Community

Hi! Are you wondering what the folks at AmeriNet are up to? Check out this section of our website to see what is going on with AmeriNet including times that we have made the news, training, special events and points of interest.

View Our YouTube Channel

Our client, First State Bank, has implemented Exinda to assure the performance of its critical financial applications and improve both the employee and customer experience at its 13 locations in Macomb County. With Exinda, First State has seen a more than 40 percent performance improvement for critical applications across its network. Please read the case study & contact us today for more details.

We can help keep your data safe and teach you simple ways to reduce your expenses in the data center. Currently, there are some great specials running on our facilites in Southfield and Grand Rapids, MI.

Data Center Facility Details:
• Over 8,000sq. ft. of Data Center space
• Single active path for power source from DTE
• Climate-controlled (15 A/C units)
• 480V 3-Phase 1200Amp power feed
• 750kVA Cummings Diesel Generator
• 300kVA UPS Uninterrupted Power
• 1200 AMP -48 DC Power Plant
• Dual Fiber Entrance (ring protected)
• 24x7 Secure Card Access and Video Surveillance
• Crash carts and Remote Hands
• Conference Room/802.11 Wi-fi Access
• Connected to Data Center located at 24700 via two leased fiber strands in ring topology with diverse path, diverse entrance

Network:
Fiber Network
Our two Metro SONET rings and long haul optical fiber network spans 750 route miles and over 34 nodes throughout Michigan.

Internet Connectivity:
The IP network is connected to multiple global transit carriers; 10G circuit to Level (3), 2.5G to Savvis, and a 1G connection to Global Crossings.   Having multiple Internet uplinks allows us to provide stable connectivity throughout the network and maximize uptime.
The secure web portal features IP bandwidth usage graphs. These graphs allow customers to view daily, weekly and monthly usage.

Work with us today on your data center needs.

 

Please contact us today for more information on Nimble Storage!

 

Gartner just released its 2017 Magic Quadrant report, and once again named Palo Alto Networks® a Leader for Enterprise Network Firewalls – for the sixth consecutive year!

Gartner researchers continue to highlight both Palo Alto Networks ability to execute and the completeness of the company’s vision.

Gartner is the world's leading information technology research and advisory company. Once again, they have recognized our partner, Palo Alto Networks, for outstanding execution and strategy.

Highlights from this year’s report:
• Get a wide-angle view of the relative positions of the market’s competitors
• Ascertain how well vendors are executing their stated visions and how well
they’re performing against Gartner’s market view
• Learn what to consider when making purchasing decisions
Read the report

Contact us to learn how Palo Alto Networks prevents breaches and keeps organizations safe from ransomware, and other known and unknown threats and attacks, through multiple complementary prevention controls across its Next-Generation Security Platform.

 

Protect Your Network from an IoT Device Attack - Like the Recent DDoS Assault on Dyn

On October 21st, waves of crippling Distributed Denial-of-Service (DDoS) attacks left some of the most prominent names on the web struggling to ensure consistent access. Dyn, Inc., a company that provides domain name services for about 6% of Fortune 500 Companies, including Twitter, PayPal and Netflix, found itself battling DDoS attacks from a group of hackers. This, in turn, created access problems for an array of popular websites.

What makes this DDoS attack unique? The attack on Dyn was launched by Internet of Things (IoT) devices – in this case it was compromised internet-enabled home security devices such as cameras and DVRs, and turning them into attack agents or bots. The hackers used the “Mirai” virus that spreads to vulnerable devices by continuously scanning the internet for IoT devices protected by factory default user names and passwords that were not changed by the users.

Industry security experts had previously speculated that IoT devices could be exploited to pose a network security risk, and that concern is now a reality with this crippling attack. This new DDoS attack has left companies around the globe wondering what they can do to protect their networks from unsecured IoT devices inside and outside the network. It’s important to note that the IoT devices are typically incapable of running software agents – making them even more vulnerable to compromise than traditional computing endpoint devices.  The good news is that a Security Automation and Orchestration solution like Network Sentry can help.

Click here to read more.   Any questions on Bradford Networks? Contact us at sales@amerinet.com or 734.995.1233. 

 

 

More than 90% of malware uses DNS at various stages of the cyber kill chain to penetrate the network, infect devices, propagate laterally, and exfiltrate data. According to recent surveys, 46% of respondents experienced DNS-based data exfiltration and 45% experienced DNS tunneling. Malware and data theft are pervasive largely because conventional cybersecurity solutions are not designed to protect DNS.

Your organization can prevent the spread of malware and data exfiltration by:

  • Securing DNS to disrupt the cyber kill chain on and off premises
  • Blocking DNS-based data exfiltration using a combination of reputation, signatures and behavioral analytics
  • Gaining comprehensive visibility into the network

With Infoblox, you can deliver on all three and much more. Contact us today for more information. 

Upcoming Events

Please check out our upcoming events to see if any spark your interest. We will update as we add events to our calendar so please check back often.

Hi!

Are you interested in taking a Palo Alto Networks Traps Advanced Endpoint Protection test drive? AmeriNet invites you to take the Ultimate Test Drive with Palo Alto Networks on Wednesday, November 29th. You will get hands-on experience with the Palo Alto Networks next-generation security platform.

This is a FREE half-day technical workshop dedicated to restoring visibility and control over the applications, users and content traversing your network. In this workshop, you will learn how:

  • Traps replaces legacy AV with multi-method prevention
  • Traps prevents vulnerability exploits
  • Traps prevents malware infections
  • Palo Alto Networks next-generation security platform automatically converts threat intelligence into prevention

Labs that will be covered:
1. Conduct a Ransomware Attack
2. Prevent Ransomware Attack
3. Explore the Endpoint Security Manager (ESM)
4. Prevent Exploit Attack
5. Prevent Malware Attack
6. Next-Generation Security Platform in Action
7. Microsoft Office File Protection

Event Details:

Location:
The Rattlesnake Club

300 River Place Drive
Detroit, MI  48207
313.547.4400

Times:
9:30am: Registration | Breakfast
10:00am: Traps Advanced Endpoint Protection Test Drive
1:00pm: Lunch
1:45pm: Event Conclusion

These classes are popular and space fills quickly. Register now to save your place at the next Ultimate Test Drive.

We look forward to seeing you at this event. 

Thank you.

 

Please enter any questions you have in this box and we'll respond back to you ASAP. Thank you.

Secure Clouds are Happy Clouds

Today’s data centers are rapidly moving towards an architecture that melds on premise resources with the public cloud, creating an environment that allows applications and data to be deployed seamlessly in in either location. Regardless of where your applications and data are located, they are an attacker’s target, and protecting them in the cloud introduces the same security challenges you face in your on-premises data center. To that end, your public cloud security solution should be consistent with what is deployed in your data center so that, no matter where the applications and data reside, security is consistent and assured.

Attend to learn how Palo Alto Networks VM-Series for public cloud (AWS/Azure) enables you to use next-generation firewall security and advanced threat prevention to protect your public cloud deployments from advanced cyber threats.  Then stay to watch Star Wars: The Last Jedi.

Event Details:

Friday, December 15, 2017

Location:
Emagine Novi

44425 West Twelve Mile Rd
Novi, MI 48377

Times:
9:00am Registration
9:25am Presentation
10:00am Movie Beings
12:30pm Event Concludes

Please register below to attend.

Thank you.

Please enter any questions you have regarding this event and we will respond back to you ASAP. Thank you.

 

Secure Clouds are Happy Clouds

Today’s data centers are rapidly moving towards an architecture that melds on premise resources with the public cloud, creating an environment that allows applications and data to be deployed seamlessly in in either location. Regardless of where your applications and data are located, they are an attacker’s target, and protecting them in the cloud introduces the same security challenges you face in your on-premises data center. To that end, your public cloud security solution should be consistent with what is deployed in your data center so that, no matter where the applications and data reside, security is consistent and assured.
Attend to learn how Palo Alto Networks VM-Series for public cloud (AWS/Azure) enables you to use next-generation firewall security and advanced threat prevention to protect your public cloud deployments from advanced cyber threats.  Then stay to watch Star Wars: The Last Jedi.
 

Event Details:

Friday, December 15, 2017

Location:
Emagine Saline

1335 E. Michigan Ave
Saline, MI  48176

Times:
9:00am Registration
9:25am Presentation
10:00am Movie Beings
12:30pm Event Concludes

Please register below to attend.

Thank you.

Please enter any questions you have regarding this event and we will respond back to you ASAP. Thank you.

Upcoming Trainings

Our current trainings are posted here. If you need a specific training and don't see it listed here, please let us know and we'll work on adding it to our calendar.


 

EDU-210
Firewall 8.0 Essentials: Configuration & Management
5 Day Course
$5,000 per student

The Palo Alto Networks Firewall 8.0 Essentials: Configuration & Management course is 5 days of instructor-led training that will enable you to:

• Configure & manage the essential features of Palo Alto Networks® next-generation firewalls
• Configure & manage GlobalProtect to protect systems that are located outside of the data center perimeter
• Configure & manage firewall high availability
• Monitor network traffic using the interactive web interface & firewall reports

Topics Include:

• Platforms and Architecture
• Initial Configuration
• Interface Configuration
• Security and NAT Policies
• App-ID™
• Basic Content-ID™
• URL Filtering
• Decryption
• WildFire™
• User-ID™
• GlobalProtect™
• Site-to-Site VPN
• Monitoring & Reporting
• Active/Passive High Availability
• What’s Next

Course Objective:
Successful completion of this five-day, instructor-led course will enhance the student’s understanding of how to configure and manage Palo Alto Networks® next-generation firewalls. The student will learn and get hands-on experience configuring, managing, and monitoring a firewall in a lab environment.

Prerequisites:
Students must have a basic familiarity with networking concepts including routing, switching, IP addressing, and basic port-based security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is a plus.

Current Schedule:

Classroom | Ann Arbor, MI:

Dates:
January 15th - 19th

9am - 5pm Eastern, each day

To register for a class or any questions please fill out the form below.

Thank you.

 

Dates of the class you are registering to attend.
If you want to register more than one person please enter their contact information here. If you have any questions, please fill out this box and we'll respond back to you in a timely manner. Thank you.
CAPTCHA
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.
4 + 4 =
Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.

EDU-281
Traps 4.0: Install, Configure, and Manage
2 Day Course

$2,000 per student

Palo Alto Networks®  Traps™ Advanced Endpoint Protection prevents sophisticated vulnerability exploits and unknown malware-driven attacks. Successful completion of this two-day, instructor-led course equips the student to install Traps in basic configurations.

Topics Include:
• Traps Overview
• Installing Traps
• Malicious Software Overview
• Consoles Overview
• Traps Protection against Exploits
• Traps Protection against Malware
• Prevention Event Exceptions
• Managing Traps
• Traps Forensics
• Basic Traps Troubleshooting  

Course Objectives:

Students will learn how Traps protects against exploits and malware-driven attacks. In hands-on lab exercises, students will install and configure the Endpoint Security Manager (ESM) and Traps endpoint components; build rules; enable and disable process protections; and integrate Traps with Palo Alto Networks WildFire™, which provides prevention and detection of zero-day malware.

Prerequisites:
Students must have Windows system administration skills and familiarity with enterprise security concept.
 

Current Schedule:

Classroom | Ann Arbor, MI:
Dates:
January 25th - 26th

9am to 5pm, Eastern, each day

To register for the class or for any questions please fill out the form below.

Thank you.

Dates of the class you are registering to attend.
If you want to register more than one person please enter their contact information here. If you have any questions, please fill out this box and we'll respond back to you in a timely manner. Thank you.