archives

Dealing with COVID-19 themed malware

Keeping laptops clean even when they’re not behind the firewall Cybercriminals are using COVID-19 as bait to trick users into installing malware. It’s…

Read more

Announcing the 2020 Check Point Deployment Trends Report

Indeni is pleased to announce the release of the 2020 Check Point Deployment Trends Report, analyzing the trends we observed for 2019. Indeni observed that…

Read more

5 Ways Big Failures Grow from Accumulated Small Ones

Network engineers believe that outages, when they happen, usually come from unexpected causes, because if a network outage can be predicted, it can be…

Read more

Real Visibility Doesn’t Require Reaching for the Stars

Visibility has always been key to situational awareness. Imagine navigating the open ocean based on what stars could be seen, and where they were in the…

Read more

Best Firewalls of 2019 Reviewed

Both business owners and at-home computer users alike often make the mistake of assuming all firewalls are the same, when it actuality, this couldn’t be…

Read more

A Guide to Firewall Security in 2019

It’s no secret that firewall security is important. The online world is advancing at a record-breaking pace. And while the progress being made allows…

Read more

Building PAN-OS Air Traffic Control

This blog post gives a high-level overview of Indeni’s “Air Traffic Control for your NGFW” webinar. You can access the recording here and accompanying…

Read more

Keep Traffic Moving: Lessons from the TSA.

What is Operations Assurance? Picture an airport.  TSA has two important jobs.   The most visible job of TSA is to detect and block questionable…

Read more

Palo Alto Networks PAN-OS upgrades after a vulnerability announcement

Deployment Trends Case Study On March 20th, 2019, approximately 1 month before this post, Palo Alto Networks announced two security vulnerabilities, with a…

Read more

BlueCat to acquire LiveAction

BlueCat adds LiveAction’s network observability and intelligence platform, which helps large enterprises optimize the performance, resiliency, and security of their networks.