Monthly Archives: August 2015

IT solutions
Aug 28

Twin Networks Heads to Vegas for Dell Peak Performance 2015

By Twin Networks Staff | News

The Twin Networks team is jetting to Las Vegas this weekend to attend Dell Security Peak Performance 2015. We’ll hear from some of the world’s most infamous hackers, including Kevin Mitnick, “World’s Most Famous Hacker,” who now works to ensure security for Fortune 500s. Major players from Dell will also speak and update us on what the company is doing to stay ahead of security concerns in the hacking era. We’re sure to hear more about Dell SonicWall, among other hardware and software that Dell’s been working on recently. Be sure to stay tuned to hear our thoughts and perspective on what we’re learning throughout the week!

Dell

managed services
Aug 25

Connecting from the Remote Island of Aruba (An HP Company)

By Twin Networks Staff | News

Improving remote access and BYOD systems seems fitting in these summer vacation months. It’s important that employees are able to connect to the office from anywhere, be it working at home or vacationing under the sun, especially given that their devices make it impeccably easy. BYOD (Bring Your Own Device) is here to stay. This trend in employees using their personal devices for work makes it easy for work to be taken anywhere, but as technology accelerates and users increasingly expect their devices to “just work,” enterprise engineering systems need to adapt. Users and employee’s many devices; phones, watches, tablets, may be able to work remotely, but is your business set up to allow that? The pressure is getting placed on VPNs and remote access systems – luckily we are prepared to tackle this new landscape and keep work working. Systems that allow for effortless remote access with minimal or no hardware for the user, and keep security in mind, are of the utmost importance in 2015.

Recently, Twin Networks heard from Aruba about solutions to the growing need for networks on the go. This is a great time to talk to Aruba because just this year HP finalized the acquisition of this company. Both teams are still working out the kinks with partners and sales, but the potential for end users is really amazing. Now, combined with their hardware with HP’s networking capabilities, IT branches can really create innovative and broad-reaching solutions that are well integrated, but still consider the best vendors for the project.

We’ve been fans of Aruba’s RAP (Remote Access Point) hardware for years, and in the digital, Gen Mobile age, its importance is greater than ever. We’ve trusted Aruba to provide remote solutions, and they are continuing to deliver innovation. Users will continue to want access to data faster and more easily than before. This means that utilizing the cloud is absolutely essential, hardware goes away, and ideally, the apps used to integrate are seamless as well. Simple? Yes, simple, with the right tools and know-how to set them up.

Providing systems that maintain vendor agnosticism is important to Aruba, and it’s a core value of ours as well. Twin Networks has believed from the beginning that brand names for the sake of brand names do nothing for you. We want to deliver our clients with the hardware and networks that work, not the full system of one vendor’s product for the name branded on top. Aruba’s ClearPass system is, by it’s nature, vendor and device agnostic. It’s is a great selling point for them because it keeps devices secure in the BYOD and cloud age. This policy manager, industry leader in 2013 & 2014, is built with the user in mind. Remembering that they will want their systems to work effortlessly and they won’t be concerned about security, things like self-onboarding are key features. Users on-board themselves onto networks and guest networks in a quick process and ClearPass chooses the best network to allow speed for the user.

Fewer systems, intuitive integration, and allowing users to think it “just works” are the driving goals of any IT operation. We know that countless hours go into making enormous amounts of data sync up and display in the blink of an eye so that our end users believe it’s completely effortless, and we wouldn’t have it any other way.

managed security services
Aug 11

How to Stay Secure in the Hacking Age

By Twin Networks Staff | News

We’ve seen hack after hack in headline news recently. Even businesses that sell themselves on guaranteeing your security are getting hacked – case in point, the affair dating website Ashley Madison’s hack and release of thousands of personally identifiable user information. Then there’s JP Morgan and Target, and any number of smaller businesses daily. Hackers are hitting small businesses exceptionally hard, believing that their security is likely lacking. But not to fear, we and our partners are on top of it, constantly patching the holes and preventing new ones from appearing.

  1. Better Email. Dell SonicWall impressed us with new security features, specifically for email. Chris Gallup of Dell Channel SE told us they’ve added more end-user checks and endpoint control, so that businesses can rest assured that the integrity of their security is not solely up to employees not falling victim to scams. As scams are getting more advanced, Dell’s been enhancing security to identify them. The latest trend in scamming is fake Failed Delivery notifications. To combat this, we’re seeing applications with better flagging systems and detailed analyses of messages, and ratings. Alternatively, email security is getting smart enough to identify what used to be marked as spam, but may actually be of high importance – for example, bomb threats and the like should not be living in a junk folder.
  1. Containerization. A buzzword in the BYOD (Bring Your Own Device) landscape, containerization is also the name of the game. Keeping work and personal separate on devices (a major change in Windows 10, according to Dell) is a priority. Considering this, the device becomes less of a concern, and the apps it runs come more into scrutiny. Really, BYOD is an opportunity for more integrated and productive work. It’s BYOA – Bring Your Own App – that business’s need to be wary of. It should be the IT department’s main priority to monitor which apps employees are using, and making sure they’ve approved them, or, making sure all employees are using apps that are pre-approved by IT. Vendors like Dell are becoming more aware of this, and allowing Firewalls that can selectively filter down by app. Controlling the app, and even controlling by user can be extremely beneficial. For example, if the marketing department needs Facebook, they can have access – but the finance department might only be able to access Facebook as read only.
  1. Encryption. More and more data is being encrypted these days, and even then that sometimes can lack the level of security that’s necessary. Any organization sending and receiving emails with personally identifiable information should be encrypting their emails. Dell’s new TZ series of devices, including TZ400 802.11n has decrypting technology, simultaneously encrypting and decrypting data, including emails, to maintain security and stability, which still growing bandwidth speeds.

No one is immune to a hack, not even the Pentagon. Security can’t be left wholly in the hands of employees. As phishing gets smarter, IT operations need to be more agile and more sophisticated than ever. Getting in front of the problems, and reacting swiftly when they do happen, is the only way to be secure.