How to Leverage Itential MCP & Agentic AI For Network Config Compliance

Taking the first step toward network configuration compliance can feel like a leap into chaos. When every team, device, and policy speaks a different language, even defining a baseline can seem impossible. But what if AI could help you jumpstart the process and keep it running?

In this webinar, Ankit Bhansali and Rich Martin show you how to pair Itential’s MCP server with your LLM agent of choice (Claude, ChatGPT, etc.) to generate, modify, and enforce Golden Configurations across your network. Watch and discover how to prompt for flexible templates aligned to compliance standards and how to use those to build automated audit workflows that work directly with Itential Configuration Manager.

 

🔍 What You’ll Learn

  • Prompt LLMs to generate vendor-specific config compliance templates.
  • Align outputs to any security standard (PCI, NIST, HIPAA, SOC).
  • Modify and apply Golden Configs to test and audit live devices.
  • Build workflows for real-time config compliance across your infrastructure.
  • Automate documentation for up-to-date audit reporting.
  • Demo Notes

    (So you can skip ahead, if you want.)

    00:00 Introduction
    00:50
    Turn Policy Docs into Config Templates
    04:20
    Config Consistency Challenges
    06:28
    Config Compliance with Itential MCP
    07:47
    Demo Start: Leveraging AI
    18:33
    Golden Configurations
    22:22
    Generated Configurations
    30:07 Reporting
    32:48 Final Thoughts & Wrap-Up

  • View Transcript

    Rich Martin • 00:08

    Hello everyone, welcome to another Itential webinar. My name is Rich Martin, Director of Technical Marketing. Today, our topic is how to use Itential, our platform, our MCP server, and an AI LLM of choice in order to generate config compliance templates for both security, networking, really anything in your environment. This is a big deal because it really impacts just about everybody that runs a network in their business. In order to talk about it, I need an expert, and that expert, of course, is Ankit Bhansali. Ankit, say hello and give us a quick intro.

    Ankit Bhansali • 00:42

    Hello Rich and everybody, my name is Ankit Bhansali, I’m a Principal Solution Architect and Rich, thank you for having me.

    Rich Martin • 00:49

    Absolutely. Now, there’s an old Chinese proverb that says, the journey of a thousand miles starts with the first step. Okay. Now, I’m pretty sure you can check me on this, but I’m pretty sure whoever that Chinese wise person was, was probably thinking about config compliance in modern day when he came up with that. Because when you think about it, it’s really difficult to get started down this route, especially when you think through maybe one of these policies that defines the governance of how your IT infrastructure has to be configured. So what are some of the ones that we currently run into when you talk to customers, let’s say in the different verticals and markets, what are some of the ones that always come up that they’re bound to have to conform to?

    Ankit Bhansali • 01:35

    Yeah, there’s a popular one. And I mean, we talked to a lot of people and compliance is always there. It’s a reoccurring event that happens every six months, quarterly, depending on the businesses, but there’s PCI, HIPAA, SOX, NIST, ISO. So there’s a bunch of crazy words which everybody I know loves hearing when they are being called on to work on.

    Rich Martin • 01:58

    Yeah, I used to do many years ago, some consulting and we did some PCI consulting for a network Oh, really? Yeah. And I can tell you what, just those three words or three letters, PCI or PCI DSS now strikes fear in the hearts of many network engineers. And the reason why it’s pretty straightforward. Have you ever looked at one of those documents that defines all the things you have to do?

    Ankit Bhansali • 02:24

    I looked at your video on LinkedIn and you show how many documents when you scroll over and it’s…

    Rich Martin • 02:30

    The current PCI DSS spec is like, is like almost 400 pages. I know. Right. And so think about what you have to do. And that’s just one spec. Like you could have multiple policies that you have to adhere to, or maybe a whole different set of policies if you’re in healthcare or something like that, like HIPAA would cover that. And each one of them has their specs.

    Rich Martin • 02:49

    Now there’s probably a lot of similarities around those, but the point of the matter is you have to go through and read through that and then kind of turn that into a set of configurations that’s very unique to your own network infrastructure, the vendors you’re using, the models you’re using, all of that kind of stuff, firewalls, because it all needs to be done. And really, when you think about it, that could be a full-time job, even though there might be a once or twice a year type audit or review, that could be a full-time job. And I think that’s really what a lot of folks are up against, especially a lot of the folks that you talk to on a day-to-day basis on Git.

    Ankit Bhansali • 03:25

    Correct, and to your point that this very overwhelming right that information you got to know the background, the governance piece of it, but it’s again very continuously changing. These requirements change, they have to be adaptable for the new infrastructure, especially with AI and cybersecurity around a network, especially when we hear AWS talking about how AI is impacting firewalls and the point of attack is not just humans anymore, right? It’s machines with brains, basically, and there’s a lot of compliance wise needs to go into security or network and rightly so, because even though it’s a lot of work, this is making sure businesses and their networks stay healthy, especially with the data which they capture along with their transactions and things like that.

    Rich Martin • 04:19

    Yeah, that’s a great point and that really brings us to some of those challenges. So number one, there’s probably a lot of devices in your network, right? And not just your network, remember, these compliance specs are network, firewall, servers, everything that really holds up your applications and your business. And so not only are there lots of devices, because of the scope, there’s lots of people that have to be involved. as well. And making all of that, those configurations consistent with and in compliance to these specifications is really, really difficult. And to your point just a moment ago, changes, changes, changes. There’s like a multidimensional set of changes. There’s changes to the standards that can occur year to year, right? There’s changes to the devices that can occur hour to hour, day to day by those many different people, both in the hardware and the software side, device configurations change. All of these impact your ability to maintain compliance to those standards. And like you said, we live in a day of AI everywhere. And that’s unfortunately being leveraged to increase the number of attacks and the sophistication of attacks. And to that point, how much time do we actually have to respond nowadays? Right? So, so the automation is like both sides. One side is automating, trying to get in. We have to, we have to use the same techniques and automation to be as proactive as possible and then to be as responsive as possible.

    Ankit Bhansali • 05:50

    Correct, and what we have heard in the industry too, like this is very important. And I think something from Google, they are also releasing models for the future for security ops. So they are making sure that they are focusing LLMs mostly on the security side of the world, which is again very unique compared to how generous generalizing LLMs have become. But Google is trying to go for this domain for security ops, which tells you that there is a lot to be learned and things change fast, which means we have to adapt faster.

    Rich Martin • 06:27

    That’s right, which leads us right into what we’re going to be taking a look at today. How we can now leverage your AI model of choice, in this case, we’re using CLAWD, along with the Itential solution in order to really get that first step going for a lot of organizations, or to maintain it over time. Meaning, how do we generate a set of configurations given the standard that we would have to adhere to, that huge document that nobody wants to read through. and then generate a set of configurations based off of what our infrastructure, our network infrastructure, our security infrastructure looks like today, composed of all the different stuff that we have. All right. And so walk us through what we’re going to be taking a look at today and what the output is going to look like for one of our prospects or customers that. that’s doing this.

    Ankit Bhansali • 07:17

    Absolutely. And to your point, this is a good place to start here, especially leveraging AI to build things, especially when the context is that hard to understand. Not hard to understand, it’s not everybody’s cup of tea, right? And you have to understand there’s a lot of context and understanding of just the network, the compliance, the red tapes around how you want to do compliance. And those are all outlined in these compliance frameworks. So what we are going to do is leverage AI where it’s best. It’s best at reading text documents, because we saw a lot of ChatGPT, Cloud, and Google AI trying to show how multimodal they are.

    Ankit Bhansali • 08:03

    They can ingest a lot of different kinds of information in different formats, which means now once they know how to process that information with MCP, we can also now interact with systems using AI. And in this case, what we are leveraging is the MCP server from Itential. So it understands how Itential functions and how to talk to Itential when you’re trying to build things in the platform. So what we’re going to do is we’re going to use the prompt to tell Cloud to first go research on your crazy document. Then based on that, set up the right requirements to build a compliance framework inside of the Itential, that is pretty much tied to that compliance requirement. At the end, we’ll also see how that looks like, how it thinks through this process, and how it generates the whole flow. Are you ready for the live demonstration?

    Rich Martin • 09:00

    Yeah, let’s take a look.

    Ankit Bhansali • 09:02

    Let’s do it. Let me share my screen real quick. So, what you’re seeing right now is the cloud client here by Anthropic. And what we are doing is going to put in that prompt, which we talked about. In this prompt, we are focusing on mostly PCI DSS, and there’s a few things we are asking you to do here. And I’ll just paste the prompt here so I can read it out loud. So, what I’m going to do is just going to keep the instructions simple. I can be very robust and comprehensive in terms of what I want, but what I’m asking it is to go research.

    Ankit Bhansali • 09:46

    So, I’m going to enable the research mode. So, what I want it to do is go out, research the PCI DDS documentation, which was 300, 400 pages, understand what the requirements are, and then build a golden configuration tree inside of the Identical Platform for Cisco iOS devices, and we’ll see this in action. Is there any comments from you before we hit this?

    Rich Martin • 10:10

    Yeah, no. So, I think just to point out that in this particular case, we’re doing PCI DSS. This could be NIST, this could be HIPAA, this could be any number or all of them, right? In order to generate this along with, and this is what really makes this unique, is really two things. it’s the standard you want to adhere to, the set of network or firewall that is vendor specific to what you’re using, right? In this case, Cisco iOS, and we could have gotten really specific with it, but you know, this is good enough for a demonstration. And the fact that it’s building it within our own, within the ITENTIAL platform in a way that’s directly usable.

    Rich Martin • 10:50

    And that kind of magic right there is by using the MCP server that’s attached to the Itential platform that you’re using. So the AI can understand the format and how to operate within our platform to build these configuration templates. And again, think about all the time this is going to save somebody, especially if they have to do this multiple times for multiple specs or multiple audits a year.

    Ankit Bhansali • 11:17

    Yeah, and I mean, I know you have done this a lot of time in your previous jobs where you have to do compliance. So you know for a fact this is not a single person effort, right? No, it’s not. So it’s a team that goes behind the scene and there’s a lot of folks that are being called. So if you can see, we put in the request already and it’s going to start processing information. Let’s, I think we had an error, but what we’ll do is we’ll try to send this one more time. Okay.

    Ankit Bhansali • 11:47

    So I’ll stop Claude or maybe change the interface. Let me try it one more time with the new chat bot. There you go. So same requirements and There you go. So this time it’s working. And like I said, the live demos, right?

    Ankit Bhansali • 12:11

    So guess what it did? It went out and it reviewed 10 different websites. And you can see from a requirement standpoint. This is crazy because if I asked you to do it, I’m sure you’re gonna do it. The team can do it, but you’ll have to spend hours, not just hours, it’s gonna be multiple months to understand a list of requirements, build a plan, associate the tool set, and then build an execution plan for your auditors to have those reporting capabilities. Because somebody has to ship this information back to the auditors. And while I’m talking, it basically ran through all of these 10 websites.

    Ankit Bhansali • 12:51

    And then it’s trying to start building things already in matter of like minutes. So if you can look, it’s pretty much processing and trying things out by itself using the Intentional MCP servers with the PCI DSS 4.0 requirements.

    Rich Martin • 13:07

    Yeah, and I’m reading right here that it’s actually going to structure it in a modular way. So I’m excited to see what that looks like once it builds everything. Right? Because yeah, in my previous life, like I said, I did some PCI auditing as a consultant.

    Ankit Bhansali • 13:24

    and you know the documentation was always a very time-consuming piece of it not only the research and the generating the configurations but the documentation as well. Wow that is awesome and and you have seen see I mean this is awesome but you have seen the real pain of doing it by hand and selecting the tool set and everything right but if you look at this it basically ran through all of these 10 links the documentation around it the guide I mean it went through the whole PCI DSS 4.0.1 2025 guide real-time while we are talking and it it created the tree and if you remember I told it to call it AI demo as my tree name and that’s exactly what it did and it’s it’s pretty much trying to add child node based on on the capabilities which is again making it very modular and and and very design friendly for for maintaining this tree going forward. So, Rich, you will not believe it did a pretty damn good job and excuse my language here, but this is so awesome. Like we gave requirements, go out on the internet, read through the documents, try to figure out the requirements for PCI DSS. And we said the target device is going to be Cisco iOS device from a network perspective. And we also suggested that we want to make sure you modularize and design it in a way which is easy to maintain. Going towards this, it was able to then read the documents, create a bunch of nodes, which is child node inside of the platform from the information that it got from a standard. And it just keeps going on and it tells you how modular things are from a design perspective.

    Ankit Bhansali • 15:11

    And Rich, this is the best part. Once I click on this document, it gives a complete summarization of what happened and how it designed it and why it chose this design.

    Rich Martin • 15:23

    This is this is exactly the kind of use case that AI is optimal for when it comes to how it intersects with audits, security, network, firewall. The ability to not only generate the golden configurations is a time-consuming task we’ve talked about, but think through how much documentation time has just been saved as well to the point where it matches up one for one to not only the section policy that it’s covering to the configuration it’s it’s implemented. I mean I don’t think in the history of me or the people I worked with doing this kind of compliance audits or customers that have to suffer through an audit, I don’t think in the whole history they’ve ever generated a report that would make the auditor happy. I think maybe we just might have done that right here. An auditor could look at this and see how it corresponds not only the the very specific sections of the PCI DSS spec, but also here’s what it looks like turned into a set of config, golden config compliance templates inside the ITENTIAL platform that ultimately get used to generate real-time audits and reports on the network.

    Ankit Bhansali • 16:36

    That’s super exciting you I think you said something this I guarantee you. This is definitely a world record creating compliance Template on one of your compliance framework, which is PCI DS DSS And it’s I hundred percent believe that’s the case because I have done this so many times building things, right? You got to learn you got to research and you got to understand and then build it and don’t forget the network Configuration that comes with the template like we still have to show you the attention side of the world. Yeah. Yeah documentation side like it is totally Mind-blowing here that that how accurately it understood the task and build something which is very valuable to organization, which would take months and months. Again, don’t forget, this is not a one-time thing. You’re going to have to do this again tomorrow, which means we made it so easy with Itential that by just running a bunch of commands, you are generating a compliance structure templatized in the platform for that new requirements, without having to learn anything new from that whole document which we have to study otherwise.

    Rich Martin • 17:51

    Yeah, no, I think the point needs to be made is the fact that this was impossible to do a week later or a day later, right? But now it’s possible to do this because it doesn’t take an army of people anymore. It takes all of the pieces and parts that we’ve put together here. It’s the ITential platform plus the MCP server plus a language model and the prompting, and boom, you could generate this every week if you really wanted to, which like I said, would have been impossible up until now.

    Ankit Bhansali • 18:21

    Yeah, so before I move into the platform, you got any comments?

    Rich Martin • 18:25

    No, I’m just awestruck by how great this is. So let’s go into the platform and see the magic that it’s done there.

    Ankit Bhansali • 18:32

    Yeah, because I think that would help us understand and we’ll see how good it actually designed it because on the documentation side, so far it looks good. And you have to also understand, I did not click. It understood the task and it did it by itself. So let’s take a look. Let me stop sharing. I’ll share one more time. Okay.

    Ankit Bhansali • 18:52

    There we go. Let me know if the Itential platform is coming through. Yep. I see it. Perfect. So now, moment of truth, we go to Config Manager. Let me zoom out a bit. Let me go to Config Manager. Itential talks to multi-vendor and all good bits, but our focus here is golden configuration.

    Ankit Bhansali • 19:17

    Boom. If you remember, we talked about naming our tree as AI demo. Let’s click into it.

    Rich Martin • 19:26

    Boom. This is amazing. If people aren’t familiar with the Configuration Manager application, it’s an application inside of our platform that does config compliance, device configuration backups, and basically how to manage your configuration throughout the lifetime of whatever devices. We support all the major vendors, all the major CLI formats, and we support API so that we can do things like talk to controllers and do golden configurations for JSON representations of configurations or something in AWS or Azure, any cloud. If it’s got an API, we can do the same thing here. When you really couple the flexibility of this application, our platform, and its ability to go across all the infrastructure, whether it’s virtual, Cloud, physical, CLI, API, along with what we’ve just shown here, you can really start to imagine the value that this will have for basically everybody out there that has to maintain. compliance across the board, according to some sort of specification. But okay, so let’s dig a little deeper into this, because this is really awesome.

    Ankit Bhansali • 20:43

    Yeah, so if you look at the breakdown, right? So when it went out and understood the requirements, when we suggested we want modular design, it started categorizing things into something that is directly related to PCI, which is there’s a network security control, secure configuration, data protection, strong cryptography. We have authentication, logging monitoring. So, this is where I think a combination of a network engineer with AI and Itential creates this amazing triangle where you can get the expertise from the network engineers to review the design and the configuration templates built by AI in the Itential platform. And it makes it easier for organization to not just maintain this, but also run it at scale because now, once this is baked in and you have it ready, you can keep scheduling compliance reports pretty much every day or at the end of the business day just to make sure things are working accurately and your network is healthy. And you don’t have to have that surprise panic attack whenever somebody asks for a compliance report, especially the auditors. So, now you are much more prepared and in advance and you have.

    Ankit Bhansali • 22:03

    requirements that’s been generated from an actual documentation for that particular year. So there’s a lot of good bits and I mean, it took longer for us to talk through this than for AI to understand the requirements and build the GC with the configurations which are embedded inside of this.

    Rich Martin • 22:22

    So can we take a little deeper look into the generated configurations?

    Ankit Bhansali • 22:26

    Yeah. Let’s take a look at the, do you have any preference or?

    Rich Martin • 22:30

    No, no, no. Just walk us through.

    Ankit Bhansali • 22:31

    Okay, perfect. So I just picked this one network segmentation and boom. If you look at this thing, it is a templated with variable eyes and it’s giving you an example of what a good configuration should be with respect to the PCI audit and you can see it’s already variable eyes things for you. So now if you also see it also gave a list of variables that are pretty much defined across the tree and it’s giving you some understanding of what’s possible here. So you can see the configuration where VLAN in this case 300 is management VLAN. There’s a DMZ VLAN. And it’s telling you which VLAN is the DMC VLAN on the interface. So it’s giving you that template construct without having to reinvent the whole process.

    Ankit Bhansali • 23:19

    You can fine-tune this now, which will be much more accurately represented off your network and just run the compliance on it. I’ll click into a few things. Sure. From an ACL perspective, how many times we have heard we need compliance around ACL because that’s very critical. I think logging and authentication are a very important piece too, because you do not want authentication to be local AAA. You want it with the TACACS and not those local accounts. You want the privilege mode to be accurately represented from best practices in your organization across your devices.

    Ankit Bhansali • 23:58

    So you see it starts thinking about all of those aspects, which are directly tied to PCI DSS compliance framework.

    Rich Martin • 24:08

    Yeah. Now, this is super exciting because I think what you just said there is important. There’s two things going on here that our platform is really helping them with. Once this is generated, number one, all of these variables. These variables help you to define the specific things that are unique in your environment. Where is the Syslog server? Where is the NTP server? That’s critical.

    Rich Martin • 24:30

    And, of course, because of the way we use workflows and modularity, this is also how we can make this applicable to basically all kinds of devices in your network to run those scheduled compliance audits and reports. The second thing is the ease of tuning this. Right off the bat, I see things that I might have forgotten when I was building these things by hand for customers. Did I turn off the broadcast storm correctly? Did I set timeouts correctly? What were the timeouts again according to the PCI spec? Those kind of little things are easy to miss.

    Rich Martin • 25:09

    Human error or just forgetfulness. I look at this and I go, oh my gosh, it’s all there, it’s all consistent, it’s all ready to go. And to your point, I can go and just modify this to fit the environment. Maybe we have several DMZs instead of one. I can add that in very quickly or maybe it’s given me something else and I can change and modify that. The amount of time it saved me. as a single network engineer, working on this by myself cannot be understated.

    Rich Martin • 25:37

    This is an amazing amount of time-saving work. It is literally one of the perfect use cases for AI plus Itential. And the impact it could have for an organization on the security, compliance, performance, all of that, just passing an audit without any problems and having the backend documentation match everything that’s just been generated here, just like I said, I’m just struck by how much time, because it’s been personal for me. I know.

    Ankit Bhansali • 26:08

    This is amazing. Yeah, and it’s a team effort. It’s not an individual effort when you’re doing it for organization, right? Now, imagine your team can now start giving guidelines rather than having to sit through this whole process, which would take months. And we have talked to a lot of customers. When they go global, they have auditors from different regions that one auditing reports and their requirements are different. So now you have to set up these kinds of sessions, which are like three day, seven day sessions across the board with bringing all your engineers, spending time building these reports and then shipping those reports so that it’s accurately representative of that region and the device structure.

    Ankit Bhansali • 26:50

    There’s one more thing, Rich, because this is only Cisco iOS, right? And we know we have large customers with multi-vendor devices. Right. Imagine getting a NIST across your vendor portfolio or PCI across your network portfolio. That’s just game changing because now you do not spend time building everything by hand. You leverage the right tool for the right job. And in this case, to your point, and you keep making that point is AI is very good at this.

    Ankit Bhansali • 27:20

    So why should we not leverage this? Because we are not changing the network if you understand in this concept, right? Because especially from an infrastructure and network perspective, a lot of our leaders are very skeptic when launching that AI on the network, right? In this case, I can show being that software platform middle layer, you can start leveraging AI in the platform to build things and then accurately run it against your network, having that consistent and definitely with really good guardrails, which gives you that visibility across each run and processes.

    Rich Martin • 27:57

    Yeah, yeah, great point. This is, like I said, this is a great way to leverage a tool like AI in a way that’s, I would say, responsible, safe, and impactful, right? It’s not running around making tons of changes on the network, but it’s guiding the governance based off of all of the amount of documentation that somebody would have to go through. and now generating it in a way that makes breezing through this and the different people that now the participation across the team across the different vendors you’re not thrown for a loop oh my gosh we’re deploying in Europe that’s a different standard you’re not thrown for a loop oh my goodness we’re you know we just bought another company and they’re using a different vendor we don’t know how to generate things like that for a Juniper and Arista now actually you can do it no matter what with this kind of technology and I tension yeah I think it scales up the collaboration with AI network engineers and and organizations because a network engineers can now leverage AI to build something like this and organize and get that benefit with intentional platform which is multi-vendor multi-domain so imagine you now do this for your PCI you do it for NIST SOC and do it for operating system right

    Ankit Bhansali • 29:14

    What you can do next is couple a lot of these things together with compliance plan because as an organization I mostly care about what my network is with respect to my configuration and all the standards that are in place. With compliance plan, you can bring these individual trees as standards, and then just expose the plan as a service, which could be multi-vendor in this case. At the end of the session, I will just give you a quick, once you have built this and you run this, you should get a very prettified report which shows you what’s missing and what’s out of compliance, and which is great to understand because now your team can go fix it, rerun this whole process one more time by just running the plan and make sure things are healthy so they can send that report to the auditors.

    Rich Martin • 30:05

    There you go. I think along with that too, the ability to integrate with the different systems for the documentation itself. Generating the report, that’s fantastic, but it’s got to be stored somewhere. A lot of times we want to track things with a ticket service now or some other JIRA or something like that. The ability for Itential to integrate in those systems and then to update all the documentation in one place, so that when audit time comes, not only do you have all the reports, but you have all the tracking, the changes, all the other ancillary things they’re looking at as well to ensure everything is tip-top and secure.

    Ankit Bhansali • 30:45

    Yep. So let me just bring it out the report. You can take a look at that. So I’m going to bring up a previous run report, right? And that’s pretty much a multi-vendor idea that I am a Cisco shop. I want to do iOS, XR and XOS. We can do multi-vendor network where it can go from Cisco, Arista, Juniper, right? So you have different ways of consuming this. And now you can focus on what devices and what really is out of compliance based on the standard that are defined in the golden configuration.

    Rich Martin • 31:19

    Right, and in this case too, one of the things that you can also do as you kind of advance is being able to auto-remediate within a workflow, if that’s important, right? So certain things like, what was it, last year, where there was a rush to make sure all the different Cisco iOS XR devices had HTTPS turned off, why? Because there was a critical bug. Things like that. Now we, in some cases, maybe we need to definitely have a process to do remediation and changes are in a maintenance window, depending on the type of change, but there are cases where we’ve got to get these things patched up and done immediately. Remember the time to respond to something is much lower nowadays because of what’s going on in the world and so many bad actors out there. So the ability to do that within a workflow as well is there.

    Ankit Bhansali • 32:08

    Correct. And remediation with proper change management makes it so easy and without fear you can start making these changes because everything is tracked from an auditing perspective. You’re only running approved services on the network that are supposed to make a change and you’re logging all of those activities in the platform. So identifying what’s wrong and then trying to fix it with change management. This basically gives you a very healthy network and also identify any out of band changes you might be going through, which is causing all of this compliance to not work all the time.

    Rich Martin • 32:47

    Well, Ankit, this was an awesome demo. I got to say, just looking at it in real-time as you’ve done it, it is amazing to me. I am not always left without words, but now it’s hearkening back to many decades ago when we did this by hand. I know, right? How long it took. Really, it took an army and weeks of time. to where we felt we were kind of ready for the audit. And now we have the kind of tools at our disposal that can make this, I mean, almost effortless, really and truly almost effortless.

    Rich Martin • 33:30

    And it’s an amazing time we live in, an amazing set of technology. And for network engineers out there that are looking to really put a very, very colorful feather in their cap, to use an old expression, this is something you should probably be a champion of in your organization, because it’s gonna make a tremendous impact, not just for the networking team, for security team and the entire organization as a whole, the whole business as a whole.

    Ankit Bhansali • 33:58

    Yeah, and no, thank you for having me, but I really wanted to make sure people could see the potential, especially on the networking infrastructure side, because there’s a lot you can leverage AI with. And it’s not about just chatbots, which what people have been talking about. There’s more good ways to implement AI in your day-to-day processes. An organization can pretty much, I mean, you saw the level of effort here and the time we spend, right? Now, imagine just spending a couple of days to fine tune this. And we have a standard that’s ready to go and send reports to auditor instead of months to less than a week, to be honest.

    Rich Martin • 34:36

    Absolutely right. Well, again, thanks again, Ankit. I really appreciate it. Any parting words? I’m looking forward to the next thing we get to do together.

    Ankit Bhansali • 34:45

    Oh, absolutely, yeah. And I was really, to be honest, I wanted people to see the capabilities from the platform and AI and to be very serious about this technology because it is game-changing, for real.

    Rich Martin • 35:00

    Yeah, it truly is. It truly is. And it’s awesome to be a part of a company like Itential that’s tied into it and looking at the most useful ways that we can help our customers and our future customers leverage this in a safe and in a secure environment. And working with folks like you who are always on the cutting edge, looking for those opportunities, those use cases, it’s super exciting. So thanks, Ankit.

    Ankit Bhansali • 35:22

    No, thank you for having me. I appreciate it, bro.

    Rich Martin • 35:24

    Absolutely. Thank you all out there for tuning in again. If you have any questions or want more information, feel free to contact us here. And we look forward to talking to you again. Bye-bye. Bye-bye.

Watch More Itential Demos