Whether you’re an in-house IT professional or a managed service provider, ensuring the security and integrity of your networks is a crucial part of your bailiwick. In pursuit of greater security, Network Access Control (NAC) serves as a formidable guardian, ready to protect digital assets by regulating who gains entry to a network. Understanding the fundamental concepts and best practices of NAC is essential for any organization that values data security and network integrity.
Have you ever sat down and thought to yourself, “What’s new at Kentik?” Well, you’re in luck! Welcome to the first edition of a blog series to highlight the best and brightest of Kentik that month.
HAProxy Fusion 1.2 is now available, making it even simpler to adopt modern, scalable application delivery. New efficiencies, workflows, and form factors enable you to be more productive, use familiar tools, and explore powerful new use cases.
By 2030, the world will look very different, not in the least because of new technological innovations. Many will expect to see a proliferation of next-generation technological solutions from smart cities, to augmented reality, to autonomous cars, to the metaverse. Service providers have a role to play in ensuring that the underlying network that we have across the UK (and beyond) has the capacity and scalability to support these solutions.
A smooth business operation hinges on maintaining a robust and efficient network. Proactively identifying and addressing issues before they impact users is critical. Network monitoring plays a pivotal role, and a network monitoring dashboard is a key tool in the arsenal.
When the concept of Zero Trust emerged in 2010, it marked a sea change in how IT and network security are handled. The term, invented by Forrester Research analyst John Kindervag, is loosely based on the “never trust, always verify” motto. So why is this a sea change? Before 2010, IT focused on perimeter defenses and the concept of DMZs — areas of the network they deemed safe based on the protection they implemented.
Is there a gap between the potential of network automation and widespread industry implementation? Phil Gervasi explores how the adoption challenges of network automation are multifaceted and aren’t all technical in nature.