{"id":65700,"date":"2023-01-25T03:00:00","date_gmt":"2023-01-25T08:00:00","guid":{"rendered":"http:\/\/74d2948405.nxcli.io\/resources\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\/"},"modified":"2025-02-13T07:01:30","modified_gmt":"2025-02-13T12:01:30","slug":"nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security","status":"publish","type":"post","link":"https:\/\/xentegra.com\/hi\/resources\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\/","title":{"rendered":"64: Nutanix Weekly: Nutanix Flow Security Best Practices Part 1 \u2013 What is Flow Network Security?"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/www.buzzsprout.com\/1577275\/episodes\/12114030-nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security?iframe=true\" scrolling=\"no\" width=\"100%\" height=\"200\" frameborder=\"0\" style=\"width: 100%;height: 200px\"><\/iframe><\/p>\n<p>In this multi-part series, the goal is to first familiarize you with the solution and then provide guidance on preparing to deploy Flow Network Security and help you learn the constructs that form your policy framework.<\/p>\n<p>So, what is Flow Network Security?\u00a0 By now, you may have heard the name, read about it or had a conversation about it with a Nutanix employee.\u00a0 First off, and in most basic terms, Flow Network Security is built-in security for workloads that run on Nutanix AHV, our native hypervisor.\u00a0 Think of it more as a feature or solution rather than a separate \u201cproduct\u201d.<\/p>\n<p>While AHV has been available for many years, one thing became obvious as customers were looking to have more security options in their Nutanix environment; we didn\u2019t have a Nutanix-developed solution to provide network security.<\/p>\n<p>Enter microsegmentation.\u00a0 Network virtualization got its beginning as a Stanford University research project that ultimately became a startup and commercial solution from Nicira, circa 2007.\u00a0 VMware acquired Nicira in 2012 and the solution became, as you may know, NSX, which offered software-defined networking and microsegmentation functionality.\u00a0 Since this time, other software companies have brought their own solutions to market. \u00a0<\/p>\n<p>\u0939\u094b\u0938\u094d\u091f: \u090f\u0902\u0921\u0940 \u0935\u094d\u0939\u093e\u0907\u091f\u0938\u093e\u0907\u0921<br \/>\u0938\u0939-\u092e\u0947\u091c\u092c\u093e\u0928: \u0939\u093e\u0930\u094d\u0935\u0947 \u0917\u094d\u0930\u0940\u0928<br \/>\u0938\u0939-\u092e\u0947\u091c\u092c\u093e\u0928: \u092b\u093f\u0932\u093f\u092a \u0938\u0947\u0932\u0930\u094d\u0938<br \/>\u0938\u0939-\u092e\u0947\u091c\u093c\u092c\u093e\u0928: \u091c\u093f\u0930\u093e\u0939 \u0915\u0949\u0915\u094d\u0938<\/p>\n<div class=\"transcript\">\n<p><!--block-->\u0935\u0947\u092c\u0935\u0940\u091f\u0940\u091f\u0940<\/p>\n<p>1<br \/>00:00:02.130 &#8211;&gt; 00:00:11.970<br \/>Andy Whiteside: Hello, everyone! Welcome to episode. 64 of Newton&#8217;s weekly. Every host, Andy White Side today is january, 20 third of 2,023. Hey? January is almost over.<\/p>\n<p>2<br \/>00:00:12.190 &#8211;&gt; 00:00:13.920<br \/>Harvey Green: Yeah, Think about it.<\/p>\n<p>3<br \/>00:00:14.130 &#8211;&gt; 00:00:20.419<br \/>Harvey Green: No pressure. What have we got done? Well, I don&#8217;t know about you guys. Not a lot.<\/p>\n<p>4<br \/>00:00:20.480 &#8211;&gt; 00:00:30.850<br \/>Andy Whiteside: All right. The cast and crew on the screen. Here, with me is Harvey Green, President and CEO of integr Gov. Harvey was last year 2022, Was it?<\/p>\n<p>5<br \/>00:00:30.960 &#8211;&gt; 00:00:38.040<br \/>Andy Whiteside: Everything you dreamed it would be for Zen, Tiger, Gov. And more, which which is great<\/p>\n<p>6<br \/>00:00:38.110 &#8211;&gt; 00:00:40.370<br \/>Harvey Green: it it it was.<\/p>\n<p>7<br \/>00:00:40.530 &#8211;&gt; 00:00:46.690<br \/>Harvey Green: It was the best of the best and and the worst of the worst, all in one. This is the best you ever had.<\/p>\n<p>8<br \/>00:00:46.740 &#8211;&gt; 00:01:00.419<br \/>Harvey Green: That&#8217;s right. Best year I ever had, and most of work I&#8217;ve ever had all up to the right from here, I would tell you it was going to get easier, but it gets it&#8217;s still fun. I know better.<\/p>\n<p>9<br \/>00:01:00.940 &#8211;&gt; 00:01:19.890<br \/>Harvey Green: Yeah, good, you know. I don&#8217;t know if I told you there was an end. But that end at the end you won&#8217;t. I don&#8217;t know. Maybe some day that should be I. I can at least say that I&#8217;ve I&#8217;ve accomplished something this month, and that&#8217;s just listing out the things that I need to do.<\/p>\n<p>10<br \/>00:01:20.230 &#8211;&gt; 00:01:33.399<br \/>Andy Whiteside: So here&#8217;s an example. I&#8217;m on the screen here. I&#8217;ve got my laptop over here with a little crappy camera. I don&#8217;t even make eye contact with it very much. What am I to do for Christmas was to buy myself a new webcam.<\/p>\n<p>11<br \/>00:01:33.630 &#8211;&gt; 00:01:44.540<br \/>Andy Whiteside: Well stand where 2023, 23 january 20 third. I still don&#8217;t have a webcam for my office. Set up a listing. It is still accomplishing something, you know.<\/p>\n<p>12<br \/>00:01:44.770 &#8211;&gt; 00:01:48.579<br \/>Andy Whiteside: Well, our other crew members, Philip Sellers. Philip, how&#8217;s it going<\/p>\n<p>13<br \/>00:01:48.670 &#8211;&gt; 00:01:54.449<br \/>Andy Whiteside: good. How are you?<\/p>\n<p>14<br \/>00:01:54.590 &#8211;&gt; 00:02:12.249<br \/>Andy Whiteside: 8 months or 8 days, I remember, which one, almost 3 months, almost 3 months, all right, and part of that journey for you is to learn the new tanks world, which I know you were excited about coming into you, and probably ask you this last time Highlight, so far, of becoming a newutanic subject matter expert.<\/p>\n<p>15<br \/>00:02:13.140 &#8211;&gt; 00:02:30.469<br \/>Philip Sellers: you know. There&#8217;s a lot more here than I gave them credit for early on, like. I think a lot of people in the industry. You may not realize, and you may be very pleasantly surprised how much growth there&#8217;s been in the new tenx platform. What capabilities are there.<\/p>\n<p>16<br \/>00:02:30.740 &#8211;&gt; 00:02:39.370<br \/>Philip Sellers: and differentiation that that exists and other other solutions. Well, one of the things we&#8217;re gonna talk about flow here in a few minutes. But automation<\/p>\n<p>17<br \/>00:02:39.480 &#8211;&gt; 00:02:43.919<br \/>Andy Whiteside: as a part of the platform. And you said, platform, I said, platform<\/p>\n<p>18<br \/>00:02:43.980 &#8211;&gt; 00:02:49.979<br \/>Andy Whiteside: it&#8217;s platform, and that&#8217;s really how you need to look at if you&#8217;re going to try to do the most out of it. We all screen platform.<\/p>\n<p>19<br \/>00:02:50.340 &#8211;&gt; 00:02:54.400<br \/>Andy Whiteside: all screen platform. You can. Gyros gonna have a t-shirt.<\/p>\n<p>20<br \/>00:02:54.730 &#8211;&gt; 00:02:56.330<br \/>Philip Sellers: But we also<\/p>\n<p>21<br \/>00:02:57.000 &#8211;&gt; 00:03:08.320<br \/>Andy Whiteside: So Jyra Cox is really us. Gyra is our newutanic subject matter expert, gracious enough to join us for these podcasts. I asked him one time what part of his job this was, and he said, is not. I just like you guys, I was like, oh.<\/p>\n<p>22<br \/>00:03:08.720 &#8211;&gt; 00:03:26.809<br \/>Harvey Green: okay, not to be the downer here, but 2,023 is already 6 and a half percent over, so no pressure single digits. Tell me what it&#8217;s Double digits. Are we done making our less than getting on to stuff now.<\/p>\n<p>23<br \/>00:03:27.050 &#8211;&gt; 00:03:28.390<br \/>Andy Whiteside: Oh, man.<\/p>\n<p>24<br \/>00:03:29.000 &#8211;&gt; 00:03:33.510<br \/>Harvey Green: I think it&#8217;s where she was, so<\/p>\n<p>25<br \/>00:03:34.530 &#8211;&gt; 00:03:38.840<br \/>Andy Whiteside: I think it&#8217;s pretty much a given every year, though, that January just kind of go flying by, and<\/p>\n<p>26<br \/>00:03:39.250 &#8211;&gt; 00:03:47.819<br \/>Andy Whiteside: I mean the kids. My kids are out of school my 8 days in January, I remember I used to couldn&#8217;t get a day off after Christmas and their home every day.<\/p>\n<p>27<br \/>00:03:48.510 &#8211;&gt; 00:03:51.860<br \/>Harvey Green: Wait, you can now.<\/p>\n<p>28<br \/>00:03:52.360 &#8211;&gt; 00:03:58.220<br \/>Jirah Cox: No, he pulls up his inbox for December 20, sixth.<\/p>\n<p>29<br \/>00:03:59.610 &#8211;&gt; 00:04:05.920<br \/>Andy Whiteside: Well, I do. You know it&#8217;s easy when you love what you do. I don&#8217;t know if that makes it go by fast, but it definitely makes it go by fast.<\/p>\n<p>30<br \/>00:04:06.040 &#8211;&gt; 00:04:07.780<br \/>Harvey Green: Yes, almost too fast.<\/p>\n<p>31<br \/>00:04:07.900 &#8211;&gt; 00:04:08.830<br \/>\u0939\u093e\u0901\u0964<\/p>\n<p>32<br \/>00:04:09.330 &#8211;&gt; 00:04:15.640<br \/>Andy Whiteside: Well, guys, Today we agreed to talk about automation, because that&#8217;s my favorite topic.<\/p>\n<p>33<br \/>00:04:18.310 &#8211;&gt; 00:04:28.429<br \/>Andy Whiteside: and it Look, this is my second podcast today where we talk about automation, and the first one was in service. Now we talked about, you know, integrating Newton, and flow as part of that one as well.<\/p>\n<p>34<br \/>00:04:29.530 &#8211;&gt; 00:04:31.160<br \/>Andy Whiteside: You know automating<\/p>\n<p>35<br \/>00:04:31.890 &#8211;&gt; 00:04:34.369<br \/>Andy Whiteside: good processes is a no-brainer.<\/p>\n<p>36<br \/>00:04:34.510 &#8211;&gt; 00:04:40.710<br \/>Andy Whiteside: and one of the things I love about the service. Now platform. It gets us a chance to kind of make those processes efficient, and then automate them<\/p>\n<p>37<br \/>00:04:40.800 &#8211;&gt; 00:04:43.710<br \/>Andy Whiteside: in conjunction with integrations from things like flow.<\/p>\n<p>38<br \/>00:04:44.060 &#8211;&gt; 00:04:45.210<br \/>So i&#8217;m.<\/p>\n<p>39<br \/>00:04:45.280 &#8211;&gt; 00:04:46.640<br \/>Andy Whiteside: I&#8217;m softening.<\/p>\n<p>40<br \/>00:04:51.080 &#8211;&gt; 00:04:56.779<br \/>Andy Whiteside: So this this blog is from October 20 eighth.<\/p>\n<p>41<br \/>00:04:57.210 &#8211;&gt; 00:05:01.969<br \/>Andy Whiteside: It is Newtonics flow security best practices part one.<\/p>\n<p>42<br \/>00:05:02.040 &#8211;&gt; 00:05:05.129<br \/>Andy Whiteside: What is flow, network, security. So<\/p>\n<p>43<br \/>00:05:05.470 &#8211;&gt; 00:05:09.440<br \/>Andy Whiteside: I guess everything in it these days consumer<\/p>\n<p>44<br \/>00:05:09.620 &#8211;&gt; 00:05:13.799<br \/>Andy Whiteside: enterprise. It all needs a security, I to it.<\/p>\n<p>45<br \/>00:05:13.910 &#8211;&gt; 00:05:18.639<br \/>Andy Whiteside: and automation is, of course, something that&#8217;s important that we<\/p>\n<p>46<br \/>00:05:18.980 &#8211;&gt; 00:05:23.449<br \/>Andy Whiteside: try to make sure we don&#8217;t leave wide open, and we do recommended practices.<\/p>\n<p>47<br \/>00:05:23.640 &#8211;&gt; 00:05:24.590<br \/>Andy Whiteside: So we&#8217;re not.<\/p>\n<p>48<br \/>00:05:24.610 &#8211;&gt; 00:05:29.289<br \/>Andy Whiteside: We are so vulnerable or unable to answer those challenging questions when they come?<\/p>\n<p>49<br \/>00:05:29.410 &#8211;&gt; 00:05:34.540<br \/>Andy Whiteside: You know, Did you not do this for that, gyro you you brought us this blog.<\/p>\n<p>50<br \/>00:05:34.830 &#8211;&gt; 00:05:37.219<br \/>Andy Whiteside: Why is why is it important?<\/p>\n<p>51<br \/>00:05:37.800 &#8211;&gt; 00:05:51.029<br \/>Jirah Cox: I can think of 2 2 examples that I&#8217;ve come across recently. One was this: this morning I was on a on a forum that someone was posting about. Hey, my! My sea level and my vps come to us by it, team, and said, hey.<\/p>\n<p>52<br \/>00:05:51.240 &#8211;&gt; 00:06:03.409<br \/>Jirah Cox: you know the business, and will start quantifying your value, which is kind of terrifying right as a question. But it&#8217;s like Well, part of that would be well. How do you quantify the value of no successful rent, and we&#8217;re infections right?<\/p>\n<p>53<br \/>00:06:03.550 &#8211;&gt; 00:06:06.960<br \/>Jirah Cox: You know what it will prove prove the negative there.<\/p>\n<p>54<br \/>00:06:07.050 &#8211;&gt; 00:06:14.580<br \/>Jirah Cox: But but even then the other one, the the even even more terrifying one. Both are terrifying, equally terrifying in different ways.<\/p>\n<p>55<br \/>00:06:15.960 &#8211;&gt; 00:06:18.489<br \/>Jirah Cox: Bunch of headlines going around recently right around<\/p>\n<p>56<br \/>00:06:18.730 &#8211;&gt; 00:06:19.960<br \/>Jirah Cox: a lot of<\/p>\n<p>57<br \/>00:06:20.130 &#8211;&gt; 00:06:26.189<br \/>Jirah Cox: insurance companies that are pondering, let&#8217;s say, getting out of the game of writing or underwriting.<\/p>\n<p>58<br \/>00:06:26.300 &#8211;&gt; 00:06:36.139<br \/>Jirah Cox: ransomware, insurance or cyber security insurance, right? Because it&#8217;s just not working out for them economically right. The tax are getting more frequent, more successful.<\/p>\n<p>59<br \/>00:06:36.290 &#8211;&gt; 00:06:40.440<br \/>Jirah Cox: bigger, with more penalties or bigger ransoms<\/p>\n<p>60<br \/>00:06:40.580 &#8211;&gt; 00:06:42.679<br \/>Jirah Cox: to recover.<\/p>\n<p>61<br \/>00:06:42.800 &#8211;&gt; 00:06:49.759<br \/>Jirah Cox: so that I I think that that is the more terrifying thought of those 2 right like what if there was no plan? B,<\/p>\n<p>62<br \/>00:06:50.340 &#8211;&gt; 00:06:51.990<br \/>Jirah Cox: you know, and the man? It became<\/p>\n<p>63<br \/>00:06:52.100 &#8211;&gt; 00:07:02.030<br \/>Jirah Cox: be more successful, more of the time at inhibiting more preventing ransom or infections in the environment. Right now we&#8217;re covering from them just from back up to from snapshots when they occur.<\/p>\n<p>64<br \/>00:07:02.980 &#8211;&gt; 00:07:16.329<br \/>Jirah Cox: Yeah, I got a question how long you&#8217;re gonna let me go on talking about column as if we were talking about. You know I know a part of the stick of the podcast, where our charm is like the No edit model.<\/p>\n<p>65<br \/>00:07:16.470 &#8211;&gt; 00:07:23.859<br \/>Jirah Cox: It&#8217;s been a long day we one take that&#8217;s that&#8217;s what we do all right. Well, if you don&#8217;t believe it&#8217;s one. Take you down, hey? Today we&#8217;re going to talk about flow.<\/p>\n<p>66<br \/>00:07:24.140 &#8211;&gt; 00:07:41.720<br \/>Jirah Cox: I think we could all agree the best kind of security models are automated right? So there&#8217;s there&#8217;s some cross-pollination there. I appreciate you cleaning that one up. Yeah, man operation. Human powered operations have variance, and we don&#8217;t like that insecurity.<\/p>\n<p>67<br \/>00:07:41.730 &#8211;&gt; 00:07:44.400<br \/>Jirah Cox: All right. Well, I hate automation, but I love networks<\/p>\n<p>68<br \/>00:07:48.170 &#8211;&gt; 00:07:52.910<br \/>Jirah Cox: security. I arguably good automation.<\/p>\n<p>69<br \/>00:07:53.730 &#8211;&gt; 00:07:55.579<br \/>Andy Whiteside: All right<\/p>\n<p>70<br \/>00:07:55.970 &#8211;&gt; 00:08:05.540<br \/>Andy Whiteside: also, Harvey and Philip, would you agree that understanding how to micro segment and security network is something that everybody should have a handle on before they just start setting up crap<\/p>\n<p>71<br \/>00:08:06.340 &#8211;&gt; 00:08:16.669<br \/>Harvey Green: only if they want to contain certain things in certain areas. If they just want everything running around all willingly, then they probably don&#8217;t want this.<\/p>\n<p>72<br \/>00:08:16.680 &#8211;&gt; 00:08:34.489<br \/>Philip Sellers: I would argue that most of them probably have everything running around Willie Millie today. I mean. I would argue that too. But it is it what they want that that desired desired outcome. Versus<\/p>\n<p>73<br \/>00:08:34.570 &#8211;&gt; 00:08:43.930<br \/>Andy Whiteside: is that because they inherited layer, 2 networks or somebody who had a great idea that&#8217;s no longer a great idea, implemented a layer 3 and maybe 4 network.<\/p>\n<p>74<br \/>00:08:45.360 &#8211;&gt; 00:08:52.640<br \/>Harvey Green: I mean, I guess my quick answer to that is, I would say, because it used to be super hard.<\/p>\n<p>75<br \/>00:08:53.020 &#8211;&gt; 00:08:57.979<br \/>Harvey Green: It was, you know, there there was<\/p>\n<p>76<br \/>00:08:58.450 &#8211;&gt; 00:09:05.329<br \/>Harvey Green: not only the piece of you have to think about what you want to move from one<\/p>\n<p>77<br \/>00:09:05.470 &#8211;&gt; 00:09:07.720<br \/>Harvey Green: container to another container.<\/p>\n<p>78<br \/>00:09:07.990 &#8211;&gt; 00:09:13.039<br \/>or one zone to another zone, depending on what you call it, within your network. But<\/p>\n<p>79<br \/>00:09:13.340 &#8211;&gt; 00:09:23.080<br \/>Harvey Green: you know you have traffic that has to move from one place to the other. You have to allow for that traffic to move for one place to the other, and then you have to stop the other stuff from happening, so<\/p>\n<p>80<br \/>00:09:23.400 &#8211;&gt; 00:09:31.980<br \/>Harvey Green: that that on its head sounds pretty easy. I know I want this to to that place. I know I want this to go that place. I want this thing not to make it either place.<\/p>\n<p>81<br \/>00:09:32.040 &#8211;&gt; 00:09:32.960<br \/>Harvey Green: That&#8217;s great.<\/p>\n<p>82<br \/>00:09:33.130 &#8211;&gt; 00:09:35.930<br \/>Harvey Green: But then, what does that mean for your applications?<\/p>\n<p>83<br \/>00:09:36.170 &#8211;&gt; 00:09:44.130<br \/>Harvey Green: And you know, if you are running an application, or you have a user running an application, and they&#8217;re walled off from the server they need to get to<\/p>\n<p>84<br \/>00:09:44.170 &#8211;&gt; 00:09:47.520<br \/>Harvey Green: in order for that application to function that becomes<\/p>\n<p>85<br \/>00:09:47.680 &#8211;&gt; 00:09:51.270<br \/>Harvey Green: a very big issue for you.<\/p>\n<p>86<br \/>00:09:51.320 &#8211;&gt; 00:09:55.120<br \/>Philip Sellers: and I agree with Harvey. It used to be much harder.<\/p>\n<p>87<br \/>00:09:55.220 &#8211;&gt; 00:09:57.099<br \/>Philip Sellers: It is easier today.<\/p>\n<p>88<br \/>00:09:57.360 &#8211;&gt; 00:10:07.330<br \/>Philip Sellers: but it&#8217;s still easier further, just to keep things wide open. You know there&#8217;s no configuration. There&#8217;s no anything in the middle of things.<\/p>\n<p>89<br \/>00:10:07.450 &#8211;&gt; 00:10:22.519<br \/>Philip Sellers: And it&#8217;s hard to fight. 2530 years of prevailing wisdom that you harden the outside of your network and the insides. Okay. And I think a lot of people still think that way today<\/p>\n<p>90<br \/>00:10:22.640 &#8211;&gt; 00:10:28.100<br \/>Philip Sellers: that it&#8217;s okay to just worry about securing your perimeter<\/p>\n<p>91<br \/>00:10:28.180 &#8211;&gt; 00:10:37.889<br \/>Jirah Cox: and not worry about what&#8217;s going on in the network<\/p>\n<p>92<br \/>00:10:37.990 &#8211;&gt; 00:10:48.340<br \/>Andy Whiteside: I was waiting on, and that was the application. So okay, there&#8217;s layer 2 networks from back in the day, you know my links to switch to here my desk, my dome, dumb switch.<\/p>\n<p>93<br \/>00:10:48.470 &#8211;&gt; 00:11:02.020<br \/>Andy Whiteside: and then there became a micro segmentation of data flow, you know ones and zeros. And then it became, hey, what is the application doing? Who needs access to it? What&#8217;s the app supposed to be doing, it became application centric.<\/p>\n<p>94<br \/>00:11:02.200 &#8211;&gt; 00:11:08.210<br \/>Andy Whiteside: which to some degree made it even more complex for network guys who may not have been told what<\/p>\n<p>95<br \/>00:11:08.310 &#8211;&gt; 00:11:10.809<br \/>Andy Whiteside: what the app was up to correctly.<\/p>\n<p>96<br \/>00:11:12.050 &#8211;&gt; 00:11:12.800<br \/>\u0939\u093e\u0901\u0964<\/p>\n<p>97<br \/>00:11:13.150 &#8211;&gt; 00:11:14.200<br \/>Jirah Cox: yeah, I mean<\/p>\n<p>98<br \/>00:11:14.390 &#8211;&gt; 00:11:20.889<br \/>Jirah Cox: to agree with Philip right like past 20 or 30 years is primarily just been about increasing network performance, and<\/p>\n<p>99<br \/>00:11:20.910 &#8211;&gt; 00:11:26.070<br \/>Jirah Cox: maybe making it denser, right? But fundamentally same Nicks same switches that we kind of use back then.<\/p>\n<p>100<br \/>00:11:27.960 &#8211;&gt; 00:11:41.520<br \/>Jirah Cox: you know. And so, being in the business of sort of being like. Wait slow down. Let&#8217;s secure stuff. Let&#8217;s make it harder to get to either was like physically expensive. You were talking like a siloed design, or this app is buying a firewall. But but the rest of my my vms are not<\/p>\n<p>101<br \/>00:11:44.440 &#8211;&gt; 00:11:48.410<br \/>Jirah Cox: yeah or or you&#8217;re getting massively more complex in your your network design.<\/p>\n<p>102<br \/>00:11:48.790 &#8211;&gt; 00:11:54.079<br \/>Philip Sellers: Well, and I&#8217;ve I&#8217;ve been through a number of different exercises with, you know.<\/p>\n<p>103<br \/>00:11:54.220 &#8211;&gt; 00:11:58.550<br \/>Philip Sellers: is these, you know, independent software vendors. They brought in their product<\/p>\n<p>104<br \/>00:11:59.660 &#8211;&gt; 00:12:02.120<br \/>Philip Sellers: worked in a fairly secure<\/p>\n<p>105<br \/>00:12:02.690 &#8211;&gt; 00:12:14.809<br \/>Philip Sellers: environment, and they can&#8217;t articulate what it actually takes for their application to communicate, what ports, and what traversal, and what talks to what? So<\/p>\n<p>106<br \/>00:12:15.110 &#8211;&gt; 00:12:29.499<br \/>Philip Sellers: you know a. As as a operations person. If If your expert can&#8217;t help you map those things out, it becomes a very stressful and difficult process to implement those rules as well.<\/p>\n<p>107<br \/>00:12:29.880 &#8211;&gt; 00:12:30.910<br \/>\u0939\u093e\u0930\u094d\u0935\u0947 \u0917\u094d\u0930\u0940\u0928: \u0939\u093e\u0901.<\/p>\n<p>108<br \/>00:12:31.080 &#8211;&gt; 00:12:32.170<br \/>\u092c\u093f\u0932\u094d\u0915\u0941\u0932<\/p>\n<p>109<br \/>00:12:33.030 &#8211;&gt; 00:12:33.830<br \/>cool.<\/p>\n<p>110<br \/>00:12:34.350 &#8211;&gt; 00:12:40.629<br \/>Andy Whiteside: Going back to the okay. So one thing I want to say, and i&#8217;m hard to come out of you. But you know, when it came to network changes back in the old days<\/p>\n<p>111<br \/>00:12:41.130 &#8211;&gt; 00:12:45.290<br \/>Andy Whiteside: i&#8217;m back in the old days like when I was this, and then some broke<\/p>\n<p>112<br \/>00:12:45.600 &#8211;&gt; 00:12:56.049<br \/>Andy Whiteside: the network guy and the application. Guy started pointing fingers at each other, and it was my job as one of those, but also in a leadership role in the organization. Okay, Who changed? What? Because it used to work?<\/p>\n<p>113<br \/>00:12:56.190 &#8211;&gt; 00:12:57.410<br \/>Andy Whiteside: No, it doesn&#8217;t work.<\/p>\n<p>114<br \/>00:12:57.880 &#8211;&gt; 00:12:59.320<br \/>Andy Whiteside: Something changed.<\/p>\n<p>115<br \/>00:12:59.530 &#8211;&gt; 00:13:03.329<br \/>Andy Whiteside: and more often than not. It was nobody really want to take the blame<\/p>\n<p>116<br \/>00:13:03.970 &#8211;&gt; 00:13:17.980<br \/>Andy Whiteside: one of my favorite stories to tell in that regard as I went in, and I I was like crap. I don&#8217;t get it. I start touching the you know the ports on the right, on the on the switch, or maybe it was on the patch panel, whatever, and I touched when i&#8217;m gonna heard click. I was like, oh, and then boom! Everything started working here.<\/p>\n<p>117<br \/>00:13:23.770 &#8211;&gt; 00:13:26.150<br \/>Andy Whiteside: Harvey, you&#8217;re gonna say something. I interrupt you.<\/p>\n<p>118<br \/>00:13:26.280 &#8211;&gt; 00:13:39.339<br \/>Harvey Green: Oh, I don&#8217;t remember. Now you go ahead all right. So i&#8217;m in this one paragraph. Here i&#8217;m highlighting on screen before flow network Security was Da network customer.<\/p>\n<p>119<br \/>00:13:39.350 &#8211;&gt; 00:13:57.019<br \/>Andy Whiteside: But you know micro segmentation had to rely on third parties. It was complicated. It was a lot to, you know. Bring in a whole. Another set of technologies. It wasn&#8217;t integrated now. So you know what is now. We&#8217;ve got it built into a. Hv. In the Acropolis world, and then, so how easy is it? I haven&#8217;t had a chance to do it.<\/p>\n<p>120<br \/>00:13:57.030 &#8211;&gt; 00:14:00.089<br \/>Andy Whiteside: Is it? Is it? How how simple have you guys made it jar?<\/p>\n<p>121<br \/>00:14:00.650 &#8211;&gt; 00:14:11.000<br \/>Jirah Cox: It&#8217;s a it&#8217;s crazy, simple. It&#8217;s actually pre installed right. It&#8217;s actually on every running. H. We hypervisor instance. So there&#8217;s nothing to install, nothing to deploy. You simply turn on the control plane<\/p>\n<p>122<br \/>00:14:11.060 &#8211;&gt; 00:14:12.620<br \/>Jirah Cox: lives inside Prison central.<\/p>\n<p>123<br \/>00:14:12.660 &#8211;&gt; 00:14:21.879<br \/>Jirah Cox: and that&#8217;s it. So one check box. And then after that you&#8217;re just right in the business of writing policies. Of what do you want to control and allow, or disallow, or<\/p>\n<p>124<br \/>00:14:22.550 &#8211;&gt; 00:14:25.050<br \/>Jirah Cox: or monitor? So so<\/p>\n<p>125<br \/>00:14:25.140 &#8211;&gt; 00:14:32.500<br \/>Jirah Cox: to to even more simply put that it&#8217;s like putting a firewall in front of every single virtual machine. Nick. Right? So<\/p>\n<p>126<br \/>00:14:32.660 &#8211;&gt; 00:14:49.430<br \/>Harvey Green: it&#8217;s there to start giving instructions. I&#8217;ll i&#8217;ll second, that you know this is one of those things that when somebody tells, or when somebody told me how easy it was, and that, like Driver said, it&#8217;s just a check box, and then you&#8217;re going and writing policies.<\/p>\n<p>127<br \/>00:14:49.750 &#8211;&gt; 00:14:52.310<br \/>Harvey Green: It&#8217;s one of those moments where I go. All right.<\/p>\n<p>128<br \/>00:14:52.670 &#8211;&gt; 00:14:54.669<br \/>Harvey Green: That sounds too good to be true.<\/p>\n<p>129<br \/>00:14:54.770 &#8211;&gt; 00:14:55.649<br \/>Harvey Green: Prove it.<\/p>\n<p>130<br \/>00:14:55.990 &#8211;&gt; 00:15:07.160<br \/>Harvey Green: and so I had. You know, my first time implementing it. I had somebody right next to me, saying, okay, go here, go here, click the check box. I click the check box.<\/p>\n<p>131<br \/>00:15:07.370 &#8211;&gt; 00:15:20.149<br \/>Harvey Green: and everything else was literally like I said, it&#8217;s just writing policy. This this set of traffic can go here. This set of traffic can go here that can&#8217;t go anywhere outside of its own little box, and it was like.<\/p>\n<p>132<br \/>00:15:20.590 &#8211;&gt; 00:15:24.769<br \/>Harvey Green: Okay, it&#8217;s not supposed to be this simple.<\/p>\n<p>133<br \/>00:15:25.390 &#8211;&gt; 00:15:33.939<br \/>Harvey Green: but I mean they have they. They&#8217;ve got a very nice gui. They got a very nice set up there, where you can actually<\/p>\n<p>134<br \/>00:15:34.300 &#8211;&gt; 00:15:39.380<br \/>Harvey Green: see and visualize what&#8217;s happening, and what you&#8217;re putting into place, and that makes it<\/p>\n<p>135<br \/>00:15:40.200 &#8211;&gt; 00:15:58.190<br \/>Harvey Green: extremely easy. And, Harvey, when you check that box, did it turn off all communication? Did it Just start monitoring communication and start suggesting stuff. What did you do? Well, you You&#8217;ve got options there, so you you can have it. Start as soon as you want it to start.<\/p>\n<p>136<br \/>00:15:58.560 &#8211;&gt; 00:16:04.959<br \/>Harvey Green: and then you just have everything blocked, and you figure your way back to where everything works<\/p>\n<p>137<br \/>00:16:05.190 &#8211;&gt; 00:16:07.450<br \/>Harvey Green: or you can watch.<\/p>\n<p>138<br \/>00:16:07.500 &#8211;&gt; 00:16:22.860<br \/>Jirah Cox: Yeah, there, there&#8217;s well, yeah, there&#8217;s no risk of. There&#8217;s no way to turn it on, and all of a sudden lose all traffic. Right? So but yeah, you&#8217;re enabling the the the control plane right? And then you could certainly create a policy to say totally like, you know, stop everything, and only only allow what I white list.<\/p>\n<p>139<br \/>00:16:22.960 &#8211;&gt; 00:16:26.810<br \/>Jirah Cox: But you you would do that pretty intentionally. But<\/p>\n<p>140<br \/>00:16:27.850 &#8211;&gt; 00:16:37.960<br \/>Jirah Cox: but yeah, actually, I think Phil actually was touching on the the sort of the the Roman value proper, because if you listen to this and you go Well, great. I can make policies, but I don&#8217;t know what policies to make.<\/p>\n<p>141<br \/>00:16:37.970 &#8211;&gt; 00:16:56.509<br \/>Jirah Cox: Then what you can do from minute, one right with flow is, let&#8217;s start telling you what it what it observes right? What traffic actually already is flowing, which involves a certain amount of trust around, like steady state and current state like is this: is this secure? Or is there like an ongoing infection? Right? And you would need to kind of understand that a little bit.<\/p>\n<p>142<br \/>00:16:56.760 &#8211;&gt; 00:17:19.060<br \/>Jirah Cox: But you know, if you look at it and say that server shouldn&#8217;t be talking about server at all, well surprise it is great. We already we&#8217;re already proving our value. There, go, stop it. But it heard it looks, you know, pretty healthy, and you can see, like, okay, yeah, these database servers talk to these, you know, app to your servers, and then communicate with these web-share servers or load balancers that&#8217;s all pretty normal. Well great. Now we&#8217;ve already fingerprinted all of the traffic there.<\/p>\n<p>143<br \/>00:17:19.490 &#8211;&gt; 00:17:24.889<br \/>Jirah Cox: So then, then you can start saying what&#8217;s currently flowing. That&#8217;s considered my<\/p>\n<p>144<br \/>00:17:24.950 &#8211;&gt; 00:17:33.590<br \/>Jirah Cox: my allowed state, and then and then new stuff. Beyond that you can say. I want to get worded when other things try to communicate, just allow them<\/p>\n<p>145<br \/>00:17:34.730 &#8211;&gt; 00:17:36.600<br \/>Jirah Cox: and build policies based off of that.<\/p>\n<p>146<br \/>00:17:37.890 &#8211;&gt; 00:17:56.930<br \/>Andy Whiteside: So I think you can go back to your isps and say, hey, I found out what ports your your application needs, and we only allow those now and and as you move to Isvs and Clouds. Well, in this case, Isvs, or maybe clouds, you have clouds to. It becomes more and more important to be able to control this traffic flow.<\/p>\n<p>147<br \/>00:17:57.610 &#8211;&gt; 00:18:10.740<br \/>Andy Whiteside: Because now you&#8217;re in shared environments. Yeah, all right. So I think we&#8217;ve answered this. But let&#8217;s make sure. So what does micro segmentation do or solve. For as opposed to network segmentation that we all grew up on.<\/p>\n<p>148<br \/>00:18:12.530 &#8211;&gt; 00:18:22.580<br \/>Jirah Cox: So this is security without need to change your network design and all right. So this works on the network you already have and already are. If you&#8217;re listening to this, probably running the tenx on or thinking about.<\/p>\n<p>149<br \/>00:18:22.640 &#8211;&gt; 00:18:33.369<br \/>Jirah Cox: so no need to react to your vms. No need for more Vlans. The need for more routers, switches, hairpinning traffic, any of that stuff right? Like the Vms you have today<\/p>\n<p>150<br \/>00:18:33.400 &#8211;&gt; 00:18:35.000<br \/>Jirah Cox: on the network you have. The day<\/p>\n<p>151<br \/>00:18:35.100 &#8211;&gt; 00:18:37.319<br \/>Jirah Cox: can just gain more security right in place.<\/p>\n<p>152<br \/>00:18:37.660 &#8211;&gt; 00:18:40.130<br \/>Jirah Cox: game, but game, better security posture right where they are.<\/p>\n<p>153<br \/>00:18:43.640 &#8211;&gt; 00:18:44.450<br \/>Andy Whiteside: and<\/p>\n<p>154<br \/>00:18:45.000 &#8211;&gt; 00:18:51.970<br \/>Andy Whiteside: that is very application, friendly versus network segmentation which the app was just along for the ride.<\/p>\n<p>155<br \/>00:18:53.270 &#8211;&gt; 00:18:57.149<br \/>Jirah Cox: Sure, yeah, If you were taking a network segmentation approach right, you&#8217;d be doing<\/p>\n<p>156<br \/>00:18:57.200 &#8211;&gt; 00:19:06.479<br \/>Jirah Cox: a ton of reacting. A lot of Dns updates probably get lots of calls from users around the application connectivity that probably none of us want you to be getting<\/p>\n<p>157<br \/>00:19:06.690 &#8211;&gt; 00:19:07.390<br \/>\u0939\u093e\u0901\u0964<\/p>\n<p>158<br \/>00:19:08.940 &#8211;&gt; 00:19:15.339<br \/>Andy Whiteside: all right. So in the next section of the blog it&#8217;s got a a bunch of work, a bunch of flow process flow.<\/p>\n<p>159<br \/>00:19:16.040 &#8211;&gt; 00:19:17.670<br \/>Andy Whiteside: How do we<\/p>\n<p>160<br \/>00:19:17.690 &#8211;&gt; 00:19:20.660<br \/>Andy Whiteside: cover this in such a way that makes sense to a listener?<\/p>\n<p>161<br \/>00:19:22.130 &#8211;&gt; 00:19:37.720<br \/>Jirah Cox: Yeah, if you want to look at a flow chart of how flow evaluates traffic policies check out this blog which we Haven&#8217;t said, yet actually is on our intacts dev blog. So in Connecticut dev is our super technical blog really good stuff on there, so there&#8217;s a whole flowchart of the<\/p>\n<p>162<br \/>00:19:37.730 &#8211;&gt; 00:19:55.139<br \/>Harvey Green: flow engine. How it evaluates policies that you can go check out with when you&#8217;re not driving, or next time you&#8217;re at your computer. How&#8217;s that? Good? Yeah, I think that was good. Good job. The the main thing to take away is it&#8217;s easy to understand what it&#8217;s doing to<\/p>\n<p>163<br \/>00:19:55.260 &#8211;&gt; 00:20:00.909<br \/>Andy Whiteside: understand, to to to manage the process, and it&#8217;s clearly defined.<\/p>\n<p>164<br \/>00:20:01.010 &#8211;&gt; 00:20:03.840<br \/>Andy Whiteside: And you can. You can really get specific<\/p>\n<p>165<br \/>00:20:03.880 &#8211;&gt; 00:20:17.650<br \/>Jirah Cox: about what you want to happen. And what part of the process is that figure? Yeah. So I mean, it&#8217;s a layer for firewall. Right? So you can always talk about source and destination. IP. Addresses, or source and destination subnets or network masks.<\/p>\n<p>166<br \/>00:20:17.710 &#8211;&gt; 00:20:31.970<br \/>Jirah Cox: protocols, and ports. Right? So any kind of a rule you can write with those kind of verbs that&#8217;s what flow can evaluate natively and in fortune deny you could even bolster this by adding<\/p>\n<p>167<br \/>00:20:32.040 &#8211;&gt; 00:20:45.119<br \/>Jirah Cox: third party firewalls like adding Apollo in there to say, you know, do web session control as well redirect to partner appliances, but out of the box it&#8217;s layer 4. So that&#8217;s the the mechanism that works at the engine that everybody always rolls in.<\/p>\n<p>168<br \/>00:20:45.180 &#8211;&gt; 00:20:45.810<br \/>\u0939\u093e\u0901\u0964<\/p>\n<p>169<br \/>00:20:46.010 &#8211;&gt; 00:20:57.790<br \/>Andy Whiteside: Okay. So the next section of the blogs is what&#8217;s what are the benefits of micro segmentation with flow network security. First one is gain visibility. I think it goes back to my question to Harvey August. What happens when you turn it on<\/p>\n<p>170<br \/>00:20:57.880 &#8211;&gt; 00:20:59.150<br \/>Andy Whiteside: at the release<\/p>\n<p>171<br \/>00:20:59.210 &#8211;&gt; 00:21:01.960<br \/>Andy Whiteside: you get a nice roll up of what&#8217;s happening, right?<\/p>\n<p>172<br \/>00:21:02.460 &#8211;&gt; 00:21:18.079<br \/>Harvey Green: Yeah. So on on this piece of the blog, for those who can see it are are going to the link to look at it. You&#8217;ll you&#8217;ll see kind of illustrations of what they pulled out of the Gui when when it was in monitor mode.<\/p>\n<p>173<br \/>00:21:18.300 &#8211;&gt; 00:21:24.220<br \/>Harvey Green: and so at a very basic level for those who can&#8217;t see it at the top. It tells you what you&#8217;ve configured.<\/p>\n<p>174<br \/>00:21:24.590 &#8211;&gt; 00:21:28.200<br \/>Harvey Green: and at the bottom it tells you what you what it&#8217;s discovered for you.<\/p>\n<p>175<br \/>00:21:28.520 &#8211;&gt; 00:21:45.169<br \/>Harvey Green: And at that point you know again, you can kind of make smarter decisions, so that to Andy&#8217;s point you Don&#8217;t, block everything from going everywhere. You can already see what it has discovered for you, and then choose to allow or deny that traffic appropriately.<\/p>\n<p>176<br \/>00:21:45.400 &#8211;&gt; 00:21:46.060<br \/>Andy Whiteside: right<\/p>\n<p>177<br \/>00:21:47.140 &#8211;&gt; 00:21:51.520<br \/>Andy Whiteside: being in for a gi. Joe, right knowing is half the battle.<\/p>\n<p>178<br \/>00:21:51.720 &#8211;&gt; 00:22:05.000<br \/>Andy Whiteside: Yes, a real American hero, real Internet Cloud Hero. Okay, Gyro, fill up any additional comments to just the visibility piece.<\/p>\n<p>179<br \/>00:22:05.770 &#8211;&gt; 00:22:18.600<br \/>Jirah Cox: Just that. It&#8217;s a a super common pain point. If you&#8217;re in that category like Phil mentioned around like, I have no idea what my apps are, because my application owners don&#8217;t know what their apps require, hey? This this directly addresses that really easily.<\/p>\n<p>180<br \/>00:22:18.700 &#8211;&gt; 00:22:26.319<br \/>Philip Sellers: Well, and not just. Maybe your application vendors. But maybe you&#8217;re in house developers. I mean, we we don&#8217;t necessarily pay developers to<\/p>\n<p>181<br \/>00:22:26.350 &#8211;&gt; 00:22:35.920<br \/>Philip Sellers: map out everything that they&#8217;re talking to and stuff or or know those things. They&#8217;re consuming services, and they may not provide you with a<\/p>\n<p>182<br \/>00:22:36.360 &#8211;&gt; 00:22:44.820<br \/>Philip Sellers: a treasure map when they hand over the application to the operations team. So it&#8217;s a great way of seeing what&#8217;s going on in your in house apps as well.<\/p>\n<p>183<br \/>00:22:46.820 &#8211;&gt; 00:22:48.479<br \/>Philip Sellers: I mean.<\/p>\n<p>184<br \/>00:22:48.550 &#8211;&gt; 00:22:53.359<br \/>Philip Sellers: my wife works in a in an environment where they&#8217;re trying to<\/p>\n<p>185<br \/>00:22:54.230 &#8211;&gt; 00:22:57.719<br \/>Philip Sellers: to change and track certain things, you know. If you don&#8217;t<\/p>\n<p>186<br \/>00:22:58.190 &#8211;&gt; 00:23:06.809<br \/>Philip Sellers: measure it, you you can&#8217;t improve it. And so visibility is huge, right? I mean making things visible is the first step.<\/p>\n<p>187<br \/>00:23:07.060 &#8211;&gt; 00:23:08.060<br \/>Harvey Green: Yeah, yes.<\/p>\n<p>188<br \/>00:23:08.280 &#8211;&gt; 00:23:17.939<br \/>Harvey Green: yeah, that&#8217;s that&#8217;s my list for 2,023. I have to make it visible before I can go do the rest of the stuff. There you go. There you go.<\/p>\n<p>189<br \/>00:23:18.980 &#8211;&gt; 00:23:37.669<br \/>Andy Whiteside: all right. Next section says secure Ew: traffic. I know what that means drives me nuts. The tech guys use acronyms. I&#8217;ve never seen that one before, but I know what it means. Zyra, what does this mean? So so this is East West, meaning traffic sort of left to right on a switch right not going up and down to a upstream or downstream. Router<\/p>\n<p>190<br \/>00:23:37.690 &#8211;&gt; 00:23:53.819<br \/>Jirah Cox: to your question before Eddie right around like, Why wouldn&#8217;t I just do network segmentation right to the implement security? Partly because network information doesn&#8217;t really help you with East West traffic, right? So like. So like a couple of examples would be 2 things on the same switch, right or even 2 vms on the same hypervisor.<\/p>\n<p>191<br \/>00:23:53.980 &#8211;&gt; 00:24:06.070<br \/>Jirah Cox: Normally, nothing really impedes that traffic. If you&#8217;re on the same hypervisor instance, nothing even hits the switches to see that right? So then you would need like in guest agents which you know we don&#8217;t really do for for flow don&#8217;t need for flow.<\/p>\n<p>192<br \/>00:24:06.560 &#8211;&gt; 00:24:14.899<br \/>Jirah Cox: But since we&#8217;re operating at the V Nick level right then even Vm. To Vm. On the same hypervisor that private can be seen controlled. You can apply policies to it.<\/p>\n<p>193<br \/>00:24:17.550 &#8211;&gt; 00:24:19.620<br \/>Andy Whiteside: Philip. You&#8217;re<\/p>\n<p>194<br \/>00:24:19.760 &#8211;&gt; 00:24:21.290<br \/>Andy Whiteside: data Center guy<\/p>\n<p>195<br \/>00:24:21.570 &#8211;&gt; 00:24:24.399<br \/>Andy Whiteside: East West traffic matters. You has for a long time. Right<\/p>\n<p>196<br \/>00:24:25.100 &#8211;&gt; 00:24:44.409<br \/>Philip Sellers: it does. But this is back to the old old school, you know. Thing I mean, this is kind of your candy bar, and we cared about the nice chocolate outside, but not the Ui Gui nugget center of the key part. You know<\/p>\n<p>197<br \/>00:24:44.480 &#8211;&gt; 00:24:46.529<br \/>Philip Sellers: the this is where<\/p>\n<p>198<br \/>00:24:46.560 &#8211;&gt; 00:24:56.030<br \/>Philip Sellers: we&#8217;re being leveraged. I mean frankly, that&#8217;s where the bad guys are going after our networks at this point, and that&#8217;s why this matters most.<\/p>\n<p>199<br \/>00:24:56.190 &#8211;&gt; 00:25:06.269<br \/>Philip Sellers: You know ransomware is coming in on an endpoint, and when the endpoint is able to talk unobstructed to the virtual machines sitting here in Newtownx.<\/p>\n<p>200<br \/>00:25:06.430 &#8211;&gt; 00:25:12.860<br \/>Jirah Cox: it&#8217;s going to be a bad day for your organization<\/p>\n<p>201<br \/>00:25:12.890 &#8211;&gt; 00:25:15.229<br \/>Jirah Cox: if if i&#8217;m a if i&#8217;m a R. Somewhere attacker.<\/p>\n<p>202<br \/>00:25:15.410 &#8211;&gt; 00:25:21.949<br \/>Jirah Cox: if you have whatever let&#8217;s say, 500 desktops, the odds that I landed on the one that has the user session with the best credentials<\/p>\n<p>203<br \/>00:25:22.230 &#8211;&gt; 00:25:30.080<br \/>Jirah Cox: astronomically low, right? So i&#8217;m going to try to go, move east, west, right, move horizontally in the environment. Get to other desktop other sessions.<\/p>\n<p>204<br \/>00:25:30.130 &#8211;&gt; 00:25:50.079<br \/>Jirah Cox: See what I can get to from there. So that&#8217;s where all the that we say East West Co: Just a topologically kind of traffic movement looks like, and North South that would be in ingress and egress out of your network. And i&#8217;m assuming what we&#8217;re saying here is that most people have improved since the nineties and those routers aren&#8217;t wide open anymore.<\/p>\n<p>205<br \/>00:25:50.820 &#8211;&gt; 00:25:52.460<br \/>Jirah Cox: I think it&#8217;s more like.<\/p>\n<p>206<br \/>00:25:52.530 &#8211;&gt; 00:26:03.140<br \/>Jirah Cox: less and less traffic has to do in North South Traversal right. More things happen east-west without such a router right going from desktop to desktop desktop to demand controller fewer things.<\/p>\n<p>207<br \/>00:26:03.180 &#8211;&gt; 00:26:22.569<br \/>Jirah Cox: You know think it 20 years ago, right to go from Web Server to Davis, where you might go across 5 cabinets, and you know 2 switches and a router in the middle. And and now again that density, right, and performance comes in from virtualization. Fewer and fewer things have to cross that core or touch a router or point of routing, even<\/p>\n<p>208<br \/>00:26:22.700 &#8211;&gt; 00:26:30.469<br \/>Jirah Cox: to get what they need to get to so East West, where it all happens these days. Therefore you need more control over that kind of flow or flow pattern.<\/p>\n<p>209<br \/>00:26:30.690 &#8211;&gt; 00:26:49.499<br \/>Harvey Green: and I think that ties into the next one. Harvard, you want to take it first limit ran somewhere. That&#8217;s that&#8217;s where the bad stuff is coming today. Yeah, absolutely. I mean, at at this point, to to what Gyro is just speaking about. You know the the attacker is the malware, the whatever is not going to come in<\/p>\n<p>210<br \/>00:26:49.530 &#8211;&gt; 00:27:05.659<br \/>Harvey Green: highway of a domain, admin or somebody, you know, who has credentials that will take it all the places it wants to go across the network. So you know, the the code is now set to basically just start<\/p>\n<p>211<br \/>00:27:05.770 &#8211;&gt; 00:27:07.890<br \/>Harvey Green: touching everything that they can touch.<\/p>\n<p>212<br \/>00:27:08.070 &#8211;&gt; 00:27:20.310<br \/>Harvey Green: And if you use micro segmentation to stop it from being able to go anywhere outside of a a certain container, it can only affect within that container<\/p>\n<p>213<br \/>00:27:20.640 &#8211;&gt; 00:27:27.359<br \/>Harvey Green: and the the smaller you make that the more secure you&#8217;ll be from from that standpoint.<\/p>\n<p>214<br \/>00:27:28.110 &#8211;&gt; 00:27:32.999<br \/>Harvey Green: Go and do it for every single workstation but you could.<\/p>\n<p>215<br \/>00:27:33.300 &#8211;&gt; 00:27:39.209<br \/>Jirah Cox: There&#8217;s a whole school of thought right how this evolves into like 0 trust networking where basically to to short circuit that<\/p>\n<p>216<br \/>00:27:39.360 &#8211;&gt; 00:27:53.129<br \/>Jirah Cox: just because i&#8217;m in network doesn&#8217;t mean, I want to trust it right or the opposite right in this case, if it&#8217;s like something that the end user does work on, I actually I actually actively. Don&#8217;t want to trust it right? That&#8217;s almost as untrusted as like the wide open Internet.<\/p>\n<p>217<br \/>00:27:53.430 &#8211;&gt; 00:27:57.820<br \/>Jirah Cox: But I have to run a virtual desktop, an Ec. Environment that I deliver and control<\/p>\n<p>218<br \/>00:27:58.290 &#8211;&gt; 00:28:03.809<br \/>Jirah Cox: from my network. So how I keep it on my network, and yet not trust it, and yet maintain full control over it<\/p>\n<p>219<br \/>00:28:03.840 &#8211;&gt; 00:28:09.719<br \/>Jirah Cox: and and flows. I&#8217;m going to do that. I think this article might not even go deep into it. But to give that quick sidebar<\/p>\n<p>220<br \/>00:28:09.930 &#8211;&gt; 00:28:13.859<br \/>Jirah Cox: with flow, we can even change what the firewall rules are on that Vm.<\/p>\n<p>221<br \/>00:28:14.060 &#8211;&gt; 00:28:31.270<br \/>Jirah Cox: Based on who logged into it right? So it&#8217;s a contractor. If it&#8217;s a vendor, they get nothing, maybe like the one copy, or they want to go touch and Internet access. And when one of us logs in as an admin, we get other internal systems that we can can go, see and touch or get to a jump box that that the vendor couldn&#8217;t have gotten to. So<\/p>\n<p>222<br \/>00:28:31.280 &#8211;&gt; 00:28:44.050<br \/>Jirah Cox: yeah, so 0 trust. And how do I restrict access? You know not. Let them have wide open access to my network. Maintain that control. You know this is a a an easy way to get really really far down that road. Real fast.<\/p>\n<p>223<br \/>00:28:44.080 &#8211;&gt; 00:28:50.580<br \/>Harvey Green: right? Yeah, that&#8217;s absolutely it. It&#8217;s very, very customizable. You You&#8217;ve got the ability to kind of see<\/p>\n<p>224<br \/>00:28:50.870 &#8211;&gt; 00:29:06.760<br \/>Harvey Green: as you&#8217;re putting in these types of policies, you got the ability to see what you&#8217;re doing, so that you know, so that hopefully you don&#8217;t make mistakes, but at least, if you do, you&#8217;ll be able to kind of visualize and see those mistakes<\/p>\n<p>225<br \/>00:29:06.960 &#8211;&gt; 00:29:09.520<br \/>Harvey Green: to help you through that piece of it as well.<\/p>\n<p>226<br \/>00:29:09.680 &#8211;&gt; 00:29:10.340<br \/>Andy Whiteside: Right<\/p>\n<p>227<br \/>00:29:11.030 &#8211;&gt; 00:29:17.819<br \/>Andy Whiteside: Next one talks about the less reliance on next generation firewalls. Is that because we don&#8217;t have to talk to those network admins anymore?<\/p>\n<p>228<br \/>00:29:18.230 &#8211;&gt; 00:29:26.900<br \/>Jirah Cox: No, we love our network admins right like they&#8217;re key to everything we do without that. Everything stops pretty fast.<\/p>\n<p>229<br \/>00:29:27.140 &#8211;&gt; 00:29:36.790<br \/>Jirah Cox: but but some of the most tool, the tools that the most deepest inspection help capabilities right like a layer. 7<\/p>\n<p>230<br \/>00:29:36.990 &#8211;&gt; 00:29:38.959<br \/>Jirah Cox: inspecting firewall, or like a<\/p>\n<p>231<br \/>00:29:39.340 &#8211;&gt; 00:29:54.169<br \/>Jirah Cox: are the most expensive right, and have the have the sort of least throughput compared to like every switch port and the data center added together. So we want to use them for the right workload right? So if we needed to do like web session inspection. I want to only pass that kind of traffic through that.<\/p>\n<p>232<br \/>00:29:54.190 &#8211;&gt; 00:30:01.110<br \/>Jirah Cox: and not make it look at. Maybe all my 80 queries, or my backups or other like nonsense traffic to or for my virtual machine.<\/p>\n<p>233<br \/>00:30:01.200 &#8211;&gt; 00:30:19.069<br \/>Jirah Cox: so that ability to it&#8217;s not less reliance. It&#8217;s more like a more targeted use case of like, use them for what they&#8217;re really really good at what I need them to do. But it, but, you know, use a more scalable and native solution. Like I still get in the firewall, They&#8217;ll excuse me, build a hypervisor to do my broad<\/p>\n<p>234<br \/>00:30:19.490 &#8211;&gt; 00:30:22.150<br \/>layer for firewalling. All my vms.<\/p>\n<p>235<br \/>00:30:22.300 &#8211;&gt; 00:30:40.140<br \/>Andy Whiteside: Right. Yeah, that was just a joke, all right. Oh, no, you&#8217;re fine, so it&#8217;s more like a scarce resource kind of a proposition. Well, I love the way you answered it, and it could be. And I don&#8217;t think you said it this way. But there&#8217;s those technology devices we want to use those what they&#8217;re good for. We also want to take that the time that<\/p>\n<p>236<br \/>00:30:40.150 &#8211;&gt; 00:30:50.139<br \/>Andy Whiteside: those network admins let them go do what they&#8217;re good at, not, you know, and let us as the application owners virtual machine owners add a layer of network security that we control.<\/p>\n<p>237<br \/>00:30:50.500 &#8211;&gt; 00:30:51.150<br \/>Jirah Cox: Sure.<\/p>\n<p>238<br \/>00:30:51.500 &#8211;&gt; 00:31:02.420<br \/>Jirah Cox: Well, and we can tie this back to how we kinda started like with automation once. I have all of my policies set up for like this is how I secure<\/p>\n<p>239<br \/>00:31:02.430 &#8211;&gt; 00:31:12.129<br \/>Jirah Cox: Active directory, joined database servers. This is how I secure my Linux public web servers all these various policies that I can just create once, and then use repeatably<\/p>\n<p>240<br \/>00:31:12.270 &#8211;&gt; 00:31:31.609<br \/>Jirah Cox: the act of applying that security policy to a new Vm. Is trivial, right? It&#8217;s like literally like a flag in my automation run, or my Api call, or my service. Now, Job, execution to say, Yes, I want a Vm. With these many V cpus and memory and storage, and this guy over here is the owner. But this team can access it. And I want this backup policy.<\/p>\n<p>241<br \/>00:31:31.620 &#8211;&gt; 00:31:41.889<br \/>Jirah Cox: Oh, and by the way, it gets this flow network policy, and from the minute that that Vm. Is deployed it&#8217;s part of our security policy, right? And has posture already in place<\/p>\n<p>242<br \/>00:31:42.010 &#8211;&gt; 00:31:46.889<br \/>Philip Sellers: One. The policies can be applied by categories inside of new tanks. So<\/p>\n<p>243<br \/>00:31:46.990 &#8211;&gt; 00:31:55.389<br \/>Philip Sellers: you know you. You also get auditability, and you know where those elements are at, and it&#8217;s an easy change. I mean the simplification.<\/p>\n<p>244<br \/>00:31:55.430 &#8211;&gt; 00:31:56.640<br \/>Philip Sellers: I think<\/p>\n<p>245<br \/>00:31:56.850 &#8211;&gt; 00:31:59.180<br \/>Philip Sellers: it is a huge part of<\/p>\n<p>246<br \/>00:32:00.030 &#8211;&gt; 00:32:01.520<br \/>Philip Sellers: of the story there<\/p>\n<p>247<br \/>00:32:01.810 &#8211;&gt; 00:32:11.600<br \/>Harvey Green: absolutely, you know, I mean. And we talked through already some of those pieces, and being able to to do that, you can do that by, user so that you have<\/p>\n<p>248<br \/>00:32:11.630 &#8211;&gt; 00:32:17.049<br \/>Harvey Green: certain sets of users who get certain policies, and then you can to it by machine.<\/p>\n<p>249<br \/>00:32:17.130 &#8211;&gt; 00:32:20.149<br \/>Harvey Green: which again, like we&#8217;re talking about. Now, you know you<\/p>\n<p>250<br \/>00:32:20.240 &#8211;&gt; 00:32:26.300<br \/>Harvey Green: add a domain controller. It gets the Domain Controller policy. You add a print server that the prints are a policy like<\/p>\n<p>251<br \/>00:32:26.330 &#8211;&gt; 00:32:31.900<br \/>Harvey Green: You&#8217;ve got the ability from from day one from as soon as those machines are built.<\/p>\n<p>252<br \/>00:32:31.960 &#8211;&gt; 00:32:36.819<br \/>Harvey Green: to have them already in the policy. The first time that they boot up.<\/p>\n<p>253<br \/>00:32:40.070 &#8211;&gt; 00:32:44.690<br \/>Andy Whiteside: So, guys, this the next one is maintain regulatory compliance.<\/p>\n<p>254<br \/>00:32:46.160 &#8211;&gt; 00:32:53.650<br \/>Andy Whiteside: You know it&#8217;s a necessary evil at this point one, so you can get your insurance policy in 2, so that the world of governance can make sure that we&#8217;re<\/p>\n<p>255<br \/>00:32:54.310 &#8211;&gt; 00:33:00.319<br \/>Andy Whiteside: that everybody that meets certain has certain regulatory compliance. Certification needs<\/p>\n<p>256<br \/>00:33:00.410 &#8211;&gt; 00:33:02.840<br \/>Andy Whiteside: is attempting to<\/p>\n<p>257<br \/>00:33:03.520 &#8211;&gt; 00:33:08.020<br \/>Andy Whiteside: comply with what what the industry has said is necessary.<\/p>\n<p>258<br \/>00:33:08.300 &#8211;&gt; 00:33:20.060<br \/>Harvey Green: Yeah. But again, you know, having having the ability to have visibility from the front, I already helps you, because when you can go and actually<\/p>\n<p>259<br \/>00:33:20.150 &#8211;&gt; 00:33:39.099<br \/>Harvey Green: prove that this is the way this is set up and show someone who doesn&#8217;t work in networking every day or doesn&#8217;t work in his handics every day something simple where they can understand. Okay, this line goes from here to here. That line doesn&#8217;t go anywhere like. They can understand that pretty easily.<\/p>\n<p>260<br \/>00:33:39.380 &#8211;&gt; 00:33:43.220<br \/>Harvey Green: So the ability to take that with<\/p>\n<p>261<br \/>00:33:43.420 &#8211;&gt; 00:33:56.179<br \/>Harvey Green: pretty, you know, not not a high level of effort to pull that down and actually put it in front of somebody who can, you know, pass a failure from an audit perspective. I I think it&#8217;s pretty important.<\/p>\n<p>262<br \/>00:33:56.940 &#8211;&gt; 00:34:15.320<br \/>Jirah Cox: I think it&#8217;s that. I think it&#8217;s Also, we we can all think of of past customers, past jobs where it&#8217;s been like, okay, this is this: this: this system&#8217;s in scope for a certain audit or certain control, one of the easiest ways for the business to sort of get the assurance they need. There is, give it a silo right? It gets on storage, and it&#8217;s on compute its own whatever<\/p>\n<p>263<br \/>00:34:15.429 &#8211;&gt; 00:34:21.699<br \/>Jirah Cox: which works. But there&#8217;s some inherent kind of waste there. And and with this being a way to apply security policy<\/p>\n<p>264<br \/>00:34:21.820 &#8211;&gt; 00:34:33.099<br \/>Jirah Cox: makes into a larger environment. If that if that satisfies the controls, then that actually gets more efficiency right, fewer admin teams, or better human to managed Vm. Ratio<\/p>\n<p>265<br \/>00:34:33.510 &#8211;&gt; 00:34:37.850<br \/>Jirah Cox: and and better density. Better use of the resources<\/p>\n<p>266<br \/>00:34:38.370 &#8211;&gt; 00:34:39.699<br \/>Jirah Cox: combined with.<\/p>\n<p>267<br \/>00:34:39.860 &#8211;&gt; 00:34:45.130<br \/>Jirah Cox: If you&#8217;re going for regular regulatory compliance, the more you can automate that the better Your posture.<\/p>\n<p>268<br \/>00:34:45.199 &#8211;&gt; 00:35:03.500<br \/>Jirah Cox: anyway. Right? You don&#8217;t want that to be a human controlled process or a bunch of one offs right because people make mistakes. We&#8217;ve made mistakes on this podcast, but the more I can automate all of that, you and the other, we no Harvard, I mean mistakes like bucket. The the more you automate right, the more repeatable something becomes.<\/p>\n<p>269<br \/>00:35:04.590 &#8211;&gt; 00:35:17.929<br \/>Philip Sellers: Well, that&#8217;s it. I mean, remove. Remove the human factor, right? I mean, across this whole thing, whether we&#8217;re talking about the automation of the security controls, or whether we&#8217;re talking about who we trust and not trusting, are. Are you.<\/p>\n<p>270<br \/>00:35:18.070 &#8211;&gt; 00:35:24.569<br \/>Philip Sellers: you know, client workstations and things like that. I mean it. It&#8217;s the human factor that&#8217;s often<\/p>\n<p>271<br \/>00:35:24.840 &#8211;&gt; 00:35:26.590<br \/>Philip Sellers: the the trip point.<\/p>\n<p>272<br \/>00:35:27.270 &#8211;&gt; 00:35:27.890<br \/>\u0928\u0939\u0940\u0902\u0964<\/p>\n<p>273<br \/>00:35:29.060 &#8211;&gt; 00:35:40.060<br \/>Andy Whiteside: So, guys, I think we can sum this up by talking about Newtonics as a company being about providing platforms, and one of the platforms is, of course, the Acropolis operating system for the storage piece.<\/p>\n<p>274<br \/>00:35:40.070 &#8211;&gt; 00:35:55.530<br \/>Andy Whiteside: but throw into that the Acropolis hypervisor for the hypervisor piece of what&#8217;s needed, and then you start laying across that, lots of technologies flow, being one that it&#8217;s starting to AIM towards that platform as a service<\/p>\n<p>275<br \/>00:35:55.650 &#8211;&gt; 00:36:05.729<br \/>Andy Whiteside: from your data center, the vendor, the partner data center from the cloud, and all of that being able to be managed from one pane of glass<\/p>\n<p>276<br \/>00:36:06.800 &#8211;&gt; 00:36:07.799<br \/>platform.<\/p>\n<p>277<br \/>00:36:08.130 &#8211;&gt; 00:36:16.169<br \/>Jirah Cox: Totally totally. And it&#8217;s not. It&#8217;s not the one silver bullet right? It exist as part of a spectrum of protection and a spectrum of recoverability. Right? So it exists with<\/p>\n<p>278<br \/>00:36:16.200 &#8211;&gt; 00:36:23.990<br \/>Jirah Cox: snapshots that you can get to in, and seconds worth of notice and backups as well that are therefore more immutable, and they&#8217;re like indexed and longer. Attention<\/p>\n<p>279<br \/>00:36:24.080 &#8211;&gt; 00:36:29.150<br \/>Jirah Cox: and snapshots are not backups. Backups are not snapshots, but you probably want both.<\/p>\n<p>280<br \/>00:36:29.280 &#8211;&gt; 00:36:36.000<br \/>Jirah Cox: You know role based access for my administrators, and who can see what? But yes, to your point. It&#8217;s all part of the same platform.<\/p>\n<p>281<br \/>00:36:36.020 &#8211;&gt; 00:36:43.479<br \/>Jirah Cox: you know, end users that can pull back their own data from those snapshots right without even bugging an admin or opening a ticket with it.<\/p>\n<p>282<br \/>00:36:44.620 &#8211;&gt; 00:36:54.600<br \/>Jirah Cox: and even detecting, like, whenever I found one of. I had evidence of compromise in my in my environment. So this is kind of one facet of the entire protection and recovery story.<\/p>\n<p>283<br \/>00:36:54.990 &#8211;&gt; 00:36:55.549<br \/>\u0928\u0939\u0940\u0902\u0964<\/p>\n<p>284<br \/>00:36:56.570 &#8211;&gt; 00:36:57.979<br \/>Andy Whiteside: Philip.<\/p>\n<p>285<br \/>00:36:58.240 &#8211;&gt; 00:36:59.549<br \/>Andy Whiteside: Thoughts on<\/p>\n<p>286<br \/>00:37:00.390 &#8211;&gt; 00:37:01.360<br \/>Andy Whiteside: what we cover.<\/p>\n<p>287<br \/>00:37:04.070 &#8211;&gt; 00:37:16.549<br \/>Philip Sellers: I know this article doesn&#8217;t go into it, but there&#8217;s so much more here, so I can&#8217;t wait for part 2. When we dig into some of the the other features that are here. But from a security perspective.<\/p>\n<p>288<br \/>00:37:17.010 &#8211;&gt; 00:37:20.979<br \/>Philip Sellers: I mean, we can&#8217;t. We can&#8217;t stick our head in the sand and act like<\/p>\n<p>289<br \/>00:37:21.170 &#8211;&gt; 00:37:25.200<br \/>Philip Sellers: It&#8217;s okay to leave everything wide open anymore.<\/p>\n<p>290<br \/>00:37:25.380 &#8211;&gt; 00:37:30.570<br \/>Philip Sellers: You know we we&#8217;re at an inflection point. Now Gyra talked about it at the very beginning where<\/p>\n<p>291<br \/>00:37:30.590 &#8211;&gt; 00:37:35.030<br \/>Philip Sellers: insurance companies are talking about removing coverage. I know<\/p>\n<p>292<br \/>00:37:35.050 &#8211;&gt; 00:37:36.100<br \/>Philip Sellers: cyber<\/p>\n<p>293<br \/>00:37:36.540 &#8211;&gt; 00:37:38.370<br \/>Philip Sellers: conversations that<\/p>\n<p>294<br \/>00:37:39.260 &#8211;&gt; 00:37:55.859<br \/>Philip Sellers: our customers and past experience. They&#8217;re becoming more and more stringent. They&#8217;re looking deeper into the network, trying to ensure that if they are gonna cover you, you&#8217;re doing the right things. This is gonna be one of those right things that that our customers should be doing, and<\/p>\n<p>295<br \/>00:37:55.960 &#8211;&gt; 00:37:57.450<br \/>Philip Sellers: should be<\/p>\n<p>296<br \/>00:37:57.880 &#8211;&gt; 00:37:59.970<br \/>Philip Sellers: working on in their environments.<\/p>\n<p>297<br \/>00:38:01.540 &#8211;&gt; 00:38:03.140<br \/>Andy Whiteside: Well, and for me.<\/p>\n<p>298<br \/>00:38:03.680 &#8211;&gt; 00:38:07.070<br \/>Andy Whiteside: as much as I wish the world didn&#8217;t have to be this way. It all comes down to money.<\/p>\n<p>299<br \/>00:38:07.330 &#8211;&gt; 00:38:13.889<br \/>Andy Whiteside: So if it comes down to you, you you&#8217;re going to pay more, or you&#8217;re not going to get covered, for you know, potential risk of losing money.<\/p>\n<p>300<br \/>00:38:14.250 &#8211;&gt; 00:38:16.710<br \/>Andy Whiteside: That&#8217;s what drives these solutions<\/p>\n<p>301<br \/>00:38:16.890 &#8211;&gt; 00:38:17.970<br \/>Andy Whiteside: in the<\/p>\n<p>302<br \/>00:38:18.440 &#8211;&gt; 00:38:20.099<br \/>Andy Whiteside: in the mid to long run.<\/p>\n<p>303<br \/>00:38:20.430 &#8211;&gt; 00:38:23.090<br \/>Andy Whiteside: whereas technologies, you know county<\/p>\n<p>304<br \/>00:38:23.340 &#8211;&gt; 00:38:27.769<br \/>Andy Whiteside: kind of want these things. It&#8217;s the ability to financially justify it or require it<\/p>\n<p>305<br \/>00:38:28.020 &#8211;&gt; 00:38:30.189<br \/>Andy Whiteside: that always get us back to.<\/p>\n<p>306<br \/>00:38:30.280 &#8211;&gt; 00:38:31.409<br \/>Andy Whiteside: Yeah, follow the money.<\/p>\n<p>307<br \/>00:38:31.880 &#8211;&gt; 00:38:35.780<br \/>Jirah Cox: Yeah, you&#8217;re right. We don&#8217;t. I don&#8217;t really handle pricing<\/p>\n<p>308<br \/>00:38:35.810 &#8211;&gt; 00:38:38.099<br \/>Jirah Cox: per se but the fact that this is included<\/p>\n<p>309<br \/>00:38:38.350 &#8211;&gt; 00:38:40.809<br \/>Jirah Cox: is pretty meaningful to a lot of people making decisions.<\/p>\n<p>310<br \/>00:38:40.850 &#8211;&gt; 00:38:54.739<br \/>Jirah Cox: and, in fact, it&#8217;s so easily configured. Right also means that this is not going to be, you know, 6 months, 12 months, you know, multiple comma&#8217;s worth of science projects to get enabled.<\/p>\n<p>311<br \/>00:38:55.070 &#8211;&gt; 00:38:56.339<br \/>Harvey Green: Yeah, yeah.<\/p>\n<p>312<br \/>00:38:56.670 &#8211;&gt; 00:38:57.399<br \/>okay.<\/p>\n<p>313<br \/>00:38:57.430 &#8211;&gt; 00:39:00.060<br \/>Andy Whiteside: these are basic things. Everybody needs<\/p>\n<p>314<br \/>00:39:00.090 &#8211;&gt; 00:39:02.499<br \/>Andy Whiteside: figure out a way to make it part of the solution.<\/p>\n<p>315<br \/>00:39:02.950 &#8211;&gt; 00:39:03.700<br \/>Andy Whiteside: not<\/p>\n<p>316<br \/>00:39:03.840 &#8211;&gt; 00:39:06.240<br \/>Andy Whiteside: keep everything one more license away<\/p>\n<p>317<br \/>00:39:06.410 &#8211;&gt; 00:39:08.049<br \/>Andy Whiteside: from what we own.<\/p>\n<p>318<br \/>00:39:08.820 &#8211;&gt; 00:39:12.670<br \/>Philip Sellers: They also seem to understand that it needs to be simple to consume<\/p>\n<p>319<br \/>00:39:13.430 &#8211;&gt; 00:39:15.839<br \/>Jirah Cox: of the tech and the licensing. Yep.<\/p>\n<p>320<br \/>00:39:15.910 &#8211;&gt; 00:39:18.370<br \/>Philip Sellers: yeah, absolutely. I mean, the<\/p>\n<p>321<br \/>00:39:18.440 &#8211;&gt; 00:39:30.269<br \/>Philip Sellers: the implementation is that Harvey talked about is simple. That goes a long way to accessibility and success with your implementations.<\/p>\n<p>322<br \/>00:39:30.910 &#8211;&gt; 00:39:31.560<br \/>\u0939\u093e\u0901\u0964<\/p>\n<p>323<br \/>00:39:32.930 &#8211;&gt; 00:39:33.910<br \/>Harvey.<\/p>\n<p>324<br \/>00:39:34.400 &#8211;&gt; 00:39:35.479<br \/>Andy Whiteside: Anything else to<\/p>\n<p>325<br \/>00:39:35.720 &#8211;&gt; 00:39:51.649<br \/>Harvey Green: just for fun, for for those that don&#8217;t believe in micro segmentation when you go home today, like all your doors, like all your windows, and then knock down every wall and every door in your house.<\/p>\n<p>326<br \/>00:40:09.270 &#8211;&gt; 00:40:11.069<br \/>Andy Whiteside: Lock all your windows.<\/p>\n<p>327<br \/>00:40:11.380 &#8211;&gt; 00:40:15.599<br \/>Andy Whiteside: and then make your Wi-fi a wide open password or something<\/p>\n<p>328<br \/>00:40:16.230 &#8211;&gt; 00:40:24.660<br \/>Harvey Green: no, even even more physical. Just just not down all your walls and and all your doors.<\/p>\n<p>329<br \/>00:40:24.690 &#8211;&gt; 00:40:28.030<br \/>Harvey Green: Umhm, that that your network with no micro segmentation.<\/p>\n<p>330<br \/>00:40:30.260 &#8211;&gt; 00:40:42.440<br \/>Jirah Cox: If you want an easier way to learn about it. If you go to a blog post there&#8217;s a link to the text test, drive experience where you can hop on to a live running cluster from your browser at home. If you want to as well<\/p>\n<p>331<br \/>00:40:42.550 &#8211;&gt; 00:41:02.380<br \/>Jirah Cox: walls your choice and and try it out where you can start configuring policies and flow right away and get some hands on experience there. So look! I can&#8217;t go home tonight and sleep till somebody explains to me what that man is talking about. If you If you didn&#8217;t believe us that we don&#8217;t edit these.<\/p>\n<p>332<br \/>00:41:02.500 &#8211;&gt; 00:41:06.359<br \/>Jirah Cox: maybe you do.<\/p>\n<p>333<br \/>00:41:06.380 &#8211;&gt; 00:41:18.479<br \/>Harvey Green: What&#8217;s he talking about? Lock your doors, lock your windows. Yeah, that&#8217;s just your North South traffic. Lock your doors like your windows. Nothing I can get in. Nothing from the inside can get out unless you give it permission.<\/p>\n<p>334<br \/>00:41:19.150 &#8211;&gt; 00:41:37.320<br \/>Jirah Cox: Are you saying? Not down all the walls inside the house interior walls, interior doors let&#8217;s hold in the roof. That&#8217;s got to go on your list Army alright, so let me add it out. Okay.<\/p>\n<p>335<br \/>00:41:37.730 &#8211;&gt; 00:41:42.330<br \/>Andy Whiteside: So lock your doors, lock your windows, knock down all your interior walls.<\/p>\n<p>336<br \/>00:41:42.410 &#8211;&gt; 00:41:46.719<br \/>Andy Whiteside: and then go, you know. Go take your clothes off and see if you feel<\/p>\n<p>337<br \/>00:41:51.560 &#8211;&gt; 00:42:00.709<br \/>Andy Whiteside: I I I get dressed in my closet more often than not these days, because I just walks in, and i&#8217;m like, what?<\/p>\n<p>338<br \/>00:42:01.890 &#8211;&gt; 00:42:08.389<br \/>Andy Whiteside: Yeah? All right, guys. Well, I think we&#8217;ve had fun. I get the promise to my wife. I&#8217;d be home by 50&#8217;clock every day this week.<\/p>\n<p>339<br \/>00:42:08.510 &#8211;&gt; 00:42:13.840<br \/>Andy Whiteside: because i&#8217;m never home. So I gotta go<\/p>\n<p>340<br \/>00:42:13.980 &#8211;&gt; 00:42:16.200<br \/>Andy Whiteside: until next time. Guys. Thank you.<\/p>\n<p>341<br \/>00:42:16.380 &#8211;&gt; 00:42:18.259<br \/>Philip Sellers: Thank you.<\/p>\n<p><\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>In this multi-part series, the goal is to first familiarize you with the solution and then provide guidance on preparing to deploy Flow Network Security and help you learn the &hellip;<\/p>","protected":false},"author":7,"featured_media":65766,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":""},"categories":[5],"tags":[122],"class_list":["post-65700","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-podcast","tag-nutanix-weekly"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>64: Nutanix Weekly: Nutanix Flow Security Best Practices Part 1<\/title>\n<meta name=\"description\" content=\"In this multi-part series, the goal is to familiarize you with the solution and provide guidance on preparing to deploy Flow Network Security\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xentegra.com\/hi\/resources\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\/\" \/>\n<meta property=\"og:locale\" content=\"hi_IN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"64: Nutanix Weekly: Nutanix Flow Security Best Practices Part 1\" \/>\n<meta property=\"og:description\" content=\"In this multi-part series, the goal is to familiarize you with the solution and provide guidance on preparing to deploy Flow Network Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xentegra.com\/hi\/resources\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\/\" \/>\n<meta property=\"og:site_name\" content=\"XenTegra\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XenTegra\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-25T08:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-13T12:01:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chase Newmyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xentegra\" \/>\n<meta name=\"twitter:site\" content=\"@xentegra\" \/>\n<meta name=\"twitter:label1\" content=\"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chase Newmyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f\" \/>\n\t<meta name=\"twitter:data2\" content=\"40 \u092e\u093f\u0928\u091f\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\\\/\"},\"author\":{\"name\":\"Chase Newmyer\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\"},\"headline\":\"64: Nutanix Weekly: Nutanix Flow Security Best Practices Part 1 \u2013 What is Flow Network Security?\",\"datePublished\":\"2023-01-25T08:00:00+00:00\",\"dateModified\":\"2025-02-13T12:01:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\\\/\"},\"wordCount\":8894,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Nutanix-Weekly.png\",\"keywords\":[\"Nutanix Weekly\"],\"articleSection\":[\"Podcast\"],\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\\\/\",\"name\":\"64: Nutanix Weekly: Nutanix Flow Security Best Practices Part 1\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Nutanix-Weekly.png\",\"datePublished\":\"2023-01-25T08:00:00+00:00\",\"dateModified\":\"2025-02-13T12:01:30+00:00\",\"description\":\"In this multi-part series, the goal is to familiarize you with the solution and provide guidance on preparing to deploy Flow Network Security\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\\\/#breadcrumb\"},\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Nutanix-Weekly.png\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Nutanix-Weekly.png\",\"width\":1100,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xentegra.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"64: Nutanix Weekly: Nutanix Flow Security Best Practices Part 1 \u2013 What is Flow Network Security?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"name\":\"XenTegra\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xentegra.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hi-IN\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\",\"name\":\"XenTegra\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"width\":200,\"height\":200,\"caption\":\"XenTegra\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XenTegra\\\/\",\"https:\\\/\\\/x.com\\\/xentegra\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/xentegra-llc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\",\"name\":\"Chase Newmyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"caption\":\"Chase Newmyer\"},\"url\":\"https:\\\/\\\/xentegra.com\\\/hi\\\/resources\\\/author\\\/chasenewmyer\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"64: Nutanix Weekly: Nutanix Flow Security Best Practices Part 1","description":"In this multi-part series, the goal is to familiarize you with the solution and provide guidance on preparing to deploy Flow Network Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xentegra.com\/hi\/resources\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\/","og_locale":"hi_IN","og_type":"article","og_title":"64: Nutanix Weekly: Nutanix Flow Security Best Practices Part 1","og_description":"In this multi-part series, the goal is to familiarize you with the solution and provide guidance on preparing to deploy Flow Network Security","og_url":"https:\/\/xentegra.com\/hi\/resources\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\/","og_site_name":"XenTegra","article_publisher":"https:\/\/www.facebook.com\/XenTegra\/","article_published_time":"2023-01-25T08:00:00+00:00","article_modified_time":"2025-02-13T12:01:30+00:00","og_image":[{"width":1100,"height":600,"url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","type":"image\/png"}],"author":"Chase Newmyer","twitter_card":"summary_large_image","twitter_creator":"@xentegra","twitter_site":"@xentegra","twitter_misc":{"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924":"Chase Newmyer","\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f":"40 \u092e\u093f\u0928\u091f"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\/#article","isPartOf":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\/"},"author":{"name":"Chase Newmyer","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7"},"headline":"64: Nutanix Weekly: Nutanix Flow Security Best Practices Part 1 \u2013 What is Flow Network Security?","datePublished":"2023-01-25T08:00:00+00:00","dateModified":"2025-02-13T12:01:30+00:00","mainEntityOfPage":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\/"},"wordCount":8894,"commentCount":0,"publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"image":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","keywords":["Nutanix Weekly"],"articleSection":["Podcast"],"inLanguage":"hi-IN","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\/","url":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\/","name":"64: Nutanix Weekly: Nutanix Flow Security Best Practices Part 1","isPartOf":{"@id":"https:\/\/xentegra.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\/#primaryimage"},"image":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","datePublished":"2023-01-25T08:00:00+00:00","dateModified":"2025-02-13T12:01:30+00:00","description":"In this multi-part series, the goal is to familiarize you with the solution and provide guidance on preparing to deploy Flow Network Security","breadcrumb":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\/#breadcrumb"},"inLanguage":"hi-IN","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\/"]}]},{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\/#primaryimage","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","width":1100,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-nutanix-flow-security-best-practices-part-1-what-is-flow-network-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xentegra.com\/"},{"@type":"ListItem","position":2,"name":"64: Nutanix Weekly: Nutanix Flow Security Best Practices Part 1 \u2013 What is Flow Network Security?"}]},{"@type":"WebSite","@id":"https:\/\/xentegra.com\/#website","url":"https:\/\/xentegra.com\/","name":"\u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e","description":"","publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xentegra.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hi-IN"},{"@type":"Organization","@id":"https:\/\/xentegra.com\/#organization","name":"\u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e","url":"https:\/\/xentegra.com\/","logo":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","width":200,"height":200,"caption":"XenTegra"},"image":{"@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XenTegra\/","https:\/\/x.com\/xentegra","https:\/\/www.linkedin.com\/company\/xentegra-llc"]},{"@type":"Person","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7","name":"Chase Newmyer","image":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","caption":"Chase Newmyer"},"url":"https:\/\/xentegra.com\/hi\/resources\/author\/chasenewmyer\/"}]}},"_links":{"self":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/65700","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/comments?post=65700"}],"version-history":[{"count":1764,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/65700\/revisions"}],"predecessor-version":[{"id":716391,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/65700\/revisions\/716391"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/media\/65766"}],"wp:attachment":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/media?parent=65700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/categories?post=65700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/tags?post=65700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}