How to Automate Your Network Security Audit in Minutes
A network security audit is a systematic evaluation of the security of a company’s information systems or network intermediary devices. The secureness of the network is evaluated using a few different sets of criteria, including measuring how well the devices conform to a set of…
Low Level Design document on the fly
Documentation is a critical part of any project or technical environment. If we don’t jot down some important information along the way, we end up repeatedly asking the same basic questions over and over again, completely draining our team members. We’ve heard from many team…
Export security policies from Juniper SRX
Juniper SRX is a wonderful firewall device with a lot of rich features. However sometimes the complexity of security policies may grow greatly with multiple embedded addresses or application objects, more virtual routing and forwarding instances, route leaks and so on. It can come to…
Instant Business-Level Network Analysis Reports
Overall state of the network often must be presented in condensed form to managers and non-it personnel. How can you create the reports focusing mostly on the risk and impact of the network state to users and applications?
Live Network Documentation
Not only network documentation takes a lot of time and effort to create, but it also becomes outdated as soon as you hit save and seems to always require an update at the time you need it most. So how can you document your network effectively?