Malicious attacks on your cloud workload can take many different forms; according to the Microsoft Digital Defence Report, there have been a more than 40% increase in the Remote Desktop Protocol (RDP) and Secure Shell (SSH) attacks in the last 12 months.
Part 2 – Site-to-Site IPSec – NSX-t & Azure

This is Part Two of configuring Site-to-Site IPSec connectivity between on-premises NSX-t and Azure. Here we are going to focus on the Azure side and learn what it takes to set up the connection between the two.
Part 1 – Site-to-Site IPSec – NSX-t & Azure

Many organizations have already realized that the public cloud only, or private cloud only, strategy is not always a good strategy. To benefit from the two worlds, a hybrid cloud strategy is the better option for many organizations.
Secure your Linux with Azure AD

When migrating or provisioning a new workload on your Azure cloud, you must be aware that your new cloud workload has different playing roles. Central security management, authentication and security hardening must be your priority.
Time to Implement Azure AD App Proxy

As more and more businesses adopt the “working from anywhere” policy, these policies also open other challenges that the business must deal with. These challenges must be met with a balanced response covering complexity, security and costs.
Deploying your Lab NSX-t 3.1 – Part 3

In our last blog post, we got to where we connected our workload to our newly created segment. At this point, you probably require internet access to and from your workloads or North-South connection. This blog post will guide you through the steps to connect your NSX-t with the outside world easily and quickly using a BGP connection.
Deploying your Lab NSX-t 3.1 – Part 2

In the previous blog post, we learned how to deploy the NSX-t Manager and Edge serves. This gets us ready to start attaching our workloads to our logical networks, or NSX-t segments. Let’s together learn how to create and attach a workload to a segment.
Deploying your Lab NSX-t 3.1 – Part 1

Deploying VMware NSX-t is a straightforward and simple task, but things can become confusing when it comes to the configuration of the NSX-t environment. In this blog post, I will show you how to simplify the configuration to help you get started.
Using Azure Key Vault to Secure your Backups

To secure your data, you are probably using data encryption and data encryption keys on each set of your data. This method of data encryption can be simplified by using centralised encryption keys offered by Azure Key Vault. Let’s learn how to set it up, and how long it takes.
Continue reading