Tech Corner / Cisco Security
by PivIT Global on Aug 2, 2022 7:01:00 AM
Securing the network is one of the most important tasks every engineer must consider to provide a safe networking environment. Although this task mainly focuses on protecting the network from outside attacks, such as from the internet, it also involves protection against less threaten …
by PivIT Global on Jul 12, 2022 7:01:00 AM
According to the Identity Theft Resource Center's Report, data breaches in 2021 increased by 68 percent, which equated to a record-breaking 1862 breaches. There's no wonder network security is top of mind across all business sectors.
by PivIT Global on May 26, 2022 7:21:57 AM
A Dynamic Host Configuration Protocol (DHCP) in a network is a common approach to allocating IP information dynamically to clients as they shift from one network to another within an enterprise.
by PivIT Global on Apr 4, 2022 7:26:18 PM
The rapid change in the business landscape--especially in 2020 and 2021--transformed applications and provisioning environments. Your employees and users can now use recent technologies like microservices, containers, and APIs to align themselves with the pace of business changes.
by PivIT Global on Apr 4, 2022 6:30:53 PM
Welcome to Part 2 of the Cisco Adaptive Security Appliance (ASA) firewall active/standby configuration guide! In this article, we will focus on the deployment of the Cisco ASA firewall. The active/standby feature, as discussed in Part 1 of this series, has one simple goal: to provide …
by PivIT Global on Apr 4, 2022 6:25:39 PM
A firewall is a primary device that is used to provide security features in a network, although other complimentary devices such as an Intrusion Prevention System (IPS), Cisco Email Security Appliance (ESA), Cisco Web Security Appliance (WSA), and Cisco Identity Services Engine (ISE) …
by Darin Knobbe on Jul 1, 2021 4:13:53 PM
For over the last thirty years, the firewall has been the foundation of an organization’s network security strategy. It was designed based on the concept that internal traffic and users were inherently trustworthy, and outside traffic was not, thus building a trust boundary – or perim …
by Darin Knobbe on May 27, 2021 1:00:00 PM
The world is rapidly changing. The demands of everywhere mobility, evolving IoT, cloud adoption, and rapidly advancing security threats make IT managers rethink how their networks are designed and implemented. Much like IT managers having to rethink their networks, OEMs are doing thei …