Blog
Check out the latest in network management, cybersecurity, and DDI.
 
            Pokemon Go: When Cybersecurity “Breaches” Real Life
Many of you may have recently seen what appear to be zombies roaming the planet in search of their next victim.
 
            Top Security Issues for the C-Suite: Q&A with BlueCat’s Director of Cybersecurity Solutions
Security continues to be top of mind for all organizations. Threats are more pervasive, sophisticated and appear as headlines in the news on a regular…
 
            Take your PCI compliance to the next level
Think about how many times each day you pull a credit or debit card out of your wallet to pay for gas, groceries, a cup of coffee, or a new pair of shoes.
 
            Passwords aren’t going anywhere anytime soon, so make sure you have a good one
Years ago, futurists predicted many advances such as flying cars, teleportation, a cure for old age to name a few things that would be available by now.…
 
            BlueCat Hackathon: Blows expectations out of the water
Think of a software feature you can’t remember life without. It can be anything: The “Like” button on Facebook, tagging in social media comments, the…
 
            Why does infrastructure operations still suck?
Last Friday, I met with an individual that leads a 300-person team, responsible for running the networking and computing infrastructure in 50 data centers…
 
            What We’ve Learned From Speaking With Our Customers
A month ago I shared some of our plans for 2016 and mentioned that I’d be speaking with our customers, asking them a few questions. The survey was very…
 
            Managing Cyber Attacks in the Health Care Industry
The health care industry is more susceptible to cyber attacks than any other industry today.
 
            IT Strategy: Building Business Relevance- Kroger’s CIO did.
A solid IT strategy and the right leadership mindset are critical for success
…
 
            How To Do an IPSec VPN Configuration Between PAN Firewall and Cisco ASA
Darshan K. Doshi describes how to configure IPSec VPN between Palo Alto and Cisco ASA.
 
            Take Our Kids To Work Day: What does my parent do everyday?
What happens when you invite eight grade nine students into your workplace? Lots of laughter, learning and an insider’s view of BlueCat.
 
            Scaling Agility: Real-World Insights
The momentum behind the adoption of Agile methodologies continues to build. Uptake has been growing over 10% year-over-year according to some research. As…
 
            Comparing indeni and BackBox: In-depth intelligence vs simplicity
Safeway, a company headquartered in Rosh-Haain, Israel, has recently released BackBox version 4.5. In this new version, BackBox includes “Application…
 
            How to Setup Authentication for Admins – WebUI / SSH/ SmartDashboard – Check Point GAIA
Looking for a step by step guide on how to set up authentication for admins via Check Point GAIA? Read Johnathan’s Browall post with pictures here.
 
            How To Set Up Certificate Based VPNs with Check Point Appliances: CPFW Config Guide
Looking for a step by step guide on how to set up certificate based VPNs with Check Point Appliances? Read Danny Jung’s post with pictures here.
 
            How to Reset Device Trust – F5 LTM Load Balancing Methods Troubleshooting ConfigSync and Device Clustering
Chris Spillane provides a quick guide to troubleshooting device clustering or config sync for version 11.x.
 
            Check Point appliances refresh: how do you compare?
We often get asked if we have data pertaining to the upgrade processes and cycles of Check Point users around the world. The short answer is, YES. The…
 
            v9.X To 10.2.4 Upgrade Guide: F5 LTM Load Balancing Methods
Chris Spillane urges the upgrade of your version 9.x of F5 and provides a concise guide for the upgrade to version 10.2.4. Chris is a Senior Security…
 
            How to Pull and View Logs Using Automation for Palo Alto Networks Firewalls
Are you looking to automate your log pulling process for your Palo Alto Firewalls? indeni is capable of accessing the SSH-only logs and analyze them. See…
 
            Design and Architect for Change
IT is moving rapidly from an organization that automates and integrates value chains across their company and partners, to an organization that drives core…
 
            NERC Compliance Best Practices for Critical Infrastructure Protection (CIP) v5
We have a number of US-based energy grid operators that are leveraging indeni’s capabilities to meet the NERC CIP v5 requirements, that are soon to be…
 
            Configuration Management Tool Comparison: Multi-Vendor Deep Configuration Analysis: Cisco-Focused
Looking for a comprehensive comparison of configuration management tools for enterprise IT? Read our informative post for desired configuration. Learn more.
 
            Palo Alto Networks firewalls: Job(s) stuck in pending
This is a real life sample alert from the indeni alert guide for Palo Alto Networks Firewalls. Description: One or more jobs running on this device have…
 
            Pan(w)achrome for Palo Alto Networks firewalls from the indeni perspective
Pan(w)achrome is a chrome extension written by Luigi Mori, a solutions architect at Palo Alto Networks. The extension lets you connect to your Palo Alto…
Get in touch
We’re the DDI provider you’ve been looking for.
Drop us a line and let’s talk.