Monthly Archives: July 2013

Interviewed by!

This is exciting for me and I guess it would be for any author to be interviewed and published. My interview was recently published on

Here’s the Interview excerpt,

What inspires you to write?

My passion for technology and the spark to share the bit of knowledge I have!
Moreover, I’m inspired by my family which motivates myself to excel and to think and do things differently.

Tell us about your writing process

When I started working on the title “Securing Cisco IP Telephony Networks”, it came through as a rather pleasant revelation was, how I had to be creative in thinking what audience would like to see, vivid in visualizing to ensure that pictures do mean a thousand words, and convinced to decide the best way to explain a concept in a clear and concise manner.
Being an author has changed the way I look at things and the perspective in which I represent my thoughts. In a nutshell, I try and be in a reader’s mood and profile to see what a reader would like to see in the book.
The tools of writing are pretty much simple and unsophisticated as I use Microsoft Word for writing, Excel for tables, Visio and Powerpoint for diagrams, and PrtScrn for capturing screens (for illustrations). When it comes to writing process, I clear my mind, sit down in a relaxed environment, and start working through my thoughts and write down the rough manuscript which I finalize once all done. Overall, a straight forward and simple process.

How did you decide how to publish your books?

For technology oriented books there’re a few publishers however, for Cisco specific books the list is even shorter. When it comes to choice of publisher, it wasn’t a difficult venture as I had my mind made up for Cisco Press. Again, they are a a great platform for technologists like myself and people who wish to invest time and effort into writing a technical literature. So, without a doubt I was going with them, at least for this title
In future I would like to explore more avenues like another publisher for the technical literature or may be even self publishing.

To read the full interview visit

To explore the world of and understanding of VoIP / UC Security read Securing Cisco IP Telephony Networks

Leave a comment

Posted by on July 23, 2013 in UC Security Posts


Tags: , , , , , , , , ,

CSC Webcast – Cisco Adaptive Security Appliance (ASA) Firewalls: Lifeline of Today’s Data Centers

I invite you to join me for live webcast on ‘Cisco Adaptive Security Appliance (ASA) Firewalls: Lifeline of Today’s Data Centers’ on 30 Jul 2013 at 11.30 am IST (GMT +5.30). I’ll be your host during this session.

Please register for this event at following URL

An overview of the webcast –

Firewalls have been an integral component of data networks ever since the inception of network attacks. Cisco ASA redefines firewalling technology by providing state-of-the-art firewall capabilities, VPN termination, inline modules for antivirus, spam prevention, and intrusion prevention and, most importantly, by enabling organizations to filter and control traffic as per their security policy.

During this live event, Cisco subject matter expert Akhil Behl will focus on various new features of the Cisco ASA firewall as a next-generation data center firewall in terms of its capability, scalability, and performance. The emphasis will be on Cisco ASA as a next-generation data center firewall, providing clustering and intelligent threat defense using Cisco ScanSafe technology and access control based on Cisco TrustSec. The essence of the session will revolve around how Cisco ASA 5500 series firewalls can deliver high-class performance with utmost reliability and stakeholder satisfaction in today’s competitive environment.

During the live webcast, you will learn about:

• An introduction to Cisco ASA 5500 and 5500-x series firewalls
• Cisco ASA next-generation firewall technology for borderless networks
• Insight into Cisco ASA clustering
• Overview of Cisco ASA web security (ScanSafe)
• Overview of Cisco ASA TrustSec

1 Comment

Posted by on July 16, 2013 in UC Security Posts


Tags: , , , , , , ,