article thumbnail

NPM, encryption, and the challenges ahead: Part 1 of 2

Kentik

It’s interesting to observe how encryption and network performance monitoring (NPM) have evolved over time. Encrypted passwords came along as did token authentication. But, this goal gets harder and harder as more and more encryption gets introduced and more services move to the cloud. It’s encrypted HTTPS.

article thumbnail

Cato CTRL Threat Research: Unmasking Hellcat – Not Your Average Ransomware Gang

CATO Networks

Lateral traffic over the WAN that would leverage the threat actor for the ransomware Cato FWaaS : protects users from accessing malicious websites (such as the malware category) where they can accidentally download a malicious payload that could contain ransomware. Double extortion to exfiltrate data before encrypting target systems.

Energy 110
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Troubleshooting ipsec ikev2 site to site vpn

Network Engineering

I assume, for peer IP we use, is the wan interface of the Cisco ASA and not the gateway of the ISP correct? Also, all routes should go to the same IP of the wan interface correct? SITE A WAN IP OF THE GATEWAY] 5 route ISP_2_WANInterface 10.1.10.0 SITE A WAN IP OF THE GATEWAY] 5 route ISP_2_WANInterface 10.1.10.0

VPN 130
article thumbnail

MPLS, SD-WAN and Network Security

CATO Networks

TechTarget has recently published an interesting article on the security implications of deploying SD-WAN using 2 customer case studies. In both cases, the customers wanted to extend an MPLS-only WAN into a hybrid WAN based on a combined MPLS and Internet connectivity. Does SD-WAN improve on MPLS security?

MPLS 52
article thumbnail

WAN Optimization vs. SD-WAN, or Why You Need Both

CATO Networks

The widespread adoption of Software-Defined Wide-Area-Network ( SD-WAN ) in recent years has caused many to wonder whether WAN optimization is still necessary. More specifically, t he rise of WAN optimization began around 2004 and addressed the limitations of the limited capacity of costly MPLS and leased line connections.

WAN 52
article thumbnail

BiB 081: 128 Technology Rethinks The WAN Router

Packet Pushers

128 Technology takes an interesting approach to WAN routing. In this Brief Briefing Ethan Banks and Drew Conry-Murray skim the surface of 128 Technology's approach, which includes stateful sessions, NAT, and encryption--but no tunneling. We also touch on use cases including SD-WAN and security.

WAN 52
article thumbnail

WAN Optimization in the SD-WAN Era

CATO Networks

WAN optimization has been with us for a long time. Born alongside the expensive MPLS data service, WAN optimization appliances allowed organizations to squeeze more bandwidth out of thin pipes through compression and deduplication, as well as prioritizing traffic of loss-sensitive applications such as remote desktops.

WAN 52