About us

Learn the art and science of building and connecting secure enterprise cloud networks together.

One joint at a time!

Search My Blog Posts

Search my blog posts

Problem Statement A financial institute that provides loans to businesses faced a significant challenge: ensuring the security of sensitive customer financial data hosted on Google Cloud Platform (GCP). To mitigate risks, the institute chose to lock down GCP Project access, avoiding the need for standing permissions. […]
What is CIEM? Cloud infrastructure entitlement management (CIEM) tools manage identities and privileges in cloud environments. CIEM tools scans cloud access control policies, rules and configurations. CIEM then present a report listing Rise of Multicloud and Associated Complexities Legacy IAM tools provide access control to static […]
Problem Statement Standing permissions and persistent credentials in Azure are among the leading causes of cybersecurity breaches, unauthorized access, and compliance violations. Static access methods create an ever-present risk of exploitation, often resulting in costly security incidents. The solution? Just-In-Time (JIT) Ephemeral Access—a security model that […]

A few things we’re great at

Helping YOU!

Learn

Complex topics in easy manner

educate

Keep up with the innovation in cloud networking

upskill

Gain more knowledge and prepare for new realities

sharing

We share what we know you should do the same

Design Principles

Designing Cloud Network requires following the Well-Architected framework design pillars. Remember CRAMPS.

cost

Cost optimization is key for cloud networks. Pay special attention to Egress Charges

recoverability

Recover from failure by building multi region applications. For DR scenarios, consider multiple clouds.

availability

Build Active Active links with automatic failure options in the network. Don’t forget the hybrid connections.

MANAGEABILITY

Manage network with IaC (Infrastructure as Code) options such as Terraform. Single pane for visibility is the key.

PERFORMANCE

Performance of the network must be planned. Do not rely only on the auto scale features to optimize for performance.

Security

Security must be part of the network. Follow Zero-Trust Network Architecture approach.

contact information

Social Media Contacts