2014-09-11

What’s New at Comm Solutions?

Case Study: Large Public School District Implements Aruba ClearPass

Comm Solutions Company was engaged at the school district to install and configure a NAC solution to replace its existing solution.

The school district needed a solution that allowed its users to connect securely with 802.1X on both wireless and wired connections. This included connecting on Aruba and HP switches in addition to its existing Aruba WLAN controllers. Devices that did not support 802.1X authentication (printers, IP phones, etc.) also needed to be able to be securely connect to the network.

Comm Solutions Company recommended Aruba’s ClearPass Policy Manager as a solution to integrate with both its wired and wireless networks. The ClearPass solution ensures secure access for all teachers, administrative staff, and students. Also, ClearPass Guest fulfilled the need for a secure guest access solution.

Read Full Case Study

__________________________________________________________________________

Comm Solutions New Account Manager 

Gregg Waller joined Comm Solutions in April 2014, covering the Mid-Atlantic region.  He brings over 23 years of IT sales experience with companies such as GE Capital ITS, Dimension Data and other regional systems integrators.  He specializes in Data Center Optimization solutions and helps customers with their long term strategies for reducing costs and increasing efficiencies within their IT environment, including server/storage virtualization, software defined networking, cloud initiatives and security solutions.

Read Full Bio

__________________________________________________________________________

Monthly Tech Buzz

Establishing A ‘Zero-Trust’ Infrastructure
By: Tony Tanzi, Network Infrastructure Practice Leader

When looking at a security posture, the main concern is usually about blocking a potential attacker who sits outside our network from getting inside our network. This is often referred to as perimeter defense. While this is a very important security issue to be concerned with, it is not the only one.

There is a new paradigm to be concerned with,  protecting your sensitive data from a potential breach from the inside.  This new paradigm is the ability to create a ‘zero trust’ infrastructure.  This means that there is no default trust for any entity on the network. This includes users, devices and applications. By establishing ‘zero-trust’ boundaries, you are in essence compartmentalizing segments of your network. This compartmentalization allows you to positively control who has access to critical resources. It also can allow you to control the user access, applications being used and scanning for any potential threats as the user accesses the resources you are allowing them access to.  This is just another step in reducing the exposure of vulnerable systems, and prevent the lateral movement of malware throughout your network.

Some of the concepts around a ‘zero-trust’ networks are the ability to provide secure access to the network, this means via a remote VPN session or having to authenticate to access the network. Another piece of the ‘zero-trust’ network is the ability to inspect all traffic. This inspection should be done at the application level so that we don’t run into issues such as application port hopping. The goal here is to provide the designated users with only the required access to perform their job function.

Read Full Article

The post September 2014 appeared first on Comm Solutions.

Show more