enterprise networks. In this article, we’ll show how Smart Switches differ from traditional models and what this means for IT engineers and managers. […]
Imagine this scenario… You have Cisco 2960X switches in your network. It’s the middle of the week. Your company’s IT department is working on an important project. Suddenly – boom! – the network in a key branch goes down. Troubleshooting reveals: switch failure. You call manufacturer support… and are told: “We’re sorry, but this model […]
Modern public institutions rely on complex IT infrastructure to function. Hospitals, offices, and local government units all provide public services and store vast amounts of data. Therefore, implementing new IT infrastructure in the public sector must ensure the highest level of cybersecurity and business continuity. Meanwhile, cyberattacks on the public sector in Poland are becoming […]
Understanding IP addressing, network masks, and subnetting is essential for anyone working with computer networks. In this guide, we’ll cover the fundamentals of IP addresses, subnet masks, address ranges, and how to design efficient IP addressing plans. What is an IP address and network mask? Every IP device with an IP address operates inside a […]
A firewall is a key component of an IT security infrastructure. But even the best hardware and most advanced features won’t protect your network if they’re misconfigured. In reality, most threats stem not from a lack of a firewall, but from its incorrect use. In this article, we examine the most common firewall configuration errors, […]
The IEEE 802.11ax standard, widely known as Wi-Fi 6, has been with us since 2019. Not long after, first wireless devices have been launched by vendors on the global market. But as with every technology, time has to pass before businesses gain the option to choose from a rich portfolio of competitive devices that use […]
Cisco ASA EoL EoS – what does EoL / EoS status of Cisco products mean, what does it mean for Cisco ASA lines and could be a replacement line of product?
Investments in cyber-security are gaining importance more than ever before, and taking care of network security, access, users and data is no longer just a matter of responding to ad hoc threats when they appear. A new reality, where many processes happen virtually or in a cloud environment, requires proactive steps towards achieving effective protection […]
Many people wonder why good design and implementation of corporate LAN and Edge features is necessary. There are many answers to this simple question and among them, we require a good network to be least vulnerable to unwanted intrusions along with it to be able to support all our requirements. We have compiled a list that you […]
I am presenting a video showing how Duo can be used as second factor authentication (push app notification in this case) for VPN remote access connections.