Integration with the Operational Ecosystem
In every product conversation and demonstration, we are always at pains to point out that we discover and curate an incredible wealth of network data in our platform. That data is then available for you to query and visualise through the Web UI. And we…
Version 3.7.0: Enhanced security model and reducing friction for automation workflows
To grasp any technology in a standard manner, first the right command set has to be found. The command set provides initial ingredients in raw form, which have to be processed. The processing extracts and structures the variables in a unified network model. This is…
10 ways to make your network run more smoothly
If I were to say that you could:
– Identify BGP peering instability;
– Spot Single Points of Failure;
– Verify end-to-end QoS
– Track down OSPF area inconsistencies
– Align FHRP and Spanning Tree
– Troubleshoot multicast forwarding
– Look for firewall bypass scenarios
– Identify 802.1X configuration issues
– Find end-of-life equipment
– Spot where users are having wireless woes
and without having to write Python scripts, Ansible playbooks and DIY, what would you say?
Curing Wireless Woes
As more organisations adapt their working practices to cope with an unpredictable office situation, so wireless networking becomes ever more important to allow access to networked services. Pervasive mobility is the name of the game with hot-desking and working from home being the requirements for…
Managing Network End of Life
Managing the lifecycle of your network equipment is a vital part of maintaining the security of your IT environment. Being able to verify that the equipment which underpins your IT is supportable, maintainable and replaceable should it fail is fundamental. But so few organisations really…
Declaration of Intent!
After presenting IP Fabric at Networking Field Day 23, a number of Twitter threads started probing at the idea of Intent-Based Networking (IBN) – is it simply a marketing term that vendors use to sell more gear or does it have a deeper meaning? And…
Can You Handle the Truth?
A lively debate sparked up after Networking Field Day 23, where we presented IP Fabric to a panel of delegates and hundreds of eager online viewers. Could we class our solution as a “Source of Truth” for the network? The conclusion was “Yes”. And “No”….
IP Fabric Raises $4.1 Million In Series A Funding Round
Senovo and Presto Ventures lead the round, scaling IP Fabric’s operations and market reach, as the company grows 350% in year over year monthly recurring revenue. Prague, Czechia – Sep. 22, 2020 – IP Fabric, the leading provider of network assurance and intent-based network analytics…
Verifying 802.1X configuration
Why 802.1X? There was a time when networks were secure islands, used to connect PCs to services they consumed and each other. The network was protected from the outside world by a perimeter firewall: there was only one way in and out. With the explosion…
Stopping Firewall Bypass Attempts
A network user – a senior manager in the business, in the process of writing a heavy report – knocks on the door of the security team’s office. He has an urgent request, to access a server that sits behind a firewall. He speaks to…