Blog

Check out the latest in network management, cybersecurity, and DDI.

 
 
    Article

    Pokemon Go: When Cybersecurity “Breaches” Real Life

    Many of you may have recently seen what appear to be zombies roaming the planet in search of their next victim. 

    Read more
    Article

    Top Security Issues for the C-Suite: Q&A with BlueCat’s Director of Cybersecurity Solutions

    Security continues to be top of mind for all organizations. Threats are more pervasive, sophisticated and appear as headlines in the news on a regular…

    Read more
    Article

    Take your PCI compliance to the next level

    Think about how many times each day you pull a credit or debit card out of your wallet to pay for gas, groceries, a cup of coffee, or a new pair of shoes.

    Read more
    Article

    Passwords aren’t going anywhere anytime soon, so make sure you have a good one

    Years ago, futurists predicted many advances such as flying cars, teleportation, a cure for old age to name a few things that would be available by now.…

    Read more
    Article

    BlueCat Hackathon: Blows expectations out of the water

    Think of a software feature you can’t remember life without. It can be anything: The “Like” button on Facebook, tagging in social media comments, the…

    Read more
    Article

    Why does infrastructure operations still suck?

    Last Friday, I met with an individual that leads a 300-person team, responsible for running the networking and computing infrastructure in 50 data centers…

    Read more
    Article

    What We’ve Learned From Speaking With Our Customers

    A month ago I shared some of our plans for 2016 and mentioned that I’d be speaking with our customers, asking them a few questions. The survey was very…

    Read more
    Article

    Managing Cyber Attacks in the Health Care Industry

    The health care industry is more susceptible to cyber attacks than any other industry today.

    Read more
    Article

    IT Strategy: Building Business Relevance- Kroger’s CIO did.

    A solid IT strategy and the right leadership mindset are critical for success

    Read more
    Article

    How To Do an IPSec VPN Configuration Between PAN Firewall and Cisco ASA

    Darshan K. Doshi describes how to configure IPSec VPN between Palo Alto and Cisco ASA. 

    Read more
    Article

    Take Our Kids To Work Day: What does my parent do everyday?

    What happens when you invite eight grade nine students into your workplace? Lots of laughter, learning and an insider’s view of BlueCat.

    Read more
    Article

    Scaling Agility: Real-World Insights

    The momentum behind the adoption of Agile methodologies continues to build. Uptake has been growing over 10% year-over-year according to some research. As…

    Read more
    Article

    Comparing indeni and BackBox: In-depth intelligence vs simplicity

    Safeway, a company headquartered in Rosh-Haain, Israel, has recently released BackBox version 4.5. In this new version, BackBox includes “Application…

    Read more
    Article

    How to Setup Authentication for Admins – WebUI / SSH/ SmartDashboard – Check Point GAIA

    Looking for a step by step guide on how to set up authentication for admins via Check Point GAIA? Read Johnathan’s Browall post with pictures here.

    Read more
    Article

    How To Set Up Certificate Based VPNs with Check Point Appliances: CPFW Config Guide

    Looking for a step by step guide on how to set up certificate based VPNs with Check Point Appliances? Read Danny Jung’s post with pictures here.

    Read more
    Article

    How to Reset Device Trust – F5 LTM Load Balancing Methods Troubleshooting ConfigSync and Device Clustering

    Chris Spillane provides a quick guide to troubleshooting device clustering or config sync for version 11.x.

    Read more
    Article

    Check Point appliances refresh: how do you compare?

    We often get asked if we have data pertaining to the upgrade processes and cycles of Check Point users around the world. The short answer is, YES. The…

    Read more
    Article

    v9.X To 10.2.4 Upgrade Guide: F5 LTM Load Balancing Methods

    Chris Spillane urges the upgrade of your version 9.x of F5 and provides a concise guide for the upgrade to version 10.2.4. Chris is a Senior Security…

    Read more
    Article

    How to Pull and View Logs Using Automation for Palo Alto Networks Firewalls

    Are you looking to automate your log pulling process for your Palo Alto Firewalls? indeni is capable of accessing the SSH-only logs and analyze them. See…

    Read more
    Article

    Design and Architect for Change

    IT is moving rapidly from an organization that automates and integrates value chains across their company and partners, to an organization that drives core…

    Read more
    Article

    NERC Compliance Best Practices for Critical Infrastructure Protection (CIP) v5

    We have a number of US-based energy grid operators that are leveraging indeni’s capabilities to meet the NERC CIP v5 requirements, that are soon to be…

    Read more
    Article

    Configuration Management Tool Comparison: Multi-Vendor Deep Configuration Analysis: Cisco-Focused

    Looking for a comprehensive comparison of configuration management tools for enterprise IT? Read our informative post for desired configuration. Learn more.

    Read more
    Article

    Palo Alto Networks firewalls: Job(s) stuck in pending

    This is a real life sample alert from the indeni alert guide for Palo Alto Networks Firewalls. Description: One or more jobs running on this device have…

    Read more
    Article

    Pan(w)achrome for Palo Alto Networks firewalls from the indeni perspective

    Pan(w)achrome is a chrome extension written by Luigi Mori, a solutions architect at Palo Alto Networks. The extension lets you connect to your Palo Alto…

    Read more

    Get in touch

    We’re the DDI provider you’ve been looking for.
    Drop us a line and let’s talk.