Introduction to Cisco Network Assistant (CNA) Cisco Network Assistant/ CNA is an application designed for Windows PC in order to manage networks. It is designed to be compatible with wired and wireless networks and Small-Medium sized organizations. Cisco Network Assistant …
Introduction to CASB Solutions CASB (Cloud Access Security Broker) is an intermediary between cloud users and cloud applications. CASB solution is a software/hardware application that is located inside the network or works as a cloud-native application. Cloud access security broker …
Introduction to Observium The term “Observium” is defined as a network monitoring platform with low-maintenance and auto-discovering characteristics. It is designed to support a wide range of technology devices, operating systems and platforms such as Microsoft Windows, Linux, Cisco, Dell, …
Introduction to PRTG Network Monitor Infrastructure monitoring and management is one of the most essential activity in IT operations. One such famous and widely preferred Networking monitoring tool is PRTG. PRTG is defined as “Paessler Router Traffic Grapher”. It is …
If you are an uprising individual Developer or Software company start-ups, you must have heard about the Oracle Partner Network. Are you new to this revolution? Wondering what is Oracle Partner Network? Here is the complete guide to the Oracle …
Introduction to Cryptography Cryptography is crypto + graphy, where “crypto” means “hidden” or “secret” and “graphy” means “to write”. Cryptography is a technique through which the information/data is communicated securely/secretly. This technique is irreplaceably essential in the present world of …
Introduction to Network Discovery Network administrators are required to manage the LAN and WAN edge devices for the companies. In addition to technical skills in the domain, some tools and utilities are key to manage the whole IT setup. One …
Introduction to Packet Capture “Packet Capture” is defined as network interception of a data packet that is traversing a specific point through a data network. These kind of packets are captured using appropriate tools in real time which are stored …
Introduction to BPM Tools Are you tired of managing your business process? Are you looking for reliable and cost-effective Business Process Management software or applications? You are in the right place. Today in this article, you can see the some …
The massive growth and expansion of World trade and customers make it difficult to manage and control the business process. Business owners aim to produce quality goods by reducing the total cost. It needs effective management leading the demand for …
Introduction In this article, we will discuss what is a web server? Its types, use and examples. The term “Web Server” is defined as a server software or hardware that is designed to handle client requests on the World Wide …
Introduction Physical distance lost its value in today’s virtual world. You’re holding the vast world in your hand now; all these are possible only because of the computer networks designed by the number of network Architect. What do they do, …
Introduction We use hundreds of software daily; have you ever wondered how they create software? There are various methods of Software Developments. Today in this article, you will get a basic understanding of the Agile SDLC method and its pros …
Introduction to Google Account Security Nowadays, for a user it is mandatory to create a Google Account, in order to use the Gmail, Google Hangouts, Google Meet and Blogger Applications or Web Site Services. On the other hand, a Google …
Meet Me Room (MMR), is also known as ENI (External Network Interface) or MDA (Main Distribution Area) is a small but very important space inside the data center, where the ISP connect with one another and exchange data before distribution …
Introduction The introduction of cloud and Software Defined technologies have boosted many young tech aspirants to pursue the Computer Network career. But they are confused mostly with the odd terms that resemble one another. Today in this article, you will …
Introduction The technical progress in the IT field made the acronyms like UI, AWS, and CRM familiar to laymen. And they defined new meaning to the words – tools, cloud, and Architect. IT Architect is not someone who works on …
Introduction Today’s wide world industries have been introducing new acronyms to our dictionary. And it is really hard to know the meaning of them as different industries and sectors define them in their way. The tremendous advancement in the IT …
Overview In our previous article, we studied IPSec VPN Set Up. In this article we will run through CLI commands and GUI steps to configure an IPSec VPN, including the tunnel and route configuration on a Palo Alto Networks firewall. …
Introduction Palo Alto GlobalProtect is a network security for endpoints that protects mobile workforce by extending the Next-Generation Security Platform to all users geographically anywhere. GlobalProtect secures traffic by applying security policies with Palo Alto next-generation to the application. GlobalProtect …
Introduction The tremendous technical development in the IT and other digital fields started the popular trend of creating acronyms with the Suffix Ops. And the word DevOps, NetOps, and SecOps are confusing IT and Tech communities further as they are …
Introduction to Palo Alto Panorama Panorama is the centralized management server that offers a global visibility and control over the multiple Palo Alto Networks next generation firewalls from web interface console. Panorama manage multiple Palo Alto Networks firewalls all from …
Introduction to MPLS MPLS i.e. Multi Protocol Label Switching (MPLS). It is a technique that is used for the routing of network packets. It is called a Multiprotocol as it supports multiple protocols like Internet Protocol (IP), Asynchronous Transport Mode …
Introduction Palo Alto has been considered one of the most coveted and preferred Next generation Firewall considering its robust performance, deep level of packet inspection and myriad of features required in enterprise and service provider domain. When troubleshooting network and …
High availability (HA) refers to a system or component that is operational without interruption for long periods of time. High availability (HA) is measured as a percentage, with a 100% percent system indicating a service that experiences zero downtime. High …
Introduction to Network Switching Before understanding Message Switching, let’s explore the basic types of switching. Switching is an important mechanism that provides communication between different networks or different computer(s) and manages the data flow between the two end points. There are …
Before digging deep into Palo alto SSL Decryption, let’s first understand what is Decryption? Decryption Palo Alto firewalls can be decrypt and inspect traffic to gain visibility of threats and to control protocols, certificate verification and failure handling. Decryption can …
LOOKING FOR A JOB IN CLOUD COMPUTING? Check out the Top Cloud Computing Certifications Today’s tremendous growth in Information Technology (IT) proves the importance of Cloud Computing. Industrialists say “the cloud computing is in the starting phase and expected to …
Site-to-Site VPN Overview A VPN connection that allows you to connect two Local Area Networks (LANs) securely is called a site-to-site VPN. Route based VPN can be configuring to connect Palo Alto Networks firewalls located at two sites or to …
In this article, we will understand the terminologies related to USER ID and their role w.r.t login monitoring, role discovery and related nuances. USER ID : PALO ALTO NETWORKS User Identification is a very unique feature of Palo Alto firewall …
Below are the key profile types provisioned in Palo Alto Firewall. Lets discus all the profile types one by one – Palo Alto Security Profiles & Security Policies While security policy rules enable to allow or block traffic in network, …
In this article, we will discuss on Packet handling process inside of PAN-OS of Palo Alto firewall. Introduction: Packet Flow in Palo Alto Packet passes through the multiple stages such as ingress and forwarding/egress stages that make packet forwarding decisions on …
In the previous post we discussed the Architecture of Palo alto firewall. Now, we will discuss the NAT configuration and NAT types in Palo alto. Network Address Translation (NAT) allows to translate private, non-routable IP addresses to one or more …
Introduction to Spoofing Today, in the cyber security community “spoofing” is called as any fraudulent or malicious practice in which communication is established from an unknown source, usually disguised as a known source to the receiver. In order to understand …
Network architecture refers to the structured approach of network, security devices and services structured to serve the connectivity needs of client devices, also considering controlled traffic flow and availability of services. Network devices typically include switches, routers and firewalls. Palo …
Hybrid Cloud vs Multi Cloud In recent years, with mushroom growth in Cloud technologies, a change has been observed w.r.t where the application Workload and data is hosted. A large number enterprises have started moving their data, applications and related …
Introduction to Palo Alto Firewall is a network security device that permit or denies network access to traffic flows between an untrusted zone and a trusted zone. Palo Alto Firewall is one of the globally coveted and widely preferred Security …
Cloud Architect: Skills & Responsibilities With Cloud technologies showcasing a mushroom growth in the IT world and all the types of organizations (whether financial, manufacture or retail etc) moving the workloads to cloud, buffet of new roles and responsibilities have …
Enterprise Architect vs Solution Architect There are some key IT roles in organizations which focus on strategic and technology related aspects across their breadth and depth. Two such technical roles are of Enterprise Architect and Solutions Architect. While the former …
Difference Between MD5 and CRC MD5 and CRC are 2 of most commonly used hashing algorithms, infact while comparing files and including other use cases. In this article. We will understand both the concepts of hashing algorithm and how one …
Blockchain (Bitcoin Cryptocurrency) Technology Blockchain can be understood as “block of chains”, where the records or blocks are linked by cryptography. Each block (record) has a cryptographic hash of previous block (including a timestamp, and transaction data). Blockchain was introduced …
Business Process Management (BPM) Business process management (BPM) is a regulation that uses different tools and methods to design, model, execute, monitor, and enhance business processes. A business process correlates the behavior of people, systems, information, and things to bring …
Difference between Agile and DevOps (Agile vs DevOps) What is Agile Methodology? Agile methodology points to a software development methodology consolidated to the idea of repetitive development, where requirements and solutions develop through fraternizing between self-organizing and cross-functional teams. The utmost …
Cloud Engineer vs DevOps Engineer Cloud has changed the way how we do Business. Cost savings have led the IT assets, especially compute Infrastructure migration to Cloud. Accompanied by this move, there have been buffet of new roles which have …
Hyper Converged Infrastructure (HCI) Vs Converged Infrastructure (CI) Hyperconvergence has been at the forefront of customer demand nowadays. Underpinned by virtualization technology, Hyperconvergence is gradually making strong hold in the IT world. In this article, we will talk through 2 …