About us

Building secure enterprise cloud networks, one joint effort at a time.

Learn about cloud networking

Search My Blog Posts

I write my min time to time. Only when it can provide a value and simplify a complex concept.

As network architects, we know that there are pros and cons in designing any network in the world. Nothing is perfect. As trusted advisors, it is our responsibility to provide merit-based options and solutions to our clients and the enterprises we represent. This document provides some […]
Scenario ABC Healthcare (a fictitious company), a leading healthcare provider, operates solely within the AWS cloud environment. For their internet egress traffic, they rely on AWS NAT Gateway. While AWS NAT Gateway serves well for IP address translation, it’s not designed to be a robust security […]
Introduction Zero Trust is a security framework. It is not a product. It is a mindset that must be adopted by enterprises when building networks. It was relatively more straightforward to march towards a proper zero-trust framework in the on-prem world. In the cloud, it has […]

A few things we’re great at

Helping YOU!

Learn

Complex topics in easy manner

educate

Keep up with the innovation in cloud networking

upskill

Gain more knowledge and prepare for new realities

sharing

We share what we know you should do the same

Design Principles

Designing Cloud Network requires following the Well-Architected framework design pillars. Remember CRAMPS.

cost

Cost optimization is key for cloud networks. Pay special attention to Egress Charges

recoverability

Recover from failure by building multi region applications. For DR scenarios, consider multiple clouds.

availability

Build Active Active links with automatic failure options in the network. Don’t forget the hybrid connections.

MANAGEABILITY

Manage network with IaC (Infrastructure as Code) options such as Terraform. Single pane for visibility is the key.

PERFORMANCE

Performance of the network must be planned. Do not rely only on the auto scale features to optimize for performance.

Security

Security must be part of the network. Follow Zero-Trust Network Architecture approach.

contact information

Social Media Contacts