The Impact of IP Access Control Lists on Firewalls & Routers

October 30, 2018

The volume of cyber attacks and threat indicators is massive and continues to grow.  As a result, more organizations are leveraging threat intelligence to improve cyber defense.  However, there is a significant challenge in putting threat intelligence into action because firewalls and routers were not built to effectively and efficiently handle the massive volume of known threat indicators.

Spotlight

Sentek Global

Sentek Global is the firm of choice for spearheading and supporting government and commercial IT programs. From IT security, acquisition, program management and consulting services to command and control system engineering, we have the talent and dedication to see your project through and solve your most complex strategic technical issues on time and within budget.

OTHER WHITEPAPERS
news image

Transport Networks for 5G

whitePaper | August 27, 2023

5G deployments continue their upward trend and will soon be the dominant mobile wireless protocol deployed in North America. The ecosystem is gathering valuable information from these deployments, and one area of focus is the transport network. As part of 5G’s evolution, key architecture components are being separated and distributed to the cloud in ways that make 5G more scalable and flexible. Meanwhile, bandwidth demands continue to increase at the same time applications and services require low latency. New requirements are presented to the transport network at each step of an operator’s 5G journey. The transport infrastructure of today must be flexible to adapt to upcoming requirements as it enables new architectures, tools, and ultimately, 5G networks innovation, monetization, and performance. The fundamental goal of the 5G transport network is to deliver transparent connectivity that allows both present and future functions to work together seamlessly.

Read More
news image

Dell PowerScale: Network Design Considerations

whitePaper | April 25, 2022

This document provides design considerations for understanding, configuring, and troubleshooting Dell PowerScale scale-out NAS external networking. In a scale-out NAS environment, the overall network architecture must be configured to maximize the user experience. Many factors contribute to overall network performance. This document examines network architecture design and best practices, including factors such as latency, flow control, ICMP, MTU, jumbo frames, congestion, TCP/IP parameters, and IPv6.

Read More
news image

Top Ten Considerations for Your Nextgeneration SD-WAN

whitePaper | September 7, 2022

The need for organizations to change to meet evolving business environments is not a new concept. However, what is new in our current moment is the pace of change. Organizations across all industries now have to adapt to a rapidly evolving IT and application environment. These changes have been accelerated by a global pandemic that is forcing employees to work remotely and by the adoption of modern applications that are distributed across corporate data centers, multiple public clouds, and increasingly, edge locations. Unfortunately, both of these efforts create more IT complexity.

Read More
news image

Streamline PCI Compliance with the Aruba CX10000 Distributed Services Switch

whitePaper | February 28, 2023

The Aruba CX 10000 Distributed Services Switch with embedded AMD Pensando DPUs offers organizations an option to implement effective network segmentation by applying stateful firewall inspection policies at the switch port level, without having to route traffic to an external firewall for inspection. The Aruba CX 10000 is designed for securing East-West traffic and providing effective isolation for individual hosts or groups of hosts in the same rack even when those hosts are in the same L2 broadcast domain. This capability can be leveraged for minimizing the scope of Payment Card Industry Data Security Standard (PCI DSS) compliance as well as for meeting multiple PCI DSS requirements. The ability to implement segmentation at the port or host level ultimately reduces the cost and operational burden required to achieve and maintain PCI compliance, as well as validate compliance annually

Read More
news image

6G Drivers and Vision

whitePaper | April 19, 2021

The 5G vision, outlined in successive NGMN White Papers [1,2] sets out a framework for enabling digital transformation for society and across industry, with a wide range of use cases and associated requirements. Commercial deployments of 5G are now progressing around the globe, delivering new capabilities and improved performance for customers. For Mobile Network Operators (MNOs), a set of features that underpin 5G, including disaggregation, softwarization, cloud-native design and operation, autonomous and distributed computing and intelligence, and a multiaccess composable core, are enabling new technologies and business models.

Read More
news image

How To Achieve Secured Wired and Wireless Networks

whitePaper | May 1, 2022

The access layer offers the broadest attack surface in an enterprise’s network. It supports all network connectivity (via both wired Ethernet switches and wireless access points) for employees, contractors, and guests—as well as Internet-ofThings (IoT) devices. With ever-increasing numbers of devices connecting to networks each day, ensuring access layer security becomes a critical need. And with remote working becoming a new standard during the COVID-19 pandemic (and even beyond), proper security to mitigate access layer attacks has never been more important.

Read More

Spotlight

Sentek Global

Sentek Global is the firm of choice for spearheading and supporting government and commercial IT programs. From IT security, acquisition, program management and consulting services to command and control system engineering, we have the talent and dedication to see your project through and solve your most complex strategic technical issues on time and within budget.

Events