Menu

US Region

Grandmetric LLC
Lewes DE 19958
16192 Coastal Hwy USA
EIN: 98-1615498
+1 302 691 94 10
info@grandmetric.com

EMEA Region

GRANDMETRIC Sp. z o.o.
ul. Metalowa 5, 60-118 Poznań, Poland
NIP 7792433527
+48 61 271 04 43
info@grandmetric.com

UK

Grandmetric LTD
Office 584b
182-184 High Street North
London
E6 2JA
+44 20 3321 5276
info@grandmetric.com

  • en
  • pl
  • Network & Wireless Blog for professionals

    Over 45 thousand readers come back for our content every month!

     

    Next-generation firewall mechanisms for threat detection

    Before the era of UTM (Unified Threat Management or next-generation firewall), we most often dealt with stateful firewall devices. The principle of operation of the stateful firewall is primarily operating on the headers of the third network layer (L3) and the fourth transport layer (L4) of the OSI model. Thanks to the understanding of headers […]

    Date: 01.12.2022

    Author: Marcin Bialy

    Cisco Duo MFA Solution in Practice

    According to Verizon in their 2022 report, over 82% of security incidents were related to human-side negligence, such as password leaks or phishing. Moreover, passwords being stolen have various lengths and degrees of complexity. Considering the scale and improvements in methods used by malicious actors, it’s not that difficult to see even a strong password […]

    Date: 20.09.2022

    Author: Marcin Bialy
    Category:

    Firewall Network Security – attack vectors

    Why is it important to take a comprehensive approach to secure Internet interfaces, instead of focusing on one area, e.g. a firewall?   In this article, we will take a shot at answering this question, showing potential Internet interfaces that can be critical in case of attack. You will learn what firewall network security is and […]

    1
    Date: 29.08.2022

    Author: Marcin Bialy

    Security of wireless networks – how do hackers get in? 

    When dealing with networks, both wired and wireless, we can’t fail to mention the security issue. In the case of wireless networks, many users are unaware of the hazards lurking when switching between networks and using unprotected, unverified wireless networks. This article will answer your questions on securing the Wi-Fi network and making it resistant […]

    Date: 08.08.2022

    Author: Marcin Bialy

    LAN security and how it is hacked

    To check whether a given IT infrastructure is resilient, and its LAN security strong, first, we need to run audits and penetration tests. While performing these, we use various protection breaching techniques to access the company’s resources. One of the basic tests is an attempt to obtain as much information as possible at a local […]

    Date: 01.08.2022

    Author: Marcin Bialy

    Wireless Network Security – How to Design Enterprise Wi-Fi?

    In today’s post, we’ll cover the planning, design, and building of professional, Enterprise-grade wireless networks, i.e. advanced wireless networks. We’ll touch on the selection of equipment and components used in these professional networks. We’ll also review Wi-Fi access network protections in tandem with a component called Cisco ISE, which plays a role of a hub for […]

    Date: 25.07.2022

    Cisco ISE – What is Identity Service Engine?  

    Cisco ISE is a solution designed for controlling the secure network access policy and thus, the organization’s critical resources. It’s a single point providing information on events related to the connection of devices and users to the network.  ISE is much more than a concept of complementary security and an “intuitive” network, but we’ll get […]

    Date: 18.07.2022

    Pentesting, or how to take care of cyber security

    Spectacular bank robberies with a gun in hand and a stocking on the face are history. Modern criminals moving into cyberspace use much more sophisticated ways to make a profit. If we do not focus on regular pentests and do not take care of the proper security of the website or network edge, we can […]

    Date: 31.03.2022

    Category:

    Cyber Security Audit: Why Your IT Department Should Not Fear It 

    A cyber security audit is often the first step to ensuring the security of your business, especially when most employees work remotely. An audit is the starting point for building a continuous safety improvement process in the company. The process starts with non-invasive testing of specific resources in the infrastructure and checking these against given […]

    Date: 30.03.2022

    The benefits of Nutanix hyperconvergence

    Roughly speaking, an administrator will have around 10 interfaces to use to keep the system running. It all takes time. Hence, it is convenient to manage all elements of the system from one place.

    2
    Date: 07.02.2022

    Author: Grandmetric
    Category:
    Load more
    Show all
    Grandmetric