Commvault Metallic ThreatWise – Discerning the First Signs to Quell an Attack Early

Early warning signs of a cyberattack exist only to the most discerning eye. Unlike traditional monitoring tools, Commvault Metallic ThreatWise utilizes a defense by deception strategy, deploying decoy assets in the environment to divert attackers and buy time for defenders to take action. With its lightweight and cost-efficient architecture, ThreatWise provides real-time insights on active and hidden threats, allowing organizations to detect and mitigate attacks at the earliest stages. Read about it at Gestalt IT or watch the demo here on the website.


Executing Zero-Trust Security and Building a Protective Perimeter With HashiCorp Boundary Enterprise

Identity-driven security is critical to countering attempts of credential harvesting. HashiCorp Boundary Enterprise brings the capability to secure on-demand access with granular identity controls to organizations in regulated industries. As organizations transition to cloud-based infrastructures, traditional network perimeters become less relevant, and identity becomes the primary focus of security. By standardizing remote user access and utilizing the principle of least privilege, HashiCorp Boundary enables organizations to secure their infrastructure while granting granular authorizations and creating a centralized access workflow. Read about it at Gestalt IT or watch the demo here on the website.


Querying Data at Source With Cribl Search

At the recent Security Field Day event, Cribl presented Cribl Search, a service included in Cribl Suite. Cribl Search allows users to query data in scattered addresses without having to move them. No matter where the data resides, Cribl Search lets users explore and investigate datasets in real time. Read about Cribl Search at Gestalt IT or watch the demo live on the website.


Embedding Security in the Code With Noname Security’s Active Testing V2

API security is front and center in cybersecurity, and integral to the future of APIs. Noname Security’s Active Testing v2 offers dynamic testing of APIs in shift left security, enabling organizations to infuse security deep within the code. By integrating security into the CI/CD processes, Active Testing v2 enables teams to proactively detect vulnerabilities and minimize the chances of API exploits. With its user-friendly interface and comprehensive testing capabilities, the solution empowers developers to embrace shift left security and ensure the early detection and mitigation of potential issues. Read about it at Gestalt IT or watch the demo live on the website.


RackN Bridges the Gap Between People and Platforms

Adam Fisher discusses the power of Digital Rebar from RackN in this Tech Note, the first of a series sponsored by RackN. With technology evolving rapidly, the need for automation in deploying applications at scale has become crucial. RackN’s Digital Rebar serves as a reliable automation platform that empowers IT Ops to effectively manage infrastructure in the modern era, bridging the gap between people and platforms.


Fast-Tracking Decision Making and Incident Response With Cisco’s Secure Network Analytics and XDR

The relentless onslaught of cyberattacks has made it amply clear that the appropriate countermeasure is a stringent routine of intelligently devised and religiously enforced practices. Cisco makes the path from observation to action short and speedy with Cisco Secure Network Analytics and the new Cisco XDR. Secure Network Analytics (SNA) serves as a collector and aggregator of network telemetry, providing broad security analytics, while XDR collects telemetry from various sources and analyzes it to identify threats and incidents. Together, these solutions streamline data processing, enhance threat detection, and enable prompt response, making high-security standards a priority. Read the review at Gestalt IT or watch the demo here at the website.


Designing a Lossless AI/ML Network With Cisco Data Center Networking Blueprint

Cisco presented the Cisco Data Center Networking Blueprint for AI/ML Applications, a detailed and instructive handbook on AI/ML network, at the recent Tech Field Day event. The document decodes the strict requirements of modern AI/ML workloads, and provides a blueprint for building a high-performing AI/ML network. Cisco’s Nexus 9000 Series switches offer high throughput, low latency, and congestion management features necessary for AI/ML applications, including RDMA over Converged Ethernet (RoCE) in network transport. Read about it at Gestalt IT or watch the presentation here at Tech Field Day.


Achieving a Consistent Policy Across Enterprise With Cisco Security Group Tag

A common policy across products and use cases can cut the chaos and solve the challenges of policy management in enterprises. Cisco’s Security Group Tag enables a central policy control, allowing teams to collaborate more effectively, and put up a strong front against cyber threats. Cisco’s approach to bridging policy islands through context sharing and the use of Security Group Tag (SGT) are described as effective solutions for centralized policy control, interoperability, and cost benefits. Read about it at Gestalt IT or watch the demo on the website.


Segmentation Is a Key Edge Building Block with Mako Networks

In this Gestalt IT Tech Note, Brian Chambers discusses the importance of segmentation in operating edge environments at scale. He emphasizes that while edge environments resemble cloud architectures, they also face unique challenges, such as lack of on-site staff and poor physical security. Chambers highlights how effective network segmentation can improve performance, enhance security, and enable better network traffic management. He explores the role of segmentation in various industries, particularly retail, and emphasizes the need for a capable partner like Mako Networks to provide effective segmentation services in edge computing solutions. Read this article, sponsored by Mako Networks, to learn more about edge connectivity.


Thwarting Malicious Cyberattacks With the New Lightspin CNAPP From Cisco

In this Gestalt IT article, Sulagna Saha discusses Cisco’s cloud security solution, Lightspin CNAPP, and its capabilities in protecting microservices applications from vulnerabilities and malicious cyberattacks. Saha highlights the complex nature of microservices applications and the need for layered security across development and runtime phases. She explains how Lightspin CNAPP, with its graph database technology and comprehensive scanning capabilities, can identify vulnerabilities, correlate events, and provide remediation recommendations. The article also mentions the recent acquisition of Lightspin Technologies by Cisco and provides a link to watch Cisco’s demo of Lightspin CNAPP.


Seeing Through Hybrid Multi-Cloud With Forward Networks

In this Tech Note article at Gestalt IT, Justin Warren discusses the challenges of securing cloud environments in the world of hybrid multi-cloud. He emphasizes that full visibility and understanding of network configurations are crucial for effective security. Forward Networks, known for network observability, offers a solution that simplifies the complex topology of cloud environments, provides consistent visibility across networks, and enables operators to ask the right security questions. Warren highlights the importance of combining existing techniques with new methods to navigate the diversity of environments and avoid overwhelming complexity. Read more in this article, which was sponsored by Forward Networks.


Cisco Rolls Out Industrial Ethernet Catalyst Switches for the Most Rugged Outdoor Deployments

Outdoor industrial environments can be harsh to enterprise switching and wireless equipment that are most suited to work in controlled indoor settings. That’s why Cisco has launched a new set of weather-proof industrial ethernet switches that are built to provide speedy connectivity in the most unfriendly locations. Read about the Cisco Catalyst IE9300 Rugged Series at Gestalt IT or watch the demo here at the website.


Drilling Down Into the Invisible Parts of the Network With ThousandEyes

Uninterrupted visibility is no longer a privilege, but an absolute essential in today’s digital scene. ThousandEyes eliminates obscurity, bringing transparency and observability into the most complex IT environments, thus unlocking accelerated innovation. Read about the platform’s new capabilities at Gestalt IT, or watch the presentation on the website.


StorPool – Storage Delivery With Commodity Hardware the Right Way!

In this Gestalt IT Tech Note, Chris Childerhose discusses how StorPool is disrupting the storage scene with its software-defined storage solution. The platform overcomes the challenges faced by IT teams by allowing the use of any hardware while managing it homogeneously. With broad compatibility and being a fully-managed storage solution, StorPool aims to meet the needs of various sectors, including private/public clouds and managed service providers. Its unique architecture, data integrity, scalability, and hardware-agnostic approach set it apart in the storage market, offering cost savings and simplifying datacenter design. Rear more in this article, sponsored by StorPool Storage!


Easy, Verified M&A With Forward Networks

Forward Networks can ease the process of integrating networks after a merger or acquisition, regardless of the platforms or deployments. The company builds a digital twin of an environment and collects information to model the network and provide comparison capabilities between points in time, ensuring better observability and pinpointing changes in the environment. Forward Networks supports data collection from all major cloud providers and most network security device manufacturers, which ensures path observability from end to end in multi-cloud, hybrid cloud, cloud-only, and on-premises-only deployments, while its Network Query Engine allows for positive or negative verification of intent. In this article, sponsored by Forward Networks, Remington Loose provides a look at this unique aspect of their solution.


Out-Of-Band Management for Day 0, Day 1 and Day 2 Operations With Opengear Smart OOB

Opengear’s Smart Out-of-Band (OOB) solution is expanding and capable of serving customers for everyday use cases instead of just emergency scenarios. Opengear initially focused on console server access and sideline OOB management, providing features like Lighthouse software that offers centralized management for all Opengear appliances and deployed resources. The company’s Smart OOB provides reliable connectivity and a management plane for deployment, automation, and troubleshooting, and their enhancement, Routed Management Fabric, creates an overlay that enables routed IP access based on industry standards for people outside the serial space. Learn more by reading this article on Gestalt IT.


Infusing Automation in EveryDay Networking Tasks With BackBox

Tech Field Day Extra at Cisco Live included a presentation from BackBox, which demonstrated its differentiated automation platform that simplifies day-to-day networking use cases involving upgrades, network configurations, and more. Additional features include 2300 pre-built scripts, hundreds of pre-configured automation blocks, hyperintelligent automation, and a rollback option in case of a failed update. This article from Gestalt IT goes into more detail on the BackBox solution.


Announcements From Cisco Live

In this episode of the Gestalt IT Rundown, Stephen Foskett and Jeff Ton discuss significant developments in the IT sector, including the recent Cisco Live event, which unveiled several new solutions for network management, Secure Service Edge, observability, and Panoptica, which offers end-to-end lifecycle protection for cloud native applications.


Safe and Sound at Security Field Day 9

Security Field Day 9 promises to showcase how security companies and teams are addressing ever-evolving cybersecurity threats to keep users safe. A lineup of prominent security companies will present their innovative solutions to reduce security risks, ensuring a better and secure user experience. Broadcasting live on June 28 and 29, we will see presentations from Commvault, HashiCorp, NetAlly, Cisco, Cribl, and Noname Security, highlighting their approach to enhancing data security and protection focused on critical areas such as backups and disaster recovery, multi-cloud defense, and Data Loss Prevention (DLP). Learn more about Security Field Day in this video featuring Tom Hollingsworth!


Tapping Into Software Extensibility With Morpheus Data

Hybrid multi-cloud mastery no longer entails hiring certified skills, but having the right solution that can make the road less rocky. In this article, Sulagna Saha delves into the Morpheus platform’s extensibility feature, which enables users to customize the platform to suit their needs, eliminating the need to use multiple solutions. The Morpheus platform provides hybrid cloud automation enabling multi-cloud implementation in record time. Read about the platform’s extensibility feature at Gestalt IT or watch the demo on the website.