Cisco ISE is a solution designed for controlling the secure network access policy and thus, the organization’s critical resources. It’s a single point providing information on events related to the connection of devices and users to the network. ISE is much more than a concept of complementary security and an “intuitive” network, but we’ll get […]
Zero Trust, the concept of securing services and devices based on an implicit lack of trust, which can be applied to Industry 4.0, is a subject that is used in all cases in IT. It may seem that there is no longer a company, that does not use Zero Trust’s complete approach to security. However, the reality is not so bright. What problems and challenges does Industry 4.0 pose in terms of security? We will provide answers to these questions below. They will be based on visible trends in the manufacturing industry, as well as lessons learned from Grandmetric’s safety audits.
I am presenting a video showing how Duo can be used as second factor authentication (push app notification in this case) for VPN remote access connections.
In following post I will discuss the concept of Identity based networking and its components based on Cisco Systems products. Then I will show the steps how to build functional network where pxGrid is one of the core protocols used.
On 8th of October 2019 we hosted first event from the new series: Tech Meeting Series. The conference cycle is intended for IT departments, engineers and IT managers who want to follow latest technology trends, want to talk about the technology with others, share experience and look for solutions best suitable for their organizations.
We are very proud to announce that Grandmetric successfuly delivered the first Software-Defined production network in quarter 1 2019 for Pfeifer & Langen Polska S.A. The implementation was part of network and IT operations optimization project for one of the largest sugar manufacturer in this part of Europe.
Recently i was asked to advise in the following scenario: VPN tunnel between AWS VPC and Cisco IOS routers on DC prem. Nothing sophisticated but: Two ISR 4k, HSRP VPN redundancy, legacy crypto maps in production (several working vpns) and Static VTI (AWS). Two Crypto structures sourced from one HSRP. I have put the results on blog.
Often, during meetings with clients, network engineers and security specialist there is following question posed: “What firewall product best suits their environment and which one is the best currently on the market?” Like almost always the answer could be “Well, it depends” …
No matter the attack is original Petya worm or it’s modified version (already called NotPetya), the fact is that it hits biggest brands starting at Ukraine government, Chernobyl power station continuing with Raben, Maersk or St Gobain. So yes, it is disruptive. What we know so far and how we can try to prevent if […]
We have just announced the Cisco ASA Deep Dive training series. We’re going to dive in firewalling techniques and here is what you will learn: Rules and differences between FW Statefull, UTM and NGFW You’ll configure PAT, NAT, ACL, MPF, ROUTING, Anyconnect VPN RA, VPN Site to Site, Easy VPN HW, HA and more You’ll […]