Menu
800-795-7559
Facebook Linkedin Twitter Youtube
Call Us Today 800-795-7559
Facebook Linkedin Twitter Youtube

Tech Buzz

Why does SSL decrypted sessions get marked as Application SSL in Palo Alto Firewall?

By: Saravanan Manoharan, Network Engineer We know that when SSL decryption is enabled in the Palo Alto firewall, it’s supposed to give us visibility of the encrypted traffic flowing in the network. Therefore, we would expect App-ID feature to identify such decrypted traffic as the underlying applications such as web-browsing, Facebook-base, Gmail-base or other, but […]

Read more

What is a Hyper-Converged Infrastructure… and why use it?

By: Scott Drucker, Security Engineer Back in the day, cloud was the big buzzword.  Are you in the cloud? Have your started to use the cloud? Every company, big or small, was offering some sort of cloud solution. Today, cloud is mainstream. The new buzzword in my opinion is hyper-converged.  Sounds like a mouthful.  Say it with […]

Read more

Palo Alto Networks: Session Distribution on a PA-7000

By: Tony Tanzi, Advanced Solutions Architect The PA-7000 is a chassis based solution. As such, the way that packets can be distributed is a configurable option. The thought around this is since the chassis operates in a scalable architecture with a high speed backplane, you may have additional NPC cards in the chassis that are only […]

Read more

IoT and the Impact on Wireless Networks

By: Michael Haring, Senior Mobility Engineer Traditionally, wireless networks were considered a luxury, as well as highly unreliable and unsecure. Over the past 10 years, wireless networks have exploded in popularity and have made huge advances in the capabilities that wireless provides. Until recently, wireless networks were primarily used by devices that had an end-user […]

Read more

2017 Cybersecurity Predictions: Service Providers Confront IoT Security

This post is part of an ongoing blog series examining “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity in 2017.  Based on the trends we are seeing within the mobile industry, here are some predictions for 2017: Sure Thing: Cyberattackers will target […]

Read more

The Adaptive Trust Model with ClearPass Exchange

By: Douglas M. Schiel, Senior Network Engineer An open, vendor agnostic, context rich approach to network policy management has long been part of the ClearPass Policy Manager DNA.  For the uninitiated, ClearPass Policy Manager is a powerful network policy management tool (think NAC) that can use detailed, context-based awareness to make granular policy decisions about a […]

Read more

Business Agility with Riverbed SD-WAN

By: Tony Tanzi, Advanced Solutions Architect Being able to pivot on a moment’s notice to deliver applications is a very powerful business tool. Likewise, the ability to deliver these applications to a new location in a very short time frame with minimal and consistent effort becomes a game changer. The hybrid WAN provides the following: Mix, augment […]

Read more

HPE/Aruba Tunnel Node: Unifying Wired and Wireless Edge

Learn what the Tunneled Node feature is and how to leverage an Aruba Mobility Controller to control user traffic on a per-port basis on Aruba OS switches. http://community.arubanetworks.com/t5/Technology-Blog/Tunneled-Node-for-Campus-Switches/ba-p/282827

Read more

Palo Alto Networks Enhanced External Dynamic Lists Feature

By: Tony Tanzi, Advanced Solutions Architect Prior to version 7.1, Palo Alto Networks firewalls had a feature called ‘dynamic block list’.  This was a list of IP addresses, ranges or subnets that could be ingested by the firewall at pre-determined intervals from an external web server. The name ‘dynamic block list’ was a bit misunderstood as this was […]

Read more

Planning Security for the Ever Increasing IoT

The Internet of Things is real, and is a near-future technological shift. By 2020, there will be 50 billion data-spouting devices connected to the Internet. And they’re already changing how we live and work; as well as generating a great deal of fear for security professionals. The network is becoming the common ground for device […]

Read more

1 2 3 7

Copyright © 2017 Comm Solutions. All rights reserved. Privacy - Terms - Sitemap - Terms & Conditions