Our client, First State Bank, has implemented Exinda to assure the performance of its critical financial applications and improve both the employee and customer experience at its 13 locations in Macomb County. With Exinda, First State has seen a more than 40 percent performance improvement for critical applications across its network. Please read the case study & contact us today for more details.
Hi! Are you wondering what the folks at AmeriNet are up to? Check out this section of our website to see what is going on with AmeriNet including times that we have made the news, training, special events and points of interest.
We can help keep your data safe and teach you simple ways to reduce your expenses in the data center. Currently, there are some great specials running on our facilites in Southfield and Grand Rapids, MI.
Data Center Facility Details:
• Over 8,000sq. ft. of Data Center space
• Single active path for power source from DTE
• Climate-controlled (15 A/C units)
• 480V 3-Phase 1200Amp power feed
• 750kVA Cummings Diesel Generator
• 300kVA UPS Uninterrupted Power
• 1200 AMP -48 DC Power Plant
• Dual Fiber Entrance (ring protected)
• 24x7 Secure Card Access and Video Surveillance
• Crash carts and Remote Hands
• Conference Room/802.11 Wi-fi Access
• Connected to Data Center located at 24700 via two leased fiber strands in ring topology with diverse path, diverse entrance
Our two Metro SONET rings and long haul optical fiber network spans 750 route miles and over 34 nodes throughout Michigan.
The IP network is connected to multiple global transit carriers; 10G circuit to Level (3), 2.5G to Savvis, and a 1G connection to Global Crossings. Having multiple Internet uplinks allows us to provide stable connectivity throughout the network and maximize uptime.
The secure web portal features IP bandwidth usage graphs. These graphs allow customers to view daily, weekly and monthly usage.
Work with us today on your data center needs.
We are pleased to inform you that Palo Alto Networks is a leader for the fifth consecutive year in 2016 Gartner MQ for Enterprise Network Firewalls. You can download and access the full Gartner Magic Quadrant report by clicking HERE.
Below are highlights from this report:
• Palo Alto Networks is a leader for the fifth consecutive year: they continue to be recognized as a leader in the magic quadrant.
• Palo Alto Networks has extended their lead: Compared to last year, they moved further to the right (completeness of vision) and further up (ability to execute). No other leader or challenger made progress on both axes.
• Single pass architecture is a key design advantage over competitors: Gartner notes that "single pass is assessed as a design advantage by Gartner clients, as opposed to the unnecessary inspection time that can occur in competing products that process traffic in serial order”.
• WildFire’s success continues: Gartner notes the continuing success of WildFire with “high attach rates for new and existing customers”.
Please contact us today to learn how Palo Alto Networks is leading the market.
Protect Your Network from an IoT Device Attack - Like the Recent DDoS Assault on Dyn
On October 21st, waves of crippling Distributed Denial-of-Service (DDoS) attacks left some of the most prominent names on the web struggling to ensure consistent access. Dyn, Inc., a company that provides domain name services for about 6% of Fortune 500 Companies, including Twitter, PayPal and Netflix, found itself battling DDoS attacks from a group of hackers. This, in turn, created access problems for an array of popular websites.
What makes this DDoS attack unique? The attack on Dyn was launched by Internet of Things (IoT) devices – in this case it was compromised internet-enabled home security devices such as cameras and DVRs, and turning them into attack agents or bots. The hackers used the “Mirai” virus that spreads to vulnerable devices by continuously scanning the internet for IoT devices protected by factory default user names and passwords that were not changed by the users.
Industry security experts had previously speculated that IoT devices could be exploited to pose a network security risk, and that concern is now a reality with this crippling attack. This new DDoS attack has left companies around the globe wondering what they can do to protect their networks from unsecured IoT devices inside and outside the network. It’s important to note that the IoT devices are typically incapable of running software agents – making them even more vulnerable to compromise than traditional computing endpoint devices. The good news is that a Security Automation and Orchestration solution like Network Sentry can help.
Please check out our upcoming events to see if any spark your interest. We will update as we add events to our calendar so please check back often.
There are no upcoming events at this time.
Our current trainings are posted here. If you need a specific training and don't see it listed here, please let us know and we'll work on adding it to our calendar.
Firewall 8.0 Essentials: Configuration & Management
5 Day Course
$5,000 per student
The Palo Alto Networks Firewall 8.0 Essentials: Configuration & Management course is 5 days of instructor-led training that will enable you to:
• Configure & manage the essential features of Palo Alto Networks® next-generation firewalls
• Configure & manage GlobalProtect to protect systems that are located outside of the data center perimeter
• Configure & manage firewall high availability
• Monitor network traffic using the interactive web interface & firewall reports
• Platforms and Architecture
• Initial Configuration
• Interface Configuration
• Security and NAT Policies
• Basic Content-ID™
• URL Filtering
• Site-to-Site VPN
• Monitoring & Reporting
• Active/Passive High Availability
• What’s Next
Successful completion of this five-day, instructor-led course will enhance the student’s understanding of how to configure and manage Palo Alto Networks® next-generation firewalls. The student will learn and get hands-on experience configuring, managing, and monitoring a firewall in a lab environment.
Students must have a basic familiarity with networking concepts including routing, switching, IP addressing, and basic port-based security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is a plus.
Classroom | Grand Rapids, MI:
June 19th - 23rd
9am - 5pm Eastern, each day
Classroom | Ann Arbor, MI:
July 10th - 14th
September 11th - 15th
November 13th - 17th
9am - 5pm Eastern, each day
To register for a class or any questions please fill out the form below.
Traps: Install, Configure, and Manage
2 Day Course
$2,000 per student
Palo Alto Networks® Traps™ Advanced Endpoint Protection prevents sophisticated vulnerability exploits and unknown malware-driven attacks. Successful completion of this two-day, instructor-led course equips the student to install Traps in basic configurations.
• Traps Overview
• Installing Traps
• Malicious Software Overview
• Consoles Overview
• Traps Protection against Exploits
• Traps Protection against Malware (including WildFire)
• Managing Traps
• Traps Forensics
• Basic Traps Troubleshooting
Students will learn how Traps protects against exploits and malware-driven attacks. In hands-on lab exercises, students will install and configure the Endpoint Security Manager (ESM) and Traps endpoint components; build rules; enable and disable process protections; and integrate Traps with Palo Alto Networks WildFire™, which provides prevention and detection of zero-day malware.
Students must have Windows system administration skills and familiarity with enterprise security concept.
Classroom | Ann Arbor, MI:
July 27th - 28th
September 18th - 19th
November 30th - December 1st
9am to 5pm, Eastern, each day
To register for the class or for any questions please fill out the form below.