Menu
800-795-7559
Facebook Linkedin Twitter Youtube
Call Us Today 800-795-7559
Facebook Linkedin Twitter Youtube

Blog

Network Services & IT Service Provider – Comm Solutions

As an end-to-end IT service provider, Comm Solutions brings extensive and deep knowledge and experience in the design, development, deployment, and support of enterprise-level solutions for servers, storage and infrastructure. We are an IT service provider capable of an almost infinite level of flexibility and customization. Consequently, our IT network services range from all aspects […]

Read more

An Introduction to 802.11ac

Learn more about the new 802.11ac enterprise wireless LAN standard in this technology overview from Aruba Networks as we review the benefits that deliver: higher performance, improved range, extended battery life and better security for your Wi-Fi network.

Read more

Palo Alto Networks and Cyvera: Delivering a Next-Generation Enterprise Security Platform

Nine years ago, Palo Alto Networks forever changed the network security industry with the introduction of the next-generation firewall. This breakthrough architecture brought unparalleled control through the safe enablement of applications, and exceptional levels of protection by blocking all known threats operating across a multitude of different vectors. Two years ago, Palo Alto Networks again […]

Read more

Brocade and Aruba Networks Solutions

Brocade and Aruba have partnered to deliver an open standards-based, secure, and compliant unified campus network solution that reduces complexity and supports secure mobility, BYOD initiatives, and emerging technologies such as Software-Defined Networking (SDN).

Read more

Nimble Storage Scale Out Architecture: Release of NimbleOS 2.0.7.0

Posted by: Lee Gitzes, Pre Sales Enterprise Architect For the last several years Nimble Storage has been disrupting the storage industry by providing incredible performance and huge capacity in a small package. Services such as VDI, email and databases that require high performance as well as capacity, fit perfectly in to the power that Nimble […]

Read more

Attack Surface Reduction

Protecting yourself from the various cybersecurity attacks is more than just implementing the latest and greatest technologies. There should also be a thought process of pro-actively reducing the attack surface to limit what is exposed as well in conjunction implementing these new technologies that can detect the ever elusive new cyberthreats. While there is still a great deal of Zero day malware that is being detected, a great majority of attacks still try to take advantage of known vulnerabilities.

Read more

Fortinet Heartbleed Bug Advisory

  By now, many of you have heard of the Heartbleed bug, which is a recently disclosed vulnerability that was discovered in OpenSSL versions 1.0.1 through 1.0.1f.  This vulnerability may allow an attacker to access sensitive information from memory by sending specially-crafted TLS heartbeat requests. Despite the media hype about this vulnerability, it is worth calling […]

Read more

8 Tips For Dealing With Heartbleed Right Now

POSTED BY: Rick Howard on April 12, 2014 6:25 AM This has been a fun week. We have not had a significant cyber event like this – something that affects just about everybody on the Internet — since the Kaminsky DNS vulnerability of 2008. Everybody I know has been scrambling to understand what it means to their organization, […]

Read more

Heartbleed Vulnerability: Impacts and Countermeasures (F5 Networks)

What is vulnerable? The Heartbleed vulnerability is in the widely used OpenSSL versions 1.0.1 – 1.0.1f.  Only F5 BIG-IP versions of 11.5 include the 1.0.1 OpenSSL versions. You can stop reading if you are pre-11.5. You are perfectly safe if you are running any version before F5 BIG-IP 11.5. The vulnerability is within OpenSSL.  F5 […]

Read more

OpenSSL 1.0.1 library Heartbleed vulnerability – Aruba Networks update

SUMMARY There is a very serious vulnerability that has been discovered in the OpenSSL 1.0.1 library. This vulnerability can allow an external attacker to extract segments of memory from a remote system without leaving any traces. This memory could contain vital security information, including private keys. These keys, in turn, could be used to mount […]

Read more

1 2 3 4 52

Copyright © 2014 Comm Solutions. All rights reserved. Privacy - Terms - Sitemap - Terms & Conditions