Hi! Are you wondering what the folks at AmeriNet are up to? Check out this section of our website to see what is going on with AmeriNet including times that we have made the news, training, special events and points of interest.

View Our YouTube Channel

Our client, First State Bank, has implemented Exinda to assure the performance of its critical financial applications and improve both the employee and customer experience at its 13 locations in Macomb County. With Exinda, First State has seen a more than 40 percent performance improvement for critical applications across its network. Please read the case study & contact us today for more details.

We can help keep your data safe and teach you simple ways to reduce your expenses in the data center. Currently, there are some great specials running on our facilites in Southfield and Grand Rapids, MI.

Data Center Facility Details:
• Over 8,000sq. ft. of Data Center space
• Single active path for power source from DTE
• Climate-controlled (15 A/C units)
• 480V 3-Phase 1200Amp power feed
• 750kVA Cummings Diesel Generator
• 300kVA UPS Uninterrupted Power
• 1200 AMP -48 DC Power Plant
• Dual Fiber Entrance (ring protected)
• 24x7 Secure Card Access and Video Surveillance
• Crash carts and Remote Hands
• Conference Room/802.11 Wi-fi Access
• Connected to Data Center located at 24700 via two leased fiber strands in ring topology with diverse path, diverse entrance

Fiber Network
Our two Metro SONET rings and long haul optical fiber network spans 750 route miles and over 34 nodes throughout Michigan.

Internet Connectivity:
The IP network is connected to multiple global transit carriers; 10G circuit to Level (3), 2.5G to Savvis, and a 1G connection to Global Crossings.   Having multiple Internet uplinks allows us to provide stable connectivity throughout the network and maximize uptime.
The secure web portal features IP bandwidth usage graphs. These graphs allow customers to view daily, weekly and monthly usage.

Work with us today on your data center needs.


Please contact us today for more information on Nimble Storage!


Gartner just released its 2017 Magic Quadrant report, and once again named Palo Alto Networks® a Leader for Enterprise Network Firewalls – for the sixth consecutive year!

Gartner researchers continue to highlight both Palo Alto Networks ability to execute and the completeness of the company’s vision.

Gartner is the world's leading information technology research and advisory company. Once again, they have recognized our partner, Palo Alto Networks, for outstanding execution and strategy.

Highlights from this year’s report:
• Get a wide-angle view of the relative positions of the market’s competitors
• Ascertain how well vendors are executing their stated visions and how well
they’re performing against Gartner’s market view
• Learn what to consider when making purchasing decisions
Read the report

Contact us to learn how Palo Alto Networks prevents breaches and keeps organizations safe from ransomware, and other known and unknown threats and attacks, through multiple complementary prevention controls across its Next-Generation Security Platform.


Protect Your Network from an IoT Device Attack - Like the Recent DDoS Assault on Dyn

On October 21st, waves of crippling Distributed Denial-of-Service (DDoS) attacks left some of the most prominent names on the web struggling to ensure consistent access. Dyn, Inc., a company that provides domain name services for about 6% of Fortune 500 Companies, including Twitter, PayPal and Netflix, found itself battling DDoS attacks from a group of hackers. This, in turn, created access problems for an array of popular websites.

What makes this DDoS attack unique? The attack on Dyn was launched by Internet of Things (IoT) devices – in this case it was compromised internet-enabled home security devices such as cameras and DVRs, and turning them into attack agents or bots. The hackers used the “Mirai” virus that spreads to vulnerable devices by continuously scanning the internet for IoT devices protected by factory default user names and passwords that were not changed by the users.

Industry security experts had previously speculated that IoT devices could be exploited to pose a network security risk, and that concern is now a reality with this crippling attack. This new DDoS attack has left companies around the globe wondering what they can do to protect their networks from unsecured IoT devices inside and outside the network. It’s important to note that the IoT devices are typically incapable of running software agents – making them even more vulnerable to compromise than traditional computing endpoint devices.  The good news is that a Security Automation and Orchestration solution like Network Sentry can help.

Click here to read more.   Any questions on Bradford Networks? Contact us at or 734.995.1233. 



More than 90% of malware uses DNS at various stages of the cyber kill chain to penetrate the network, infect devices, propagate laterally, and exfiltrate data. According to recent surveys, 46% of respondents experienced DNS-based data exfiltration and 45% experienced DNS tunneling. Malware and data theft are pervasive largely because conventional cybersecurity solutions are not designed to protect DNS.

Your organization can prevent the spread of malware and data exfiltration by:

  • Securing DNS to disrupt the cyber kill chain on and off premises
  • Blocking DNS-based data exfiltration using a combination of reputation, signatures and behavioral analytics
  • Gaining comprehensive visibility into the network

With Infoblox, you can deliver on all three and much more. Contact us today for more information. 

Upcoming Events

Please check out our upcoming events to see if any spark your interest. We will update as we add events to our calendar so please check back often.

There are no upcoming events at this time.

Upcoming Trainings

Our current trainings are posted here. If you need a specific training and don't see it listed here, please let us know and we'll work on adding it to our calendar.


Firewall 8.1 Essentials: Configuration & Management
5 Day Course
$5,000 per student

The Palo Alto Networks Firewall 8.1 Essentials: Configuration & Management course is 5 days of instructor-led training that will enable you to:

• Configure & manage the essential features of Palo Alto Networks® next-generation firewalls
• Configure & manage GlobalProtect to protect systems that are located outside of the data center perimeter
• Configure & manage firewall high availability
• Monitor network traffic using the interactive web interface & firewall reports

Topics Include:

• Next-Generation Security Platform and Architecture
• Virtual and Cloud Deployment
• Initial Configuration
• Interface Configuration
• Security and NAT Policies
• App-ID™
• Content-ID™
• URL Filtering
• Decryption
• WildFire™
• User-ID™
• GlobalProtect™
• Site-to-Site VPNs
• Monitoring & Reporting
• Active/Passive High Availability
• Next-Generation Security Practices

Course Objective:
Successful completion of this five-day, instructor-led course will enhance the student’s understanding of how to configure and manage Palo Alto Networks® next-generation firewalls. The student will learn and get hands-on experience configuring, managing, and monitoring a firewall in a lab environment.

Students must have a basic familiarity with networking concepts including routing, switching, and IP addressing. Students also should be familiar with basic security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is a plus.

Current Schedule:

Classroom | Ann Arbor, MI:

July 9th - 13th
September 10th - 14th

9am - 5pm Eastern, each day

To register for a class or any questions please fill out the form below.

Thank you.


Dates of the class you are registering to attend.
If you want to register more than one person please enter their contact information here. If you have any questions, please fill out this box and we'll respond back to you in a timely manner. Thank you.
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.
13 + 0 =
Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.

Traps 4.1: Install, Configure, and Manage
2 Day Course

$2,000 per student

Palo Alto Networks®  Traps™ Advanced Endpoint Protection prevents sophisticated vulnerability exploits and unknown malware-driven attacks. Successful completion of this two-day, instructor-led course equips the student to install Traps in basic configurations.

Topics Include:
• Traps Overview
• Installing Traps
• Malicious Software Overview
• Consoles Overview
• Traps Protection against Exploits
• Traps Protection against Malware
• Prevention Event Exceptions
• Managing Traps
• Traps Forensics
• Basic Traps Troubleshooting  

Course Objectives:

Students will learn how Traps protects against exploits and malware-driven attacks. In hands-on lab exercises, students will install and configure the Endpoint Security Manager (ESM) and Traps endpoint components; build rules; enable and disable process protections; and integrate Traps with Palo Alto Networks WildFire™, which provides prevention and detection of zero-day malware.

Students must have Windows system administration skills and familiarity with enterprise security concept.

Current Schedule:

Classroom | Ann Arbor, MI:
Dates: TBA 
If you are interested in this class, please let us know by filling out the form below. Thank you.

9am to 5pm, Eastern, each day

To register for the class or for any questions please fill out the form below.

Thank you.

Dates of the class you are registering to attend.
If you want to register more than one person please enter their contact information here. If you have any questions, please fill out this box and we'll respond back to you in a timely manner. Thank you.