Top Challenges for University CIOs

There is no doubt that for the average CIO of a University that there are some major challenges to take a look at. Concentrating your time and effort to where its most needed is of course sensible and brings the most reward. The question is – what are those challenges?
Read More

Education Campus Technology: Top 5 Future Ideas

In terms of networking, educational establishments are often at the forefront of the technology wave. For Universities, colleges and large schools alike, they have the opportunity to test out the latest and greatest innovations in networking – making the technology work for them, and then reaping the benefits of deploying at scale.
Read More

Cisco DNA Center Overview

Cisco's DNA Center is at the forefront of network assurance and automation and is a key element of Cisco's SD Access eco system. Interested to get some first insights in to DNA Center? Here's our quick overview!
Read More

Cisco ISE: Top 5 Unique Features

Cisco ISE is Cisco’s Identity Services Engine, and it is at the heart of Cisco’s Digital Network Architecture strategy to provide visibility and security in the most demanding Enterprise networks.
Read More

Cisco Meraki Wireless Overview

Cisco Meraki is a cloud based networking solution. Meraki offers a range of products and in this blog, we'll take a look at the wireless portfolio. The concept of cloud networking really means that while you still have on-premise networking equipment, it connects automatically to the cloud, where it can be managed. No more console cables!
Read More

Prototyping RADIUS Server Policies: Part 2

This is part 2 of my blog series on rapid prototyping without any real networking equipment. In part 1 I covered PAP and CHAP authentication and later on in part 3 we will be covering EAP-TLS (X.509 certificate based) authentication.
Read More

Prototyping Radius Server Policies - Part 1

The intention of this blog series is to help Radius Server administrators test their configurations - mostly for purposes of learning and rapid prototyping configurations. In part 2 we will cover the use of EAP-PEAP authentication and in part 3 we covering testing of authentication.
Read More

Zero Trust Architecture (ZTA) Deployment

Zero Trust Architecture is all about providing a much higher level of security for your users, devices and data, than we've had in the past. The key concept is to only provide access strictly where it is required - hence the Zero Trust. In this blog, we'll take a look at the how you can approach a ZTA deployment.
Read More

Zero Trust Architecture (ZTA) Introduction

Zero Trust Architecture is the latest concept in security architecture. We’re starting to hear this term widely used and in this explainer blog, we take a look at what Zero Trust means – and why you might want to implement this technology.
Read More

Cisco SD Access: Scalable Group Tags

One of the Cisco Digital Networking Architecture corner stone concepts is Software Defined Access (or simply, SD Access). One of the key components is the use of Scalable Group Tags (SGTs) and these form a cornerstone of the SD Access story.
Read More

Start your journey. We make it easy to get started.

Contact IPTel