Skip to main content

"If I have seen a little further it is by standing on the shoulders of Giants." -Isaac Newton

Your vendors’ systems or sales engineers are a wealth of knowledge.  I don’t say that because I am one, I say that because we have been around various IT departments as employees or sales engineers.  We have seen different ways of achieving the same goals and can save you headaches or hidden roadblocks.

It is mostly a myth that we only know the technology we are representing or selling.  First of all, we have to know our competitors’ technologies well enough to be able to differentiate ours. Second of all, we have to know enterprise IT applications well enough to make sure our products actually work in tandem.

SEs also talk amongst themselves.  I might not know the project you are working on, but I am sure one of my colleagues do.  I work with a great group of engineers from different backgrounds.  They are sharp and always willing to help.

I’ve worked in energy (both upstream and downstream) industry, healthcare (distribution and provider) as well as manufacturing (fashion and technology). Working in various industries as a network/security engineer has helped me learn and understand SCADA, high availability and uptime, different compliance requirements and different ways of doing business.

So, if you have an upcoming project, even if doesn’t include a product your SE directly helps you with or competes with, run it by him/her or at least mention it to him/her.

Extra eyes and ears won’t hurt!





Comments

Popular posts from this blog

MPLS vs VPN (Internet Connection) and power

This topic has been covered extensively by experts. What has not been covered in my opinion, is the underlying and fundamental change of transport infrastructure and specially power. The traditional WAN transport mechanisms are solid in terms of power normalization all through the last mile.  With the new (or not so new) shift towards commercially available Internet connections (namely DSL and Cable), customers need to watch out for excessive power coming through those lines and the respective modems and into their edge devices. There are surge protectors out there with "ethernet in/out" ports which could be used to mitigate this problem. Happy conversation out there...

SD-WAN? Let's talk

I am sure at this point, you all have caught up on with this SD-WAN craze.  Some early vendors are now bought by industry giants.  Some have really cool cloud provisioning and management dashboards. Some claims that your edge has never been this simple to set up before. However, there are still a few concerns I have: VPN technology is a mature one by now.  There are vendors out there who can offload IPsec tasks and processes onto a hardware based processor.   Would these new "SD-WAN" providers give me the same throughput/granularity? How scalable is the solution? Applications - There are vendors out there who did WAN Optimization for living and have a very rich application signature database.  What about the pure play vendors? Same goes for routing.  can you handle complex routing? can you offload or optimize those touting decisions? What if I already have that infrastructure (VPN/Routing) in place? would your solution be a tunnel in ...

There is sizing, and then there is right sizing

When it comes to firewall upgrades or refreshes, you need to know your: Current traffic volumes and mixture Session counts Number of users Current and future Internet or private connection pipes Current and future throughput requirements (VPN, SSL Inspection and decryption, etc...) Current and future unified threat management (UTM) needs Interface requirements  Number of IP devices LAG requirements  Future growth  I am sure you can come up with more variables and compare it to the vendors specification sheet in order to come up with an accurate size or model of a security appliance.  However, nothing beats a real/live test with a traffic generator.   When I usually size a box based on the customer's requirements, I also factor in real life examples, previous firewall implementations and what the Internet/application traffic trends. I have heard so many "oh we are not going to use such and such application" or "we will never use SSL inspection"...