Welcome to…
Aryaka Blog

Aryaka women in tech – Support. Empower.  Grow.

Aryaka women in tech – Support. Empower. Grow.

Posted on February 9, 2023 By Renuka Nadkarni

The International Day of Women in Technology and Science is celebrated every year on the 11th of February to acknowledge the achievements of women in the field of technology and science. This day serves as a reminder[...]
Read Post >
SD-WANswers with ChatGPT <br><h5>“Hey ChatGPT, why do some enterprises still avoid using SD-WAN?”</h5>

SD-WANswers with ChatGPT

“Hey ChatGPT, why do some enterprises still avoid using SD-WAN?”

Posted on February 7, 2023 By Sean Kaine

ChatGPT is incredible.  I mean, it not only has all the answers, it has them in seconds.  How do you compete!?  You don’t.  You leverage it … and have a bit of fun along the way. Real[...]
Read Post >
Resistance Breeds Resilience

Resistance Breeds Resilience

Posted on February 2, 2023 By Matt Carter

This year’s Black History Month theme is Black Resistance. African Americans have had to resist systemic oppression for far too many generations. The racism, poverty, lack of access to education, housing, and jobs – the eroding right[...]
Read Post >
The Benefits of Converging Network and Security

The Benefits of Converging Network and Security

Posted on January 31, 2023 By David Ginsburg

If you’re following the networking and security space, I’m sure you’ve read a lot about convergence over the past year or so. And, every day you probably have the best example of convergence in your pocket. Your[...]
Read Post >
What is Not SASE?: 5 Common Misconceptions Around SASE

What is Not SASE?: 5 Common Misconceptions Around SASE

Posted on January 25, 2023 By David Ginsburg

SASE (Secure Access Service Edge) is a new approach to network security that integrates multiple security and networking functions into a single cloud-based platform. However, there are many misconceptions around SASE that can prevent businesses from fully[...]
Read Post >
Network Security: Protecting Your Digital Assets

Network Security: Protecting Your Digital Assets

Posted on January 24, 2023 By David Ginsburg

In today’s digital age, data has become one of the most valuable assets for businesses and individuals alike. As we rely more and more on technology to store and transmit sensitive information, the importance of network security[...]
Read Post >
My Lesson From #3 <br><h5>Damar Hamlin and finding our why</h5>

My Lesson From #3

Damar Hamlin and finding our why

Posted on January 24, 2023 By Matt Carter

Why. What a powerful word.  The essence of curiosity.  Both enlightening and (for anyone who knows a 4-year-old) maddeningly frustrating.  ‘Why’ is the reason we explore. It’s how we learn.  It’s how we grow. But as Simon[...]
Read Post >
Network Security Best Practices

Network Security Best Practices

Posted on January 22, 2023 By David Ginsburg

In today’s digital world, network security has become a crucial aspect of protecting your business and personal information. Network security involves implementing policies and procedures to prevent unauthorized access, misuse, modification, or destruction of data. In this[...]
Read Post >
Unified SASE role Cyber Threat Hunting

Unified SASE role Cyber Threat Hunting

Posted on January 17, 2023 By Srini Addepalli

What is threat hunting? Threat hunting is a proactive defense approach to detect threats that evade existing security solutions. Why threat hunting? Firewall, IDS/IPS, SWG, ZTNA, CASB functions help in protecting enterprise assets from known threats. Security[...]
Read Post >
SASE and the (sometimes) futility of predictions

SASE and the (sometimes) futility of predictions

Posted on January 10, 2023 By Klaus Schwegler

At this time of the year, there are plenty of blogs and articles about predictions for the new year. And while it’s fun and worthwhile to think about the future and make predictions, the late baseball player[...]
Read Post >
Decoding the different flavors of Zero Trust

Decoding the different flavors of Zero Trust

Posted on December 20, 2022 By Jaz Lin

Are you sometimes as confused as I am about the various definitions of Zero Trust, and how almost every vendor has co-opted the term for their marketing? Disclaimer – we could be accused of the same, but[...]
Read Post >
Gartner IOCS 2022 Recap – Leading the Next Phase of Growth

Gartner IOCS 2022 Recap – Leading the Next Phase of Growth

Posted on December 14, 2022 By Klaus Schwegler

After a 3-year hiatus of hosting an in-person event, the annual Gartner IOCS (short for Gartner Infrastructure, Operations & Cloud Strategies Conference) returned to Las Vegas last week. As we all know, much has changed since 2019,[...]
Read Post >