Modernize your IT infrastructure and simplify deployment with Lumos.


Lumos answers some of the frequently asked questions about cloud-based IT solutions and Cisco ACI training. Visit our website today to learn the answers.

  • What is Cisco ACI?

    Cisco® Application Centric Infrastructure (Cisco ACI™) is a Software-Defined Networking (SND) solution. It integrates software and hardware into a common infrastructure, unifying your management framework for network, application, security, and virtualization.

    This type of architecture simplifies the communication path between your applications and servers, accelerating deployment and optimizing network performance.

  • What benefits does Cisco ACI provide?

    Apart from a more efficient network, Cisco ACI provides the flexibility to scale up or scale down your load according to your current IT needs. It enables automation, allowing you to offload simpler functions into the cloud. ACI is also equipped with end-to-end security to protect your network.

  • What workshops does Lumos provide?

    Lumos offers workshops on different topics related to Cisco ACI architecture. Our current workshops are:

    • Cisco ACI for Network Engineers
    • Driving Your Data Center with Python and ACI
    • Cisco Cloud Center Training
    • Cisco ACI Fundamentals Boot Camp
    • Cisco ACI Advanced Boot Camp
    • Cisco ACI Multi-Fabric Specialist Boot Camp
    • Cisco ACI Field Engineer Course

    We also offer online training courses for those who need a more flexible setup.

  • How long does the workshop usually take?

    The duration of the workshop depends on the depth of the coverage, but it ranges from 2 to 5 days.

  • How is security ensured in cloud infrastructures?

    Cisco ACI has a three-pronged security measure:

    • Visibility: lets you see all the users and devices that access the cloud, so you can identify whether the traffic is malicious or not
    • Segmentation: prevents attackers from moving laterally across the network by isolating workloads from one another and securing them individually
    • Multi-layered threat protection: identifies threats to quickly prevent data theft and disruptions of operations