Zivaro Blog

Top 5 Most Popular Technical Blog Posts of 2016

It’s been an exciting year in enterprise technology, and we’ve covered much of it on the GTRI blog, including significant releases from vendors like Cisco and Splunk, and topics such as Software-Defined Networking (SDN), DevOps, IPv6, and Security. Below you’ll find our five most popular technical blog posts of 2016. Visit the GTRI blog for […]

It’s been an exciting year in enterprise technology, and we’ve covered much of it on the GTRI blog, including significant releases from vendors like Cisco and Splunk, and topics such as Software-Defined Networking (SDN), DevOps, IPv6, and Security. Below you’ll find our five most popular technical blog posts of 2016. Visit the GTRI blog for more!

Using Splunk Scripted Inputs beyond Data Collection

Anyone using a Splunk deployment server knows it is a great way to push out apps and configuration to all your Splunk instances including universal forwarders, but did you know it can also be used to deploy scripts to modify files that are not managed by a deployment server? You can use this technique on any version of Splunk. Read more

Next Generation Identity Management Using Cisco Identity Services Engine (ISE) 2.0

With the introduction of the Identity Services Engine (ISE) 2.0, Cisco ISE now supports both RADIUS and TACACS+ protocols and design functions, and is capable of handling both Network Access and Device Administration roles. Read more

Going Beyond Security with Machine Data and Splunk ITSI

It’s somewhat easy to forget what Splunk is truly intended to be viewed and deployed as — the Platform for Machine Data. Data from machines collected in Splunk is valid AND valuable for countless use cases stretching outside the bounds of network security. Read more

Pervasive Monitoring and DNS Privacy (Part 1)

Pervasive Monitoring of Domain Name System (DNS) messages can provide valuable data that can be used for good or evil, depending on your perspective. Even though information returned within the DNS messages is usually considered public, not everyone feels that their queries, what they are looking up, are also public information. Read more

Thinking Hybrid WAN? Think Cisco iWAN (Part 1)

Many of the shortcomings of traditional WAN services can be overcome with a Hybrid WAN, which takes advantage of more than one type of connectivity to deliver data to geographically dispersed offices and workers. Read more

3900 E Mexico Avenue, Suite 1000,
Denver, CO 80210