Volume III, Issue 6 (June, 2017)
I Didn’t Know You Did That
Verus now provides Wireless Intrusion Prevention System (WIPS)
to be added to your exisiting or new Wi-Fi Solution
The proliferation of Wi-Fi across the globe has created an attractive opportunity for cyber attackers to snoop, steal, and infect unsuspecting users’ data and systems. Until now, competing WIPS (Wireless Intrusion Prevention System) solutions have relied on flawed methods of AP classification, leading to any number of critical issues.
Most competing WIPS solutions use a method of rogue AP detection that classifies many APs that are not authorized as “rogue,” which can lead to administrators inadvertently shutting down legitimate neighboring APs.
Illegally tampering with legitimate, neighboring devices can lead to angry business owners, and worse still – legal ramifications and police involvement.
For fear of shutting down legitimate neighboring APs, many admins will choose to ignore or turn off notifications altogether. This leaves them without a means for automatic prevention in the event of a threat, in addition to increased time spent manually examining every unauthorized device.
Luckily, there’s WatchGuard WIPS. Using patented Marker Packet techniques, WatchGuard WIPS automatically classifies wireless clients detected in the airspace as Authorized, Guest, Rogue, and External. As a result, it eliminates false alarms and saves administrators the effort and time of defining complex rules to identify rogue wireless devices.
With Verus and WatchGuard, businesses can deliver the high performance wireless connectivity their users demand— without compromising on security— by utilizing the world’s leading WIPS technology.
If you’d like to learn first-hand about WIPS and WatchGuard’s secure Wi-Fi, join us Tuesday, June 20, from 3:00 p.m. to 6:00 p.m. at Wildfire Eden Prairie, 8251 Flying Cloud Drive, Eden Prairie, MN 55344. To register, please visit the link below:
Tegile Unveils Option To Refresh
Storage Controller Independent Of Storage Media
All-flash and hybrid-flash storage vendor Tegile Systems on Wednesday, May 31, unveiled a new program under which customers can upgrade their storage controllers every three to five years without replacing the storage media. This will help customers reduce capital spending on their storage arrays, Tegile said. Under Tegile’s new Lifetime Storage Controller Refresh program, customers now have a choice of refreshing just the controller or refreshing both the controller and media, said Rohit Kshetrapal, CEO of the Newark, Calif.-based company. Both the existing Lifetime Storage program, which provides a new full-array refresh, and the new Lifetime Storage Controller Refresh program can be ordered as part of Tegile’s maintenance contract, turning those refreshes into an operating expense, the company said.
Partners Reflect On Selina Lo’s Legacy As The Ruckus Wireless CEO Departs
Ruckus Wireless’ CEO since 2004, Selina Lo, is set to leave the company at the end of this month. Lo led the company until it was sold to Brocade Communications for $1.2 billion last year and partners have high praise for her leadership. “Her DNA has been firmly instilled into Ruckus which has enabled Ruckus to survive such upheavals and transitions in the last 24 months,” said Gary Berzack, CTO and COO of New York-based eTribeca, a networking solution provider and longtime Ruckus partner. Berzack was alongside Lo during Ruckus’ IPO at the New York Stock Exchange in 2012. “All the employees that have worked directly for her have always felt that she’s been a driving force and has been dedicated. I have never met anybody who has felt that she was lacking in executive leadership and that’s part of the success of Ruckus — a consistent executive team,” he said. “She ran an organization with less than 30 people into one with over 1,000.” Brocade confirmed that Lo will be leaving the company at the end of May. The company said she is retiring.
Cloud Security Vendor adds Multi-Factor Authentication
to further bolster Unified Security Service Platform
CensorNet, the complete cloud security company, has announced the integration of Multi-Factor Authentication (MFA) into its award winning Unified Security Service (USS) Cloud platform. In doing so, CensorNet is providing organizations with a ‘single pane of glass’ for full visibility and control of web, authentication, cloud applications and email. With the majority of network breaches still involving weak or stolen passwords where hackers simply log-in and have undetected access to systems and data, CensorNet’s robust MFA capability stops these threat actors in their tracks. Its integration with CensorNet USS means organizations can now simultaneously protect employees against both cyber threats and accidental or intentional leaks of sensitive data, while keeping the business safe from the risks associated with cloud applications and Shadow IT – all with complete visibility through a single, centralized management dashboard. “This integration marks the latest step in helping SMEs and enterprises alike correlate security events with full real-time visibility and control across all devices in a single solution,” explains Ed Macnair, CEO of CensorNet. “There’s a perception that threat actors from around the world are using increasingly sophisticated means of attack, but the fact remains that 81% of hacking related breaches are still linked to either stolen or weak passwords. This technology achievement stems from our tireless efforts to take what our customers tell us about their security management concerns to create a unique end-to-end proposition spanning their entire IT estate.”
News & Notes
Successful Ransomware Presentation and Happy Hour at Pinstripes-Edina
Verus customers in attendance at a Ransomware Presentation and Happy Hour hosted by Verus and WatchGuard were able to see how WatchGuard’s Threat Detection & Response (TDR) works in real time with a live demo. WatchGuard’s Ryan Poutre first detailed the history of ransomware from it’s early stages up to the most recent “WannaCry” cryptolocker. He then fired up the live demo showing what would happen if you tried to implement ransomware on a network protected by TDR. The result: nothing. The ransomware was unable to do it’s intended harm.
Following the presentation, attendees were able to network and enjoy great food and drinks. In fact those in attendance were so busy enjoying the discussions, food and drink that nobody ended up taking advantage of the bowling or bocce ball activities planned for the event.
Food For Thought
Throw your garden in a bowl with this Pesto Pasta salad
Prep time: 20 mins
Cook time: 20 mins
- 1 lb. spaghetti
- 2 ears corn, shucked
- 1 medium yellow squash, cut into 1/2″-thick slices
- 1 medium zucchini, cut into 1/2″-thick slices
- 1 small bell pepper, seeded and cut into sixths
- 4 green onions, trimmed
- 2 tbsp. olive oil
- 1 lemon
- 1/2 c. store-bought refrigerated pesto
- 1 pt. grape tomatoes, halved
- 1/4 c. packed fresh parsley, chopped
- Heat grill on medium-high. Cook spaghetti as label directs. Rinse, drain well and let cool completely.
- In large bowl, toss corn, squash, zucchini, bell pepper and onions with oil and 1/2 teaspoon each salt and black pepper until well coated. Grill corn, turning, 10 minutes or until charred in spots.
- Grill squash, zucchini and bell pepper 4 to 6 minutes or until tender and grill marks appear, turning once. Grill onions 2 minutes or until tender and slightly charred, turning occasionally.
- Into large bowl, from lemon, grate 1/2 teaspoon zest and squeeze 2 tablespoons juice. Whisk in pesto and 1/2 teaspoon each salt and pepper.
- Chop squash, zucchini, pepper and onions; add to bowl with pesto. Cut kernels from cobs; add to bowl along with tomatoes, parsley and cooked pasta. Toss to combine. Serve at room temperature.