Found 67 bookmarks
Newest
SSE et SASE : quelle est la différence ?
SSE et SASE : quelle est la différence ?
Découvrez la différence entre SASE (Secure Access Service Edge) et SSE (Security Service Edge) dans cet article qui les compare.
·catonetworks.com·
SSE et SASE : quelle est la différence ?
Security Architecture Review Of A Cloud Native Environment
Security Architecture Review Of A Cloud Native Environment
Overview Due to its massive adoption, cloud computing has become a critical component for every enterprise. A large number of organisations want to migrate to the cloud, however, its security posture
·claranet.com·
Security Architecture Review Of A Cloud Native Environment
Traditional Azure networking topology - Cloud Adoption Framework
Traditional Azure networking topology - Cloud Adoption Framework
Learn about key design considerations and recommendations surrounding traditional network topologies in Microsoft Azure to ensure robust and efficient connectivity across virtual networks.
·learn.microsoft.com·
Traditional Azure networking topology - Cloud Adoption Framework
AWS Architecture Design: A Start-up case study
AWS Architecture Design: A Start-up case study
I came across an interesting scenario about a start-up looking to migrate their existing application onto cloud (AWS in this case). This blog post outlines my take on the solution. Feedback is welcome!
·thetecktalk.com·
AWS Architecture Design: A Start-up case study
Security Architecture Review Of A Cloud Native Environment
Security Architecture Review Of A Cloud Native Environment
Overview Due to its massive adoption, cloud computing has become a critical component for every enterprise. A large number of organisations want to migrate to the cloud, however, its security posture
·notsosecure.com·
Security Architecture Review Of A Cloud Native Environment
Solutions - SAFE Secure Cloud Architecture Guide
Solutions - SAFE Secure Cloud Architecture Guide
This architecture guide provides the foundation for security controls necessary to provide “security for the cloud”. It uses the SAFE Model to describe the business use cases for an enterprise campus, the threats to those flows, and the capabilities necessary to defend them.
·cisco.com·
Solutions - SAFE Secure Cloud Architecture Guide
Cloud Architecture Explained with Examples
Cloud Architecture Explained with Examples
Read our guide to uncover the fundamentals of cloud architecture: key elements, patterns, types available, and more. Prepare for your cloud journey.
·svitla.com·
Cloud Architecture Explained with Examples
Secure Access Service Edge (SASE) vendor
Secure Access Service Edge (SASE) vendor
Explore Versa Networks' innovative solutions in networking and security. Transform your network infrastructure with cutting-edge technology.
·versa-networks.com·
Secure Access Service Edge (SASE) vendor
tinc
tinc
·tinc-vpn.org·
tinc
Tailscale · Best VPN Service for Secure Networks
Tailscale · Best VPN Service for Secure Networks
Securely connect to anything on the internet with Tailscale. Built on WireGuard®️, Tailscale enables you to make finely configurable connections, secured end-to-end according to zero trust principles, between any resources on any infrastructure.
·tailscale.com·
Tailscale · Best VPN Service for Secure Networks
SD-WAN as a Service Using Orchestration - Definition
SD-WAN as a Service Using Orchestration - Definition
To deliver SD-WAN as a service using orchestration, a service provider needs an orchestration platform to control and manage the service.
·sdxcentral.com·
SD-WAN as a Service Using Orchestration - Definition
✅SD-WAN: Implementing a network virtualization function (NFV)
✅SD-WAN: Implementing a network virtualization function (NFV)
The Fusion Broadband South Africa has a service change that can integrate with any 3rd party firewall and router. I can also use its built-in standalone router ability or integrate with a NFV.
·linkedin.com·
✅SD-WAN: Implementing a network virtualization function (NFV)
Open vSwitch / Debian 11 | InfoLoup
Open vSwitch / Debian 11 | InfoLoup
Installation d'OVS sur une VM plutôt que sur le PC hôte de VirtualBox et une configuration de celui-ci incluant l'utilisation de ports patch ...
·infoloup.no-ip.org·
Open vSwitch / Debian 11 | InfoLoup
OpenVswitch/OVNKubernetes Primer (Part 1)
OpenVswitch/OVNKubernetes Primer (Part 1)
This article will cover some of the basics of OpenVswitch/OVNKubernetes in relation to learning the path that packets take between pods and also how services work.  This article will end with a cheat-sheet on how to use OpenVswitch/OVNKubernetes for troubleshooting purposes. I will give credit to the following
·myopenshiftblog.com·
OpenVswitch/OVNKubernetes Primer (Part 1)
OpenvSwitch. Managing simple flows
OpenvSwitch. Managing simple flows
Following the previous post OpenvSwitch. Basic usage, the manual management of Openflow flows with some simple examples is introduced. Flows are usually automatically managed by a software componen…
·albertomolina.wordpress.com·
OpenvSwitch. Managing simple flows
Tutorial 4
Tutorial 4
·clear.rice.edu·
Tutorial 4
My demos, projects, gists and more
My demos, projects, gists and more
This is the section where you can see parts or sometimes even full examples of applications I’ve been working on. This section is still under construction.
·laraget.com·
My demos, projects, gists and more
Introduction to SDN (Software Defined Networking)
Introduction to SDN (Software Defined Networking)
This lesson explains what SDN (Software Defined Networking) is and its differences with current, traditional networking.
·networklessons.com·
Introduction to SDN (Software Defined Networking)
NFV, SDN : comment la virtualisation va modifier en profondeur les réseaux - Next
NFV, SDN : comment la virtualisation va modifier en profondeur les réseaux - Next
La virtualisation offre un monde de possibilités aux opérateurs pour améliorer leurs réseaux fixes et mobiles. Mais elle a des impacts importants sur les performances, les finances, la sécurité et la souveraineté. L'Arcep dresse un état des lieux.
·next.ink·
NFV, SDN : comment la virtualisation va modifier en profondeur les réseaux - Next