SSL Decryption Implementation

It is essential to understand that SSL and TLS traffic accounts for approximately 30-50% of internet traffic across organizations. Why is this important? Because locking your front door, while leaving the back door open doesn’t help secure your house. Similarly, inspecting unencrypted traffic while letting encrypted...

Read More

Datacenter Network Segmentation

Shifting a Palo Alto Networks firewall into the role of controlling East-West traffic in your datacenter is a process unique to every organization. It typically involves the process of moving the routing decisions for your datacenter networks to the Palo Alto. In this way you can force traffic to go through the firewall where it must be matched against security policies and be inspected for threats...

Read More

Nmap Cheat Sheet

A central tenet of network security is to know which assets you are protecting. Another is to limit your services to just the necessary ones. NMAP helps you do both...

Read More

Traps Endpoint Protection Highlights

By focusing on the exploit techniques and not the attack itself, Traps can prevent the attack without prior knowledge of the vulnerability,regardless of patches in place, and without signatures or software updates...

Read More

Palo Alto Networks Highlights

Here are a few things that set the Palo Alto Networks firewall apart from the rest. See what you've been missing. Find what you are looking for. Within minutes of installing the the firewall on your network, you will see which users are using which applications - and whether they harbor any threats...

Read More

Application Visibility and Control

Do you know with certainty what applications your users are running on the network? Just because your firewall is only allowing, say, ports 80, 443, and 53 doesn't guarantee that only web browsing, secure web browsing, and DNS query traffic is passing thru your firewall...

Read More

The First Step to Network Security

In our years of experience providing high quality perimeter protection and web security services, we at Digital Scepter have given businesses of all sizes the insight and expertise they require to navigate the complex – and often dangerous – arena of network security...

Read More

How a Next-Generation Firewall Can Keep Your Data Center Secure and Productive

Whatever the scale of your business or organization, the network infrastructure of your data center is often just as vital as the premises you operate from or the utilities that power your office. In modern business, data is your most valuable asset, and keeping this data protected against misuse and malware is incredibly important...

Read More

Palo Alto Networks High Availability and Support Options

Deciding how to handle your HA needs is a business decision based on the probability and impact of down time. Regardless of where you are on the scale, there are options for you. These are specific to Palo Alto Networks, but most vendors have similar offerings...

Read More

Palo Alto Stuck Downloads

With Palo Alto Networks, you may encounter an Antivirus or Threat database download that never completes and hence appears “stuck”...

Read More

Security Posture Survey

Fill out this survey for a quick and easy gap analysis of your existing controls to see how you measure up against the 20 Critical Security Controls...

Read More

Palo Alto Networks Quick Start

These steps will get you started if you have some shiny new Palo Alto Networks gear to install. Sign up at support.paloaltonetworks.com and register your serial number you received in the order confirmation email from Palo Alto...

Read More