Type your search and hit enter

Stories by Scott Hogg

Why providers should support IPv6

IPv6 can help provide better performance for customers, employees and third parties trying to access your hosted applications.

Written by Scott Hogg13 Nov. 19 16:00

How to prevent IPv6 VPN breakout

Without properly configured remote-access VPNs, IPv6 traffic from remote devices can escape corporate security controls.

Written by Scott Hogg16 Oct. 19 09:00

Cloud Security Training and Certification

More and more enterprise organizations are planning and deploying into cloud platforms.  This trend is occurring despite organizations historical push-back on cloud services claiming that they are less secure than private on-premises data centers.  Even though there is evidence to suggest that cloud application attacks are on the rise, there are best practice methods to secure cloud services.  On one hand, internal data center services may be tucked nice and neat behind the corporate perimeter firewall, there is evidence that many enterprises do not secure their systems adequately.  On the other hand, even though a cloud serve may be out-of-site and virtualized in a hyperscale multi-tenant data center, patching and solid discipline can make them secure.  Now that enterprises have a clearer understanding of cloud services and how to secure them, there are now commonly accepted methods to help make clouds more secure.  The appearance of cloud security training and certifications is helping organizations securely consume cloud services.

Written by Scott Hogg08 March 16 05:11

Promise Theory

The way we have created IT systems over the years has been very linear with each individual component being statically configured. If a human makes an error in any one of the many configurations, then the whole system breaks down. Over the years, IT systems have become increasingly complex with multiple layers of abstraction and virtualization making it difficult to enforce stability and gain scalability. Promise theory provides a new way to think about how IT systems rely on each other to form an entire system that businesses can depend. This article will cover the foundation concept of promise theory and give examples of how it is used.

Written by Scott Hogg02 July 14 00:26

IPv6: Dual-stack strategy starts at the perimeter

We are in an awkward point in the history of the Internet. <a href="http://www.networkworld.com/community/blog/impact-ipv4-address-exhaustion-security-ipv4-">IPv4 address depletion</a> has occurred yet we expect to use IPv4 for the next 15 to 20 years. Organizations see two paths before them. One alternative is to use continue to use IPv4 and expect to use multiple layers of network address translation (NAT) for many years to come. The other alternative is to start to use IPv6, however, the majority of enterprise organizations and content providers have not embraced the protocol.

Written by Scott Hogg14 Feb. 12 03:47

How to shop for Application Delivery Controllers

The key difference between Application Delivery Controllers (ADC) is the way they can be integrated into your organization's network topology. Most organizations may deploy a <a href="http://www.networkworld.com/topics/server.html">server</a> load balancer/ADC in-line as a Layer-3 reverse-proxy-server.

Written by Scott Hogg13 Feb. 12 16:22
[]