Information and recommendations on protecting your wireless deployment

On October 16, 2017, Belgian security researchers made public their findings that demonstrated fundamental design flaws in WPA2 that could lead to man-in-the-middle (MITM) attacks on wireless networks.

Named KRACKs, or key reinstallation attacks, this technique can theoretically be used by attackers to steal sensitive information from unsuspecting wireless users leveraging these flaws in the WiFi standard.

FacebookTwitterGoogle+LinkedIn

Equifax just rolled into the history books as the victim of one of the most widespread and dangerous data breaches of all time. The breach happened on March 10, 2017, at which time the cyber criminals leveraged the critical remote code execution vulnerability CVE-2017-5638 on Apache Struts2. This attack highlights the value of an Intrusion Prevention System (IPS) and virtual patching security technologies.

FacebookTwitterGoogle+LinkedIn

Over the past few months, Verizon has launched a series of television ads in which the main character utters the line, “Right plan, wrong network.” The actor saying the line is talking to another character who is clearly having an unhappy experience with his/her cellular connection. If you own a mobile phone, it’s likely you’ve gone through something similar at one point.

FacebookTwitterGoogle+LinkedIn

19-City Tour Brings SonicWall Enablement, Networking to EMEA Partners

It’s no secret that SonicWall is committed to its partner community. The latest testament to this dedication is the PEAK17 partner roadshow, which is currently on a 19-city European tour that launched in March.

The annual roadshow takes SonicWall right to the partners to deliver updates to the SonicWall SecureFirst partner program, news on SonicWall SonicOS 6.5 launch, market momentum, new marketing tools and more.

FacebookTwitterGoogle+LinkedIn

Keeping organizations running safely, while improving business and user productivity in today’s accelerating threat environment, continues to be a non-trivial task for IT leaders. At the current pace of cyber attacks, we understand all too well that the effects of recent events, such as the Equifax, WannaCry and NotPetya attacks, have demonstrated their capacity to change the global business environment from normal to total hysteria in the blink of an eye.

FacebookTwitterGoogle+LinkedIn

Today I am excited to share the new addition to SonicWall’s NSA product family of Next-Generation Firewalls, the NSA 2650.  Three key trends form the design drivers for the new NSA 2650

  1. Wireless Devices Explosion – The demand for increased bandwidth from wireless networks is constantly on the rise with the growing number of wireless devices used per person.
FacebookTwitterGoogle+LinkedIn

New SonicWall NSA 2650 Firewall, and SonicWave Access Points Take Security, Speed and Analytics to Elite Levels

Defending your business is job No. 1. But with so many vectors and end points, it’s an arduous challenge to identify and mitigate known and unknown threats across multiple locations, networks and endpoints — particularly as the need for wireless and mobile access scales to untold heights.

FacebookTwitterGoogle+LinkedIn

Last week, SonicWall hosted over fifty enthusiastic partners across 14 countries at our Asia Pacific and Japan Partner Summit. Phuket with its lush and leafy surroundings and dramatic beach sunsets proved a popular location for our APJ Partner conference. Our purpose was to clearly articulate the vision for SonicWall as we build our solutions and capabilities to fight in an era of unprecedented cyber security challenges.

FacebookTwitterGoogle+LinkedIn

Malware never sleeps. Threat actors and criminal organizations are relentless in testing, optimizing and deploying exploit kits that target businesses and organizations across the globe. August 2017 was no different.

In fact, the month presented SonicWall’s network sandbox, Capture Advanced Threat Protection (ATP), with a few milestones.

First, the Capture ATP service celebrated its first anniversary protecting customer systems across the globe.

FacebookTwitterGoogle+LinkedIn