Category Archives: Security

The Intelligent Way to Remain Vigilant Over Ransomware and the Latest Cyber Threats

Hackers are intelligent, quick on their feet and always willing to push the envelope when it comes to orchestrating attacks. Why would an enterprise use Information Technology that isn’t intelligent enough to keep up with modern hackers? Threat intelligence is so important when it comes to creating and implementing an IT security plan that shields… Read More »

Manipulate Routed Traffic With A Route-map

Manipulate Routed Traffic With A Route-map Sometimes.. when everything is failing, you’ll need to do some dirty hacks to get things the way you want. I’m going to show you how to modify the next-hop (where the packet is routed) with a route-map Let’s say you want to redirect web-traffic to a local cache running… Read More »

Cisco Adds Firepower to ASA Firewall

Cisco Adds Firepower to ASA Firewall When Cisco closed its deal to acquire Sourcefire for $2.7 Billion in October of 2013, it was made clear that there would be some integration of Sourcefire Firepower technology into the existing Cisco security portfolio. At the time of the acquisition, Cisco’s primary firewall platform was the ASA security… Read More »

SourceFire Licensing And How To Get License Key for FireSIGHT / Defense Center

SourceFire Licensing And How To Get License Key for FireSIGHT / Defense Center I am asked about Cisco Next Generation Security aka FireSIGHT licensing at least once a week. This post will explain the license options for Cisco FirePOWER and what is needed to request demo licenses to enable your demo system. NOTE: This is the current license… Read More »

Sourcefire Defense / FireSIGHT Center Overview

    Sourcefire Defense / FireSIGHT Center Overview Cisco acquired Sourcefire in 2013 as part of a strategic move to enhance Cisco’s security portfolio. Sourcefire’s catalog covers IPS/IDS, Application Security and Control, Firewalling, Malware Detection and a slew of open source tools such as SNORT, ClamAV, and Razorback. One key piece to the Sourcefire puzzle… Read More »

Threat defense: Cisco ASA firewall with FirePOWER services

Threat defense: Cisco ASA firewall with FirePOWER services (Part 1: Introduction) Cisco introduced its ASA firewall (adaptive security appliance) in May 2005 as a multifunction firewall and intrusion-prevention device. In the decade since then, Cisco ASA has become the go-to solution for small business network security. This is the first of three articles that will… Read More »

Sophos + Astaro: Good companies, bad deal

Sophos + Astaro: Good companies, bad deal This morning Sophos, the fourth largest Anti-virus company announced the acquisition of Astaro, the fourth largest UTM vendor.  Both companies are successful in their own segments of the IT security space. Both are growing. Both are innovative and arguably have great products.  But the combination of two good… Read More »

Generate New SID in Server 2012

Many of today’s Enterprise datacenters are running some form of virtualization. Server virtualization allows us to clone VMs. When it comes to Server 2012, the cloned VM with Server 2012 has duplicate copy of SID of machine from which it was cloned. The duplicate SID value causes lot of issues so each machine must have… Read More »

Firewall – Basic concepts

Firewall – Basic concepts A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices which is configured to permit or deny computer based application upon a set of rules and other criteria. Firewalls can be… Read More »

Firewall Technologies – ACLs

Firewall Technologies – ACLs Today there are many types of firewalls in existence, including packet-filtering, stateful, application gateway (proxy), address-translation, host-based, transparent, and hybrid firewalls. Modern network design must carefully include proper placement of one or more firewalls to protect those resources that must be protected while allowing secure access to those resources that must… Read More »