Link load balancing blog featured image.

Link Load Balancing: ScaleAOn Dynamic Path Selection

Traditionally, applications remained in-house at fixed locations protected with a well defined perimeter. To enhance user experience (customer, employees and remote workforce), enterprises used WAN optimization techniques, for example techniques like TCP optimization, compression and caching. This worked well with relatively small capacity WAN links. All these techniques worked in favour of ICT, as the…

How to configure snmp blog featured image.

How to configure SNMP?

SNMP is a widely used protocol in Network Management and network monitoring. SNMP provides granular visibility to data of variables managed and organized in MIB  (Management Information Base). Three significant versions of SNMP have been developed and deployed. SNMPv1 is the original version of the protocol. More recent versions, SNMPv2c and SNMPv3, feature improvements in…

Network security threats blog featured image.

Network Security Threats: Are Enterprises doing enough to prevent it?

Network security remains a prime concern as enterprises helm forward towards digital. 95% of CIOs expect cybersecurity threats to increase and impact their enterprise.  Are enterprises doing enough to mitigate new age network security threats?   Traditionally, WAN and network security was considered two different aspects. IT networking teams focused on connectivity; security teams protected…