Menu
800-795-7559
Facebook Linkedin Twitter Youtube
Call Us Today 800-795-7559
Facebook Linkedin Twitter Youtube

Tech Buzz

AV-TEST Advanced Threat Prevention Test

By: Courtney Morrison,  Systems Administration Engineer In December 2016/January 2017, Cylance commissioned AV-TEST to perform an advanced threat prevention test of enterprise endpoint protection software. The program was put together basically to produce and contribute additional testing to the Anti-Virus protection tests already produced by AV-TEST. To do so, CylancePROTECT’s solution was put up against […]

Read more

Why does SSL decrypted sessions get marked as Application SSL in Palo Alto Firewall?

By: Saravanan Manoharan, Network Engineer We know that when SSL decryption is enabled in the Palo Alto firewall, it’s supposed to give us visibility of the encrypted traffic flowing in the network. Therefore, we would expect App-ID feature to identify such decrypted traffic as the underlying applications such as web-browsing, Facebook-base, Gmail-base or other, but […]

Read more

What is a Hyper-Converged Infrastructure… and why use it?

By: Scott Drucker, Security Engineer Back in the day, cloud was the big buzzword.  Are you in the cloud? Have your started to use the cloud? Every company, big or small, was offering some sort of cloud solution. Today, cloud is mainstream. The new buzzword in my opinion is hyper-converged.  Sounds like a mouthful.  Say it with […]

Read more

Palo Alto Networks: Session Distribution on a PA-7000

By: Tony Tanzi, Advanced Solutions Architect The PA-7000 is a chassis based solution. As such, the way that packets can be distributed is a configurable option. The thought around this is since the chassis operates in a scalable architecture with a high speed backplane, you may have additional NPC cards in the chassis that are only […]

Read more

IoT and the Impact on Wireless Networks

By: Michael Haring, Senior Mobility Engineer Traditionally, wireless networks were considered a luxury, as well as highly unreliable and unsecure. Over the past 10 years, wireless networks have exploded in popularity and have made huge advances in the capabilities that wireless provides. Until recently, wireless networks were primarily used by devices that had an end-user […]

Read more

2017 Cybersecurity Predictions: Service Providers Confront IoT Security

This post is part of an ongoing blog series examining “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity in 2017.  Based on the trends we are seeing within the mobile industry, here are some predictions for 2017: Sure Thing: Cyberattackers will target […]

Read more

The Adaptive Trust Model with ClearPass Exchange

By: Douglas M. Schiel, Senior Network Engineer An open, vendor agnostic, context rich approach to network policy management has long been part of the ClearPass Policy Manager DNA.  For the uninitiated, ClearPass Policy Manager is a powerful network policy management tool (think NAC) that can use detailed, context-based awareness to make granular policy decisions about a […]

Read more

Business Agility with Riverbed SD-WAN

By: Tony Tanzi, Advanced Solutions Architect Being able to pivot on a moment’s notice to deliver applications is a very powerful business tool. Likewise, the ability to deliver these applications to a new location in a very short time frame with minimal and consistent effort becomes a game changer. The hybrid WAN provides the following: Mix, augment […]

Read more

HPE/Aruba Tunnel Node: Unifying Wired and Wireless Edge

Learn what the Tunneled Node feature is and how to leverage an Aruba Mobility Controller to control user traffic on a per-port basis on Aruba OS switches. http://community.arubanetworks.com/t5/Technology-Blog/Tunneled-Node-for-Campus-Switches/ba-p/282827

Read more

Palo Alto Networks Enhanced External Dynamic Lists Feature

By: Tony Tanzi, Advanced Solutions Architect Prior to version 7.1, Palo Alto Networks firewalls had a feature called ‘dynamic block list’.  This was a list of IP addresses, ranges or subnets that could be ingested by the firewall at pre-determined intervals from an external web server. The name ‘dynamic block list’ was a bit misunderstood as this was […]

Read more

1 2 3 7

Copyright © 2017 Comm Solutions. All rights reserved. Privacy - Terms - Sitemap - Terms & Conditions