Skip to main content

Resources

Home > Resources

Umbrella SIG: A Field Guide to Protecting Remote Users

The Problem Here’s the situation – you have a group of users who work a hybrid schedule.  One of the users, while working at home, gets malware from a compromised website.  That malware-infected PC gets taken back to the office and put on the corporate network, whereupon the malware now can try and spread to […]

Supporting Work From Home Users with Cisco ThousandEyes

A powerful network monitoring solution that takes your troubleshooting up a notch. The Problem If you’re supporting a large remote workforce, you’ve had an executive call on Monday morning to say: “I joined a meeting over the weekend and audio quality was terrible. Can you make sure it doesn’t happen again?” Pre-pandemic, it may have […]

Using Ansible to Tackle Shadow IT Programmatically

Scripting with Ansible and Python How to Find Rogue, Unmanaged Devices Client Issue  A client came to us with a complicated global network environment of engineers, developers, and executives. They were facing the same issues that many larger companies with multiple IT departments and variable infrastructure face – non-uniformity, rogue devices, poor historical reporting, security […]

Zero Trust in the Campus

When looking at what the major risks are to the security and functionality of IT infrastructure, near the top is access to that infrastructure.  Being able to ensure that only authorized devices and users can connect to the network is one of the most effective ways of protecting your infrastructure and data.  Users who pick […]

Zoom and Cisco Room Kit One Button to Push

Solving a persistent problem between two meeting clients The Problem A client recently came to us with an issue they were having with their suite of various models of Cisco Cloud registered Room Kit systems. Zoom and WebEx are both utilized for their meeting clients.  They were able to use the one button to join […]

Zero Trust in the Datacenter: Machine to Machine Security

How Machine to Machine security differs from User to Machine Now that we’ve looked at user to machine security in the datacenter, it’s time to look at machine to machine security (also known as east-west security).  The goals of machine to machine security are going to be quite different than user to machine security, and […]

Zero Trust is a Philosophy, Not a Product or Plan

One of the current trends in IT security that gets a lot of press and discussion is the idea of zero trust.  Zero trust, however, is really a philosophy, not a plan of action.  Specifically, zero trust is the philosophy that all IT resources, whether internal or external, should be treated as untrusted or even […]

Interop Cisco Unified Call Manager with Microsoft Teams

A common topic of conversation with our Cisco Call Manager (“CUCM”) customers has been whether or not Microsoft Teams can act as a softphone for CUCM. The answer is … sort of. Let’s look at the process of getting this working. First and foremost, at the time of this writing, calling from CUCM to MS […]

Navigating RESTCONF for Cisco Network Engineers

Navigating RESTCONF for Cisco Network Engineers In both my personal education and in work projects, there’s been a slow but steady move into network automation. This document is written from the angle of a network engineer, and as such, the document approaches the topic from the angle of moving from the CLI to a true […]