Configuring Airwall
In a previous post I’ve shared my first view on Airwall. In this post I’ll share some insights in Configuring Airwall.
In a previous post I’ve shared my first view on Airwall. In this post I’ll share some insights in Configuring Airwall.
I don’t know if the organizers of Security Field Day 3 did this on purpose, but it looks like they kept a very innovative solution as encore with Tempered Networks. Their presentation was the last one in the line-up and presentations. Tempered States: “what you cannot see cannot be hacked”. Interesting thought, isn’t it? And guess what, I think they have a point..
Juniper’s adoption of AI/ML presented at Security Field Day 3.