Menu
800-795-7559
Facebook Linkedin Twitter Youtube
Call Us Today 800-795-7559
Facebook Linkedin Twitter Youtube

Partners

Cylance Makes New Feature Available: CylanceProtect with OPTICS

By: Courtney Morrison, Systems Administration Engineer It is being stated that many endpoint security solutions and companies had almost given up on the concept of protection; some stating that antivirus is, in fact, “dead”. Cylance is one that is standing out within their industry because they have seen the response to that mindset resulting in […]

Read more

Comm Solutions Recognized as East Partner of the Year at 2017 Aruba Americas Partner Summit

Malvern, PA – March 17, 2017 – Comm Solutions today announced that it has been honored as Aruba’s East Partner of the Year at the 2017 Aruba Americas Partner Summit, held in Nashville, Tennessee, February 27-March 1, 2017. The annual Top Channel Partner awards recognize the achievements of the leading Americas channel partners for Aruba, […]

Read more

Why does SSL decrypted sessions get marked as Application SSL in Palo Alto Firewall?

By: Saravanan Manoharan, Network Engineer We know that when SSL decryption is enabled in the Palo Alto firewall, it’s supposed to give us visibility of the encrypted traffic flowing in the network. Therefore, we would expect App-ID feature to identify such decrypted traffic as the underlying applications such as web-browsing, Facebook-base, Gmail-base or other, but […]

Read more

Palo Alto Networks: Session Distribution on a PA-7000

By: Tony Tanzi, Advanced Solutions Architect The PA-7000 is a chassis based solution. As such, the way that packets can be distributed is a configurable option. The thought around this is since the chassis operates in a scalable architecture with a high speed backplane, you may have additional NPC cards in the chassis that are only […]

Read more

Protect Yourself with Advanced Endpoint Solution – “TRAPS”

By: Saravanan Manoharan, Network Engineer Traditional antivirus (AV) burdens organization with hidden costs while providing little to no real security value. Traditional AV is NOT the solution for preventing security breaches on the endpoint – it is the problem! Organizations must replace their traditional antivirus with more advanced technologies. Palo Alto Networks’ “Traps” provides superior security value, not just in […]

Read more

Palo Alto Networks – PAN-DB URL Filtering Category Updates

By:  Vince Vevea, Senior Network Engineer For anyone using Palo Alto Networks (PAN) PAN-DB URL Filtering subscription, there have been several new categories added since the original list was provisioned.  The category of ‘dynamic-dns’ was added several years ago.  Content release 602 (August 2016) introduced the following three new categories.  These were released with a […]

Read more

Palo Alto Networks: SYN-ACK Issues with Asymmetric Routing

By: Tony Tanzi , Advanced Solutions Architect Common Issues Web site not loading Applications not working as expected Symptoms In most cases you may see the application listed as ‘incomplete’. This is often the result of the TCP three-way handshake not completing. Cause By default, the TCP reject non-SYN flag is set to yes. This means […]

Read more

Carbon Black Defense: What is Sensor Bypass Mode and When to Use It?

By: Scott Drucker, Security Engineer Carbon Black Defense has a nice feature called Bypass mode that can be used when deploying sensors in the field. Sensors in Bypass mode are NOT actively protected, however, they will continue to check-in with the Cb Defense backend.  No activity will be monitored or logged and no policy rules […]

Read more

F5 BIG-IP Memory Leak

This is only a violability if your organization were to turn on a feature that is not very commonly used. As an Administrator, you should verify this feature has not been enabled. The feature is called “Session Ticket”, which enables RFC 5077 [handling of mechanism that enables the Transport Layer Security (TLS) server to resume sessions and avoid keeping per-client […]

Read more

2017 Cybersecurity Predictions: Service Providers Confront IoT Security

This post is part of an ongoing blog series examining “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity in 2017.  Based on the trends we are seeing within the mobile industry, here are some predictions for 2017: Sure Thing: Cyberattackers will target […]

Read more

1 2 3 41

Copyright © 2017 Comm Solutions. All rights reserved. Privacy - Terms - Sitemap - Terms & Conditions