Overlay vs Underlay Networks

Difference Between Overlay And Underlay Network In Tabular Form BASIS OF COMPARISON UNDERLAY NETWORK OVERLAY NETWORK Description Underlay Network is physical infrastructure above which overlay network is built. An Overlay Network is a virtual network that is built on top of an underlying Network infrastructure/Network layer (the underlay). Traffic Flow Transmits packets which traverse over […]

IAM – 16/05/2019

With Cloud IAM you can grant granular access to specific GCP resources and prevent unwanted access to other resources. Cloud IAM lets you adopt the security principle of least privilege, so you grant only the necessary access to your resources.

Step-by-step guide through the ISO 27001 / ISO 22301 Certification Audit – 17/05/2019

Audits are a key component of becoming ISO 27001 / ISO 22301 certified, and your initial certification is a crucial step in detecting whether all the main elements of the management system are in place. However, for many information security or business continuity managers and consultants, this process raises many questions. For more info… contact […]

Concepts related to identity – 19/05/2019

In Cloud IAM, you grant access to members. Members can be one of the following types:     Google account     Service account     Google group     G Suite domain     Cloud Identity domain Download the doc here – https://cloud.google.com/iam/docs/overview For more info… contact osazee@tiptechnologies.co.uk