What do you understand by the term CYBERSECURITY? Novices may think about a group of hackers wearing masks of anonymous and breaking in a website to steal the data. This might be the scene and we are not denying it, but they might be hidden in plain sight. They may be people with who you […]
Cisco Meeting Server is a Secure on-premises Video Conferencing solution that is easy to configure and for that, you just need to have some understanding of CMS components. Most new users get confused with what all is required to know and configure. In this blog, we will cover the deployment models and basic configuration to set up […]
What Are Modern Applications? The applications which are loosely coupled, lightweight, easy to scale, designed to run on container-based platforms are known as modern applications. By using these types of applications, organizations can easily achieve availability, reliability, scalability, portability & security. Why Storage And Backup Play A Major Role In Modern Applications? The are many […]
ACI (Application Centric Infrastructure) and NX-OS (Nexus Operation System) both are the very advance technology which is mostly used in Cisco Nexus Switches in Data Center. With this technology, most of the customers are shifting from a legacy network to ACI and VXLAN concepts. As we know the VXLAN protocol overcomes this limitation by using […]
This blog post will give you a brief introduction to what Snort Engine is and most importantly enable you to understand what new features and changes you can expect in Snort Engine 3.0. This blog will not detail each new technical aspect of Snort Engine 3.0 as the team at Snort does it best. After […]
Earlier, we told you about the ultimate Antiware Solution named Symantec Endpoint Security. Whereas in this blog, our focus will be on the types of Symantec Endpoint Security Solutions, their features, and the differences between them. Symantec Endpoint Security Solution Symantec Endpoint Security is leading the market as the best Antimalware solution as it offers […]
There was a widespread data leak on the majority of brands and some of them are Big Basket, Twitter, Facebook, Dominos, Marriot International, Virgin Media, and Clearview AI. These are just some of the names but there were more victims whose data was exposed to the hackers. If the data is being compromised, then you […]
In this blog, we are going to discuss NTP working mechanism. NTP stands for Network Time Protocol and was introduced by David Mills in 1985. It is a layer 7 protocol that uses UDP port number 123. In today’s scenario, it plays a keen role to provide an identical time to all the networking devices […]
This blog is a continuation of our CISCO DNA CENTER WORKFLOW SERIES. Previously, we had explained about CISCO DNA WORKFLOW – DESIGN and CISCO DNA WORKFLOW – POLICY. In this part 3 of the series, we will cover 3rd pillar of the CISCO DNA CENTER WORKFLOW that is “PROVISION”. PROVISION We use Cisco DNA Center […]
SSL VPN (Secure Socket Layer Virtual Private Network) is used for RA (remote access) VPN. Previously there was SSL Version 1, SSL Version 2, SSL Version 3, now we have TLS (Transport layer security) version 1.0, version 1.1 and version 1.2 are available. We can say that TLS is a successor of SSL. SSL and […]