How to manage network security according to Cobit certification with IP Fabric platform
The Cobit stands for “Control Objectives for Information and Related Technology”. Primarily it was mainly focused on auditing, specifically helping financial auditors navigate IT environments. Now it is the leading framework for the governance and management of enterprise IT. It includes breadth of tools, resources and guidance. Its main value is in leveraging proven practices to inspire IT innovation and fuel business success.
Network Discovery Part 3 – it’s all about the documentation
Network documentation is a very complex and thorough topic – there are many guidelines, theories and even books that can help us with the process of creating and maintaining proper documents describing the network. The concept and execution may vary, but the purpose of the documentation should be unique – to represent the current state and settings of the network and all of the respective components.
IP Fabric Technical Product Demo
Today we will go through a quick demonstration of the IP Fabric platform and its main features. The IP Fabric platform is the network management system that helps companies to empower network engineers and teams to discover, verify, and document large scale networks within minutes.
How to manage network security according to ISO 27001 certification with IP Fabric platform
International standard or ISO 27001 certification is helping organizations to better understand network and security area administration. It also defines models for increasing network and security resilience and other features. The network infrastructure has become more and more important for many organizations. And nothing is…
How to Automate Your Network Security Audit in Minutes
A network security audit is a systematic evaluation of the security of a company’s information systems or network intermediary devices. The secureness of the network is evaluated using a few different sets of criteria, including measuring how well the devices conform to a set of…
Low Level Design document on the fly
Documentation is a critical part of any project or technical environment. If we don’t jot down some important information along the way, we end up repeatedly asking the same basic questions over and over again, completely draining our team members. We’ve heard from many team…
Export security policies from Juniper SRX
Juniper SRX is a wonderful firewall device with a lot of rich features. However sometimes the complexity of security policies may grow greatly with multiple embedded addresses or application objects, more virtual routing and forwarding instances, route leaks and so on. It can come to…
Instant Business-Level Network Analysis Reports
Overall state of the network often must be presented in condensed form to managers and non-it personnel. How can you create the reports focusing mostly on the risk and impact of the network state to users and applications?
Live Network Documentation
Not only network documentation takes a lot of time and effort to create, but it also becomes outdated as soon as you hit save and seems to always require an update at the time you need it most. So how can you document your network effectively?