Tech Blog

Automation

Automating the Deployment of the Cisco ASA REST API

Here at CDA we love automation because it is an efficient way to perform mundane or repeatable tasks. In a previous blog article, I talked about automating the process of changing passwords on Cisco ASA devices using the REST API. In this article, I will discuss deploying the Cisco ASA REST API using automation via Ansible.

Read More »
Automation

Automating Cisco ASA Configuration Management with REST API

If you’re looking to gain more time for innovation, managing repeatable tasks with automation is incredibly efficient. Automating security-related tasks provides even more value than just efficiencies. It gives you an auditable workflow, which is especially valuable if you are regulated and audited regularly.

Read More »
Security

Cisco Firepower vs. ASA

Cisco ASA was an absolute workhorse, but it didn’t cover features such as: IPS, SSL Decryption, Anti-Malware, Layer 7 Inspection, Users/Identity Mapping, URL Filtering, and Security Intelligence. Cisco Firepower, a Next-Generation Firewall (NGFW) wraps those services into a single appliance.

Read More »
Ivanti

Reducing Logon Times Using Ivanti UWM Environment Manager

Does your company have logon times longer than a minute? That minute could add up to thousands of dollars spent on non-productive time! Ivanti User Workspace Manager (UWM) Environment Manager (EM) can help optimize your logon times to increase your company’s productivity.

Read More »
Automation

SecOps and DevSecOps Automation

We are always looking for a better way to validate security solutions for customers and help them realize where the gaps are in their existing security infrastructure. In our recorded webinar, we will demonstrate how to effectively integrate security into your DevOps, DevSecOps, and SecOps programs to protect devices in your environment from the most common threats of 2020.

Read More »
Compliance

Improve your Security, Compliance, and Performance

We love firewalls and we hate firewalls. We love the protection they provide but hate the level of scrutiny and administration required to keep them compliant. Stop wasting time and get easy access to information with strong Firewall Policy Lifecycle Management.

Read More »
Stay in the know with the latest content!

Blog Categories

Search By Topic
Recent Posts