Our client, First State Bank, has implemented Exinda to assure the performance of its critical financial applications and improve both the employee and customer experience at its 13 locations in Macomb County. With Exinda, First State has seen a more than 40 percent performance improvement for critical applications across its network. Please read the case study & contact us today for more details.
Hi! Are you wondering what the folks at AmeriNet are up to? Check out this section of our website to see what is going on with AmeriNet including times that we have made the news, training, special events and points of interest.
We can help keep your data safe and teach you simple ways to reduce your expenses in the data center. Currently, there are some great specials running on our facilites in Southfield and Grand Rapids, MI.
Data Center Facility Details:
• Over 8,000sq. ft. of Data Center space
• Single active path for power source from DTE
• Climate-controlled (15 A/C units)
• 480V 3-Phase 1200Amp power feed
• 750kVA Cummings Diesel Generator
• 300kVA UPS Uninterrupted Power
• 1200 AMP -48 DC Power Plant
• Dual Fiber Entrance (ring protected)
• 24x7 Secure Card Access and Video Surveillance
• Crash carts and Remote Hands
• Conference Room/802.11 Wi-fi Access
• Connected to Data Center located at 24700 via two leased fiber strands in ring topology with diverse path, diverse entrance
Our two Metro SONET rings and long haul optical fiber network spans 750 route miles and over 34 nodes throughout Michigan.
The IP network is connected to multiple global transit carriers; 10G circuit to Level (3), 2.5G to Savvis, and a 1G connection to Global Crossings. Having multiple Internet uplinks allows us to provide stable connectivity throughout the network and maximize uptime.
The secure web portal features IP bandwidth usage graphs. These graphs allow customers to view daily, weekly and monthly usage.
Work with us today on your data center needs.
Gartner just released its 2017 Magic Quadrant report, and once again named Palo Alto Networks® a Leader for Enterprise Network Firewalls – for the sixth consecutive year!
Gartner researchers continue to highlight both Palo Alto Networks ability to execute and the completeness of the company’s vision.
Gartner is the world's leading information technology research and advisory company. Once again, they have recognized our partner, Palo Alto Networks, for outstanding execution and strategy.
Highlights from this year’s report:
• Get a wide-angle view of the relative positions of the market’s competitors
• Ascertain how well vendors are executing their stated visions and how well
they’re performing against Gartner’s market view
• Learn what to consider when making purchasing decisions
• Read the report
Contact us to learn how Palo Alto Networks prevents breaches and keeps organizations safe from ransomware, and other known and unknown threats and attacks, through multiple complementary prevention controls across its Next-Generation Security Platform.
Protect Your Network from an IoT Device Attack - Like the Recent DDoS Assault on Dyn
On October 21st, waves of crippling Distributed Denial-of-Service (DDoS) attacks left some of the most prominent names on the web struggling to ensure consistent access. Dyn, Inc., a company that provides domain name services for about 6% of Fortune 500 Companies, including Twitter, PayPal and Netflix, found itself battling DDoS attacks from a group of hackers. This, in turn, created access problems for an array of popular websites.
What makes this DDoS attack unique? The attack on Dyn was launched by Internet of Things (IoT) devices – in this case it was compromised internet-enabled home security devices such as cameras and DVRs, and turning them into attack agents or bots. The hackers used the “Mirai” virus that spreads to vulnerable devices by continuously scanning the internet for IoT devices protected by factory default user names and passwords that were not changed by the users.
Industry security experts had previously speculated that IoT devices could be exploited to pose a network security risk, and that concern is now a reality with this crippling attack. This new DDoS attack has left companies around the globe wondering what they can do to protect their networks from unsecured IoT devices inside and outside the network. It’s important to note that the IoT devices are typically incapable of running software agents – making them even more vulnerable to compromise than traditional computing endpoint devices. The good news is that a Security Automation and Orchestration solution like Network Sentry can help.
More than 90% of malware uses DNS at various stages of the cyber kill chain to penetrate the network, infect devices, propagate laterally, and exfiltrate data. According to recent surveys, 46% of respondents experienced DNS-based data exfiltration and 45% experienced DNS tunneling. Malware and data theft are pervasive largely because conventional cybersecurity solutions are not designed to protect DNS.
Your organization can prevent the spread of malware and data exfiltration by:
- Securing DNS to disrupt the cyber kill chain on and off premises
- Blocking DNS-based data exfiltration using a combination of reputation, signatures and behavioral analytics
- Gaining comprehensive visibility into the network
With Infoblox, you can deliver on all three and much more. Contact us today for more information.
Please check out our upcoming events to see if any spark your interest. We will update as we add events to our calendar so please check back often.
There are no upcoming events at this time.
Our current trainings are posted here. If you need a specific training and don't see it listed here, please let us know and we'll work on adding it to our calendar.
Firewall 8.0 Essentials: Configuration & Management
5 Day Course
$5,000 per student
The Palo Alto Networks Firewall 8.0 Essentials: Configuration & Management course is 5 days of instructor-led training that will enable you to:
• Configure & manage the essential features of Palo Alto Networks® next-generation firewalls
• Configure & manage GlobalProtect to protect systems that are located outside of the data center perimeter
• Configure & manage firewall high availability
• Monitor network traffic using the interactive web interface & firewall reports
• Platforms and Architecture
• Initial Configuration
• Interface Configuration
• Security and NAT Policies
• Basic Content-ID™
• URL Filtering
• Site-to-Site VPN
• Monitoring & Reporting
• Active/Passive High Availability
• What’s Next
Successful completion of this five-day, instructor-led course will enhance the student’s understanding of how to configure and manage Palo Alto Networks® next-generation firewalls. The student will learn and get hands-on experience configuring, managing, and monitoring a firewall in a lab environment.
Students must have a basic familiarity with networking concepts including routing, switching, IP addressing, and basic port-based security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is a plus.
Classroom | Ann Arbor, MI:
January 15th - 19th
March 5th - 9th
May 14th - 18th
9am - 5pm Eastern, each day
To register for a class or any questions please fill out the form below.
Traps 4.1: Install, Configure, and Manage
2 Day Course
$2,000 per student
Palo Alto Networks® Traps™ Advanced Endpoint Protection prevents sophisticated vulnerability exploits and unknown malware-driven attacks. Successful completion of this two-day, instructor-led course equips the student to install Traps in basic configurations.
• Traps Overview
• Installing Traps
• Malicious Software Overview
• Consoles Overview
• Traps Protection against Exploits
• Traps Protection against Malware
• Prevention Event Exceptions
• Managing Traps
• Traps Forensics
• Basic Traps Troubleshooting
Students will learn how Traps protects against exploits and malware-driven attacks. In hands-on lab exercises, students will install and configure the Endpoint Security Manager (ESM) and Traps endpoint components; build rules; enable and disable process protections; and integrate Traps with Palo Alto Networks WildFire™, which provides prevention and detection of zero-day malware.
Students must have Windows system administration skills and familiarity with enterprise security concept.
Classroom | Ann Arbor, MI:
If you are interested in this class, please let us know by filling out the form below. Thank you.
9am to 5pm, Eastern, each day
To register for the class or for any questions please fill out the form below.