Archive for October, 2016

Palo Alto Networks Named a Strong Performer in Endpoint Security Report

Friday, October 28th, 2016

Palo Alto Networks®, the next-generation security company, today announced that its Traps™ advanced endpoint protection offering was recognised by Forrester® Research as a strong performer among endpoint security suite providers.

In the report, “The Forrester Wave™: Endpoint Security Suites, Q4 2016,” Forrester noted, “Palo Alto Networks offers strong malware-prevention and exploit-blocking capabilities.” According to Forrester, “As traditional approaches to endpoint security become outdated and less effective, improved threat detection accuracy and automatic containment measures will dictate which providers lead the pack.”1

The Forrester Endpoint Security Suite Wave analysed Traps version 3.3 alongside technologies from 14 other vendors using 25 different criteria. In August 2016, Palo Alto Networks released Traps version 3.4 with enhancements, including static analysis via machine learning, trusted publisher identification, quarantine of malicious executables, and grayware classification.

Quote

“We are delighted that Traps has been recognised as a ‘Strong Performer’ by Forrester in its latest report. The malware and exploit prevention capabilities of Traps alleviates the need for legacy antivirus products to protect endpoints and provides cutting-edge technology to organisations that want to prevent successful cyber breaches.”
– René Bonvanie, EVP & CMO, Palo Alto Networks

An alternative to legacy antivirus point products, Traps uniquely combines the most effective, purpose-built malware and exploit detection methods to prevent known and unknown threats before they can successfully compromise an endpoint. It is a key component of the Palo Alto Networks Next-Generation Security Platform, a natively integrated platform that safely enables applications and delivers highly automated, preventive protection against cyberthreats at all stages of the attack lifecycle.

Over 34,000 customers in more than 140 countries have chosen Palo Alto Networks because of our deep expertise, unwavering commitment to innovation, and breach prevention-oriented next-generation platform.

To learn more about Palo Alto Networks offerings, visit:
Palo Alto Networks Traps Advanced Endpoint Protection
Palo Alto Networks Next-Generation Security Platform

1 The Forrester Wave™: Endpoint Security Suites, Q4 2016, Forrester Research, Inc., October 19, 2016

Ruckus Cloudpath Simplifies Security and Policy Management

Thursday, October 27th, 2016

New Release Enables Any IT Organization to Easily Secure All Network Connections with Identity-Based Policies.

Brocade today announced the availability of Ruckus Cloudpath™ ES 5.0 software. The new release builds on previous BYOD onboarding capabilities to create a complete integrated security and policy management platform. Cloudpath ES 5.0 software enables IT organisations of any size to easily establish secure, policy-based access for wired and wireless devices.

According to IDC, the U.S. mobile worker population will grow at a steady rate over the next five years, increasing from 96.2 million in 2015 to 105.4 million mobile workers in 2020.

“The rise of a more mobile workforce has mandated that corporations adopt robust BYOD programs, which ensure productivity both in and out of the workplace,” said Nolan Greene, senior research analyst, IDC. “However, many organisations, especially those with lean IT departments, still struggle with securing device connections to the network. Organisations are therefore tasked with finding a solution that not only enables the mobile workforce but also provides enterprise-level security, something Ruckus Wireless seeks to deliver to its customers.”

Many organisations expect frictionless BYOD and a common wireless-wired policy and security experience but IT is often unable to deliver on those expectations due to the inherent complexity of modern security infrastructure. Cloudpath software simplifies the deployment of enterprise-grade security, making powerful security much more accessible to lean IT teams.

“Before Cloudpath, we struggled with authentication, provisioning, securing and connecting both our students’ and teachers’ wireless devices across our 11 sites in both California and Washington,” said Bryant Wong, chief technology officer, Summit Public Schools. “After the deployment of Cloudpath, it was seamless. It just works.”

Features and benefits of Cloudpath ES 5.0 software include:

Strong security and centralised policy management. Cloudpath software provides a simplified Public Key Infrastructure (PKI) while using industry-standard x.509 digital certificates and granular policy assignment.

A faster, better end-user experience. It takes users as little as 10 seconds to onboard each of their devices. Users don’t need to remember passwords, and no re-login is necessary when they move from network to network.

Lower IT operating expense and product licensing cost. Unique user-based licensing enables better network planning and keeps costs under control as the number of devices per person increases.

Integration with existing infrastructure. Cloudpath software works with existing wired and wireless access networks, network security firewalls, client operating systems and other common methods of ensuring security compliance.

Tight integration with Brocade® ICX® switches. Cloudpath software can now be configured to push policies dynamically with RADIUS Change of Authorization (CoA) and also perform Web authentication for wired clients.

“Managing devices, workflow and security policies has become more complex over the last decade for businesses of all sizes,” said Kevin Koster, chief architect and Cloudpath founder, Ruckus Wireless Business Unit, Brocade. “At the same time, many companies operate in various locations with multiple wireless networks. This creates complex IT management challenges. Cloudpath software addresses these pain points by delivering better security than most of our customers have now, and at a very low price. Cloudpath also works with existing infrastructure, eliminating the need to purchase and train on new, expensive and complex dedicated security appliances.”

To learn more about Cloudpath ES software and its many benefits, visit http://www.net-ctrl.com/partners/ruckus-wireless-cloudpath/.

Chichester High School Chooses Ruckus, Brocade and BNS Network-as-a-Service

Thursday, October 27th, 2016

Located in Chichester, West Sussex, England, Chichester High School for Boys and Chichester High School for Girls are secondary schools for students ages 11 to 16.

Chichester High School wanted enterprise-class wired and wireless infrastructures that could support the school’s needs for the next 10 years. “A responsive network is vital to ensuring a productive and high-quality learning experience,” said Jim Turner, Network Manager at Chichester High School.

The new network had to be easily managed in-house without requiring costly ongoing support and maintenance contracts.

Chichester High School narrowed its choices to three wired networking vendors, one of which was Brocade, as well as several wireless vendors, one of which was Ruckus. The school chose the Brocade® solution based on its technical capabilities, rapport with the Brocade team, and a game-changing purchasing option.Turner chose Ruckus for its great features and ability to deliver exactly what he wanted.

“It should be simple, but only Brocade and Ruckus got the approach right,” said Turner. “The Brocade sales team didn’t try to sell me according to their interests. Our Brocade account executive asked me exactly what I needed and that’s what I got. He knew our budget and he tailored the network to our technical and fiscal requirements.”

Not only did Turner acquire enterprise-grade networks within his budget, he was able to future-proof the school’s investment by acquiring the wired network through Brocade Network Subscription.

Brocade Network Subscription is a risk-free way to invest in new technologies, projects, and services. It allowed Chichester High School to subscribe to exactly what it needs today, with support included and no up-front cash required.

It can upgrade and expand at any time, or cancel with 60 days’ notice. By acquiring its solutions as a service, the school gains control over its network with the flexibility to navigate the future on demand.

Brocade Network Subscription allowed Chichester High School to future-proof its new network in ways that Turner had previously not imagined. Flexible terms and the ability to upgrade on demand, replace gear, or adapt the network as needed eliminate worries about the future. Turner knows that not only is the Brocade equipment lifecycle guaranteed, so is Brocade support.

“Brocade Network Subscription is awesome,” said Turner. “There’s no other word for it. When I originally sent the details to our finance director, he was immediately on the phone telling me to take the deal and that it was the best thing he’d seen.

Read the full Chichester High School case study.

For more information, contact the Net-Ctrl sales team at sales@net-ctrl.com or call us direct on 01473 281 211.

Will That Wall Secure Your Network Like Cloudpath?

Wednesday, October 26th, 2016

By: Abhi Maras, Ruckus Wireless Product Line Manager

In the past, networks have been built on top of existing platforms over the years. As the security risks went up, there was a new security perimeter added to the network in order to secure the data and the devices within.

There are couple of problems with this approach:

First, the user behaviour has changed: gone are the days when users were shackled to an RJ-45 cable. The devices are more mobile than ever and the users are not within these perimeters that supposedly gives them the protection that they need. While network administrators are adding perimeter after perimeter in their networks, users are no longer within those perimeters; they’re staying mobile and connecting from anywhere they can. Security can no longer be restricted within those confines but rather extended to anywhere the device goes.

Second, the problem with this approach is while new perimeters and new solutions are added in the name of security, the complexity and the cost of deploying and managing a secure network is Those who do not have the appetite for it give up and end up with a less than secure of a network, which is quite harmful to them and to their end users.

We at team Cloudpath saw these challenges and took on the sacred mission to secure the network while keeping it less complex and affordable. We also see the value in taking a device-centric approach, i.e.Employee/IT devices, guest devices, BYOD devices or shared/IoT devices.

What is Cloudpath and how does it solve this you ask? Cloudpath is a security and policy management platform designed to simplify the deployment of several services that are typically disparate and complex to manage. Cloudpath makes the best security more accessible to lean IT teams.

To learn more about how Cloudpath can help your network, please visit here.

Content is taken from the ruckusroom.net.

Net-Ctrl Announce BETT Stand Partners

Wednesday, October 26th, 2016

BETT-pic

The BETT show will be coming to Excel, London once again in January 2017 (25th-28th).

Net-Ctrl will be exhibiting at the show for our eighth consecutive year and we have secured the same stand location as BETT 2016, C63.

Each year we bring a selection of our key partners with us to showcase their solutions and discuss with visitors what to expect to see from them in the not-so-distant future etc.

At BETT 2017 we will be joined by:

  • Ruckus Wireless – Smart wireless with controller and controller-less solutions.
  • Brocade Networks – Effortless networking from the edge to the core.
  • MOBOTIX AG – High-Resolution IP-CCTV camera and video door entry systems.
  • CEM -Leader of access control & integrated security management systems.
  • Aperio – Wireless Lock Technology from ASSA ABLOY.

Over the coming months we will be sending out solution overviews and some sneak peeks of what you can expect to see on our stand.

In the meantime, you can register for the BETT show, and send any product enquiries to marketing@net-ctrl.com.

In WiFi Too, It Pays To Work Hard

Thursday, October 20th, 2016

By: Tom Clavel, Enterprise Product Marketing. From theruckusroom.net.

When I was a kid, my parents would tell me “Do your job well, make a difference, and everything else will follow.” Well, that’s exactly what we at Ruckus have been doing: focusing on delivering a superior Wi-Fi experience to customers around the world. And the world is taking notice.

Ruckus, now a business unit within Brocade, was just recognized by industry analyst firm, IHS Markit, as a Leader in its annual “2016 Wireless LAN Infrastructure Vendor Scorecard”. Earlier in January, IDC also named Ruckus as a Leader in its annual “MarketScape: Worldwide Enterprise WLAN 2016-2016 Vendor Assessment”, where we were recognized for our RF innovation and portfolio enhancements.

marketscape
The recognition from IHS and IDC is a testimonial to what our customers and partners already know – Ruckus is constantly looking for innovative ways to deliver a simply better wireless solution with flexible offerings and a focus on RF performance. Patented Ruckus technologies such as BeamFlex+ and ChannelFly provide more reliable wireless connectivity and higher device density per access point in the most challenging environments.

This past year, we streamlined our focus to deliver superior RF functionality and added new architecture options such as virtual, controller-less, and even cloud-based management platforms. We’ve expanded our access points with the most advanced 802.11ac Wave 2 offering now indoor and outdoor, from the entry-level to the high-density offering.

Though analyst opinions matter (a lot!), we wouldn’t be anywhere without our customers. Kudos come directly from users worldwide, from many industries. Our customers can now benefit from superior Wi-Fi with any type of deployment and architecture, offering the utmost flexibility and a solid user experience.

All of us at Ruckus are excited to continue this journey and offer a powerful access portfolio and high-performing wireless technology for our customers. We’ve taken some considerable steps in the enterprise WLAN infrastructure market. We are glad IHS and IDC have taken notice. But even more important to us, we are glad our customers are happy too.

Net-Ctrl Introduces Ruckus and Brocade Network-As-A-Service

Thursday, October 20th, 2016

A new way to acquire wired and wireless network infrastructure.

Pay-as-you-go. Upgrade. Downgrade. Even cancel on-demand.

No catches. No gimmicks. No caveats.

We all know that it is increasingly difficult to forecast and fund future requirements for schools and colleges. Not only that but technology has been moving at such a fast rate, that keeping up has been near impossible and costly.

Net-Ctrl enables you to address your ever-changing needs with an easy-to-use OpEx as-a-service acquisition model that combines the power and intelligence of both Ruckus and Brocade.

This applies to all Ruckus and Brocade solutions purchased through Net-Ctrl.

  • Budget: Purchase equipment using OpEx and preserve valuable CapEx
  • Limitless Innovation: if you find Brocade or Ruckus technology you want, you can upgrade at any time. We ship the new kit and you have a short window to make the transition and return the old kit. Your new monthly payment will then be recalculated to reflect the revised kit.
  • Notice Period: Flex up at any time. Upgrade at any time. 60 day notice to flex down or return the solution (for a no quibble return and there are NO penalty fees)
  • It really is that simple with no hidden costs, no minimum order, or hidden caveats.

    Hardware, software and support all wrapped into one simple package.

    We expect that you will have questions, so please email them to josh.moore@net-ctrl.com.

    Independent Authority Certifies that Palo Alto Networks Traps Helps Customers Meet PCI and HIPAA Cybersecurity Requirements

    Thursday, October 6th, 2016

    Palo Alto Networks®, the next-generation security company, today announced that customers implementing its Traps™ advanced endpoint protection offering will meet specific cybersecurity requirements outlined by both the Health Insurance Portability and Accountability Act (HIPAA) and the Payment Card Industry (PCI) Data Security Standard.

    Independent analysis completed by Coalfire Systems, a respected leader in cyber risk management and compliance services and a Qualified Security Assessor (QSA), concludes that organizations in the financial and healthcare sectors can replace legacy antivirus endpoint products with Traps to help prevent cyber breaches while remaining compliant with federal law and industry standards.

    Quote

    “Traps uses a unique multi-method approach to prevent cyber breaches, advanced malware, and zero-day exploits to effectively secure endpoints without reliance on static signatures or the need to immediately apply security patches across an organization. These advanced endpoint protection capabilities, along with verified certification from a trusted QSA to meet both PCI DSS and HIPAA security compliance standards, will make the decision to replace legacy AV products with Traps a much easier one for our healthcare and financial services customers.”
    Dal Gemmell, head of Traps marketing, Palo Alto Networks

    An alternative to legacy antivirus point products, Traps uniquely combines the most effective, purpose-built malware and exploit detection methods to prevent known and unknown threats before they can successfully compromise an endpoint. It is a key component of the Palo Alto Networks Next-Generation Security Platform, a natively integrated platform that safely enables applications and delivers highly automated, preventive protection against cyberthreats at all stages in the attack lifecycle.

    Coalfire’s assessment of Traps was reached after completing technical testing; review of the overall design, architecture and supporting documentation; and interviews with subject matter experts.

    Coalfire Labs assessments confirmed that Traps enables organizations to either achieve or remain compliant with HIPAA’s technical requirements related to security as outlined in the HIPAA Security Rule and with version 3.2 of the PCI DSS.

    To download the full Coalfire reports, visit:

    Coalfire’s evaluation of Traps for HIPAA
    Coalfire’s evaluation of Traps for PCI compliance

    To learn more about Palo Alto Networks offerings, visit:

    Palo Alto Networks Traps Advanced Endpoint Protection
    Palo Alto Networks Next-Generation Security Platform

    About Palo Alto Networks

    Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization’s most valuable assets. Find out more at www.paloaltonetworks.com.

    Palo Alto Networks and the Palo Alto Networks logo are trademarks of Palo Alto Networks, Inc. in the United States and in jurisdictions throughout the world. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.

    View the original article by Palo Alto Networks.

    Achieve PCI DSS and HIPAA Compliance with Traps

    Thursday, October 6th, 2016

    In August 2016 Palo Alto Networks (PAN) announced Traps advanced endpoint protection version 3.4 and the reception has been extremely positive. PAN currently have over 500 Traps customers, and continue to see rapid uptake. As part of their continued discussion of v3.4, let’s zoom in on two very important compliance use cases, one involving PCI, and the other involving healthcare environments.

    The below has been produced by PAN.

    The Widely Acknowledged Legacy AV Problem

    Given the frustrations customers have shared with us about trying to stop threats with their existing, legacy corporate desktop AV (this is a mouthful, so we’ll simply refer to these solutions as “legacy AV”), the positive reception for Traps was not surprising. Based on our threat intelligence data,* six mainstream AV vendor scanners typically will detect only around 38 percent of malware that is discovered by our WildFire threat analysis service which is natively integrated with our Traps solution. Recently, one of our customers shared that it had multiple team members to manage its legacy AV solution and needed extra team members just to handle remediation.

    This is why our latest release of Traps, v3.4, is so exciting because with new capabilities, such as local static analysis, trusted publisher identification, and remediation capabilities (including quarantine), we are confident organizations can replace their legacy AV with Traps v3.4. (For a more complete list of the new capabilities in v3.4, check out the announcement blog post.)

    Replacement Needs Beyond Technology

    The gap in protection left by legacy AV has seen an explosion of startups offering point products claiming to be more effective and offer more protection than legacy AV. But based on customer conversations, the challenges of replacing legacy AV go beyond just technology. A common question we hear is, “when we replace our existing legacy AV with your Traps Advanced Endpoint Protection solution, will we remain in compliance with certain regulatory standards?” The standards most often requested by our customers were the Payment Card Industry Data Security Standard (PCI DSS) and the Health Insurance Portability and Accountability Act (HIPAA).

    To remove this objection for customers and provide further differentiation from a number of new point product vendors, we sought out and partnered with Coalfire Systems, a global technology leader in cyber risk management and compliance services for private enterprises and government organizations. Coalfire put Traps through rigorous testing in their labs to ensure it met or surpassed key security standards requirements or rules so customers could be confident that, when they chose to replace their legacy AV with Traps, they would remain in compliance with either the PCI DSS or HIPAA standard.

    We’re pleased to make both Coalfire reports available at links that follow. And please read on for excerpts of Coalfire’s assessments:

    PCI DSS
    HIPAA

    Coalfire’s assessments:

    PCI DSS: It’s Coalfire’s determination that an organization who was using a traditional AV to remain PCI DSS compliant can confidently replace that solution with Traps and remain compliant… Traps solution also helps organizations with various PCI requirements such as ensuring anti-virus mechanisms are enabled and maintained, not only meeting the requirement in many study cases, but often exceeding it when compared to industry standard solutions available.

    HIPAA: The Traps Advanced Endpoint Protection solution meets the requirements of HIPAA rule 164.308(a)(5)(ii)(B) and can be used in PHI environments allowing a customer to satisfy and exceed HIPAA HITECH compliance requirements for protection from malicious software.

    Ready to get started with Traps in your environment?

    Learn how to protect yourself from legacy AV.
    Attend our webinar on October 25: Attain PCI Compliance without AV

    * Average monthly values as of January 2016. Source: Palo Alto Networks WildFire and Multi-Scanner

    View the original blog post by Dal Gemmell
    October 4, 2016 at 5:00 AM