Are You Compromising Your Business Security

As advances in networking continue to provide tremendous benefits, businesses are increasingly challenged by sophisticated attacks designed to disrupt communication, degrade performance and compromise data. Striking the perfect balance between network security and performance is no easy task. Meeting these demands can be especially daunting for small businesses, which usually cannot afford the same degree of protections as their larger counterparts.

The good news is that, with technology, higher performance and superior security are possible. By minimizing the attack surface that a business presents to the world, security can emerge as a differentiator rather than an inhibitor.

The first line of defense for any business “” large or small “” is an updated and properly configured firewall. In fact, if your business is still using a traditional firewall to protect against malicious threats, you may not even realize that you are woefully unprotected. Though firewalls are an essential part of network security, many (especially traditional firewalls) offer limited protection. They can monitor and block traffic based on source and destination information. But they can’t look inside packets to detect malware, identify hacker activity or help you manage what end users are doing on the internet. Even if you have purchased a firewall just a few years ago, it might not be able to inspect encrypted traffic, leaving you exposed to encrypted malware.

Securing the small business

Just because your business is small doesn’t mean you are at any less risk for a security breach than a larger business. The reality is that cyber-criminals use automated scanning programs that don’t care whether your company is big or small; they are only looking for holes in your network security to exploit.

With tight budgets and fewer resources, small businesses need to make sure their firewalls are delivering maximum protection without sacrificing productivity. To achieve this goal, IT administrators should insist on solutions that provide:

  • Blazing-fast performance: Your firewall must not become a network bottleneck. If it holds up network traffic, then users complain about poor performance and slow response times. Administrators respond by easing security restrictions. The result? The business compromises its security to maintain acceptable performance. It’s a dangerous trade-off that should never happen.
  • Exceptional security: Insist on a firewall that includes deep packet inspection (DPI) technology to decrypt and inspect Secure Sockets Layer (SSL) traffic into and out of the network. Unfortunately, traditional firewalls lack this capability, which means hackers and cybercriminals can smuggle malware right through the firewall just by concealing it in SSL traffic. Many say their firewalls do inspect SSL traffic but fail to tell you how this impacts performance.
  • Low total cost of ownership (TCO): Security solutions that operate in silos can result in gaps and complexity that can kill efficiency and squander resources. Look for an integrated firewall that can be quickly set up and fine-tuned. Easy-to-use features, such as graphical interfaces and setup wizards, can save administration time and help reduce operation and maintenance costs.

As small business’ growing use of cloud applications, the security perimeter becomes blurred between your network and the internet so there is nothing as essential as a solution that draws the line to keep out unwanted intrusions. Your network provides access to critical applications and houses sensitive company and customer data. A single network breach can shut down your operations for days, or allow a hacker to steal vital business data. If you are not currently using or evaluating a next-generation firewall, you should be there’s too much at stake.

Thanks to advances in firewall protection technology, achieving robust network security without sacrificing performance is possible and affordable. To read more tips on how to keep your small business network more efficient and secure, read the e-book, “Securing your small business.”

5 Security Tips Small Businesses Can’t Afford to Ignore

I returned to Las Vegas earlier this month to attend the Black Hat USA 2015 hacker conference where I learned about the latest and most shocking vulnerabilities discovered by security researchers from around the world. It’s fascinating to see some of the incredible security exploits being demonstrated there which I thought were possible only in sci-fi films. But that’s not the case at the Black Hat convention where top researchers revealed what was once impossible to hack is now possible. In past years researchers published their findings on how computers, mobile devices, routers, wireless access points, webcams, security systems, and smart appliances such as televisions, refrigerators, and thermostats can be made to do things that they were never designed to do once they are taken control by skilled hackers. This year, the scariest headlines focused on hacked cars and Internet of Things (IoT) devices. Just imagine hackers taking complete control of cars in the middle of a busy highway and doing the unthinkable or turning printers, VoIP phones or other office devices into transmitters broadcasting decodable radio waves to send data. Attacks this sophisticated threaten the world’s economy, our daily lives and in some case, our national security. You quickly realize that even your most concealed data and individual safety are at heightened risk in today’s digitally connected world.

If you are a small business owner, how is this relevant to you? Many of these pieces of office equipment are at the core of your daily business operations. The ugly truth is that these devices are deployed and often neglected. This makes them unsecured and targets for exploitations because they are rarely patched once they are installed. Thus, many network intrusion entry points and data breaches have been known to occur through these devices unbeknownst to the company. Just because you are a small business, you may think you’re not worth breaking into. The reality is cyber-criminals know most small businesses have poor security practices, weak network defenses and vulnerable devices which makes them easy and lucrative targets for automated attacks because they have the same valuable information (e.g. personal, customer and financial) as larger organizations. CNBC recently reported that companies with less than 250 employees accounted for almost one third of cyber-attacks in 2014. With the hacking economy valued at several billion dollars annually, it’s almost certain there are plenty of malware developers out there who are bent by greed developing new hacking techniques to make their millions at the expense of small businesses.

If you are unsure about whether or not you have implemented enough security measures to protect your small business, we recommend that you immediately boost your cyber security defense posture. SonicWall Security offers the following security tips to help enhance your chance at preventing a data breach.

  1. Enforce a privacy policy if your business collects, handles or stores sensitive data including personal and financial information about your employees or your customers, you need to establish a privacy policy to ensure their information is protected and secured in compliance with legal obligations.
  2. Conduct annual security awareness training for employees social engineering, online fraud, phishing emails, fake websites and free software downloads are successful tactics commonly used by cyber-criminals to get users to inadvertently share personal or business details on social networks and voluntarily install malicious software such as fake anti-virus or computer clean-up tools that are ultimately used for nefarious purposes. Employee awareness and recognition of common security risks when accessing the Internet are the first important steps to prevent a network breach.
  3. Control access to data implement rigorous access policies where access to specific data should be granted only to those individuals who have a specific clearance and use of that data.
  4. Establish multiple layers of security
    1. Protect endpoint devices with strong password enforcement, two-factor authentication, disk encryption, anti-virus, anti-spam and web content filtering.
    2. Control network access with secure mobile access technology to identify and stop unauthorized access attempts.
    3. Combine multiple network defense capabilities including intrusion detection, firewall, web filtering, application control, and anti-malware protection to prevent unauthorized network access and stop malicious code from infecting the network.
    4. Subscribe to around-the-clock threat counter-intelligence services to receive continuous protection against new threats that emerge.
  5. Secure your Wi-Fi network – make sure your wireless access point Service Set Identifier (SSID) name is not publically broadcasted, default password is changed and access is restricted to authorized devices and users only with preset expiration dates.

For additional information about the latest network security technology and how it can help protect your business from today’s advanced cyber-attacks, download this exclusive, “Securing Your Small Business eBook“.

SYNNEX Partners with SonicWall at Upcoming SonicWall Security Peak Performance 2015

The following is a guest post from Reyna Thompson, vice president of Product Marketing at SYNNEX Corporation.

SYNNEX is proud to be the newest distributor to carry the  SonicWall solutions portfolio, and we’re excited to be a Platinum Sponsor at this year’s Security Peak Performance Conference in Las Vegas, NV, Aug. 30-Sept. 2. Our SonicWall Team is ready to help you find, manage and close your next network security deal.

As part of our launch, we’re providing resellers with five free vulnerability assessments. These assessments, performed on the end customers’ network, can be used to show where existing security vulnerabilities lie or to demonstrate proof of performance post-installation. We not only cover the cost of these assessments but provide you with experienced network security personnel who read the data, interpret the findings and make any necessary recommendations.

We’re also here to help you scale and, ultimately, grow your business. Key to that is ensuring you have both bandwidth and geographical reach when it comes to professional services. Just a few of the SYNNEX value-adds for your company are:

  • Deal registration services
  • Skilled engineering resources­
  • Ability to manage rollouts
  • Flexible financing options SYNNEX provides a multitude of options to ensure you have a financial vehicle to support even the largest opportunities.
  • SYNNEX-exclusive promotionsEmail sonicwall@synnex.com to ask us how you can win a December trip for two to Key West
  • Nationwide professional services SYNNEX offers nationwide site assessment and deployment services, helping you expand your geographical reach

Whether you need two SonicWall TZ firewall appliances installed and configured or a network security overhaul for a Fortune 500 company, SYNNEX has the skills and service personnel to get the job done on time and under budget.

As a distributor of the full SonicWall line, we’re excited to round out our portfolio with SonicWall’s award-winning SonicWall security. Visit our booth at the SonicWall Security Peak Performance conference, and find out more about our service offerings and how our team can support you. Follow the conference hashtag #SonicWallPeak and enter the conference #SonicWallPeakSelfie Social Meida Sweepstakes on Twitter @SonicWall and Facebook.


Reyna Thompson, vice president of Product Marketing at SYNNEX CorporationReyna Thompson, Vice President, Product Marketing

Reyna Thompson is vice president of Product Marketing at SYNNEX Corporation. She is responsible for the ConvergeSOLV Secure Networking Business at SYNNEX. Mrs. Thompson joined the SYNNEX team in 2002, as Associate Vice President of Solutions Marketing for the Technology Solutions Division.

Prior to working for SYNNEX, Thompson worked for Gates/Arrow Distributing, where she held various roles dating back to 1993.

Now Available: New SonicWall Email Security eLearning Course

SonicWall SES eLearning course has had a makeover! And how! With recent upgrades to the SonicWall SES product suite, it was only natural that the free, Web-based online training that SonicWall offers to various partner channels would also be revised.

Change needs to beget Changed Content!

The newly launched course contains up-to-date information on SonicWall ‘s SES product suite, challenging quizzes, engaging instructional strategies modeled with a constructivist approach, a new course template, colorful and animated screens and smaller course segments to accommodate busy schedules! The course harmonizes various knowledge levels and seeks to provide an enhanced learning experience around the SonicWall SES solution, to supplement the information provided by the product Admin Guide.

Knowledge rests not upon truth alone, but upon error also!

This free, self-paced training instructs you on how to deploy, configure, and maintain the SonicWall Email Security (SES) solution to meet email security and compliance requirements. The Web-based course prepares the students for their CSSA Level Certification exam. All 11 modules of this course are interspersed with challenging quizzes and knowledge checks modeled along Kirkpatrick’s evaluation principles and procedures to integrate learning, behavior, and results.

These knowledge checks have been deliberately left ungraded because their primary purpose is to help you revisit, analyze, or explore a concept based on any prior knowledge or experience in the email security domain. Detailed and analytical feedback is provided to you for most of the quizzes.

The new SonicWall SES course includes behaviorist-oriented, pre-instructional strategies, such as stimulating recall of prerequisites. It also follows a constructivist approach to non-graded quizzes and knowledge checks that provide opportunities for the learners to reflect upon and articulate what they learned using analytical or holistic rubrics.

There are things known, and there are things unknown. And in between are the doors!

The mainstay of the course is that the revised content came straight from the horse’s mouth, figuratively speaking! The subject matter expertise for the content originated not from the product engineers, but from the folks in the middle of all action, at the vanguards of the battle lines, at…, well, you get the idea! We are referring to none other than the omniscient Tech Support folks that provide solutions to any issues you might ever face with your SonicWall SES application. Their repertoire of case studies drawn from real-life customer stories and experiences was the source of much of the course content and helped make it as contextual and real-life as possible.

Knowledge is of two kinds; We know a subject ourselves, or we know where we can find information about it.

Let’s just summarize by stating that the new SonicWall Email Security course is dynamic, right-sized, collaborative, personalized, comprehensive and ““ best of all ““ free! So check it out and send us your feedback.

Tech Data and SonicWall Partner to Build Roads to Success

The following is a guest post from Chuck Bartlett, Senior Vice President, Advanced Infrastructure Solutions, Tech Data Corp.

The SonicWall Security Peak Performance 2015 conference is fast approaching. Taking place from Aug. 30 through Sept. 2 in Las Vegas, this conference offers an opportunity to gain important insights about security trends, learn about changing customer needs, and grow your business with SonicWall. As a platinum sponsor, Tech Data is proud to partner with SonicWall to provide education and consulting for resellers focused on industry-leading network security solutions and data protection.

As new security threats happen every second, Tech Data is committed to arming you with the tools and services your business’s security network needs to meet evolving market demands, reduce distractions, and ultimately increase profitability.

According to Gartner, the enterprise network security equipment total in North America is expected to increase at a compound annual growth rate (CAGR) of 5.4% until 2019. Tech Data offers comprehensive security solutions that meet the evolving needs of this dynamic market, helping you protect your business and your customers’ data. Additionally, Tech Data provides best-in-class customer service and customized partner enablement programs””including sales and technical training, lead generation, and marketing services””to help grow your SonicWall business.

SonicWall offers industry-leading security solutions. Together with Tech Data’s dedicated team of industry experts””including software licensing specialists, system engineers, and product sales champions””we will work with you and your sales team to establish a customized, value-added channel enablement strategy that works for your business.

Please plan to visit us at booth #9 during the event for a one-on-one consultation. See you in Las Vegas!

Engage in event activities and follow the conversation on Twitter at @SonicWall and @Tech_Data using the conference hashtag #SonicWallPeak.

SonicWall Peak Performance Conference - Tech Data

Is Your Existing Security Solution Able to Protect Against Emerging Threats

Many deployed security solutions rely on a number of legacy products to provide layered security services. In addition, most customers are without security products that perform deep packet inspection (DPI) or SSL/TLS (DPI-SSL) inspection. This combination is leaving you vulnerable at a time when the complexity of cyber security attacks and the proliferation of malware is exploding.

Legacy security stacks may not be up to the task of providing up-to-date protection, and are subject to limitations imposed by the humans that manage them. The individual components of each stack must be configured, updated, licensed and managed often independently using different tools by different people. This tends to create gaps between layers that are easily exploited by cyber criminals waiting to pounce. Furthermore, the security stack is only as good as its lowest common denominator, security is often compromised for performance or cost.

Industry analysts show that the market is moving towards next-generation firewalls (NGFW), but wholesale replacement of you current security stack with a NGFW involves risk in both migration and implementation. In addition, a default choice of incumbent vendor to mitigate this risk may not deliver the desired functionality to meet emerging security requirements. Security is one place where the incumbent vendor may not always be good enough.

In addition to the move towards NGFW, an emerging mega-trend is the proliferation of SSL/TLS (https) encrypted websites (and subsequent encrypted data) due to moves by Google and others driving this change. Just recently the U.S. Office of Management and Budget mandated the encryption of all U.S. Government websites. The percentage of external encrypted traffic in your network is about to explode. Is your current solution able to handle this massive change?

SonicWall SuperMassive Next-Gen Firewall 9000 Series

SonicWall has a differentiated solution to these problems that mitigates risk while allowing you to implement a NGFW security stack and address the scalability requirements of increasing encrypted traffic, while keeping costs low and removing the need to choose performance over security. Our Firewall Sandwich architecture can be deployed transparently behind existing security solutions and add full DPI security services including application control, intrusion prevention, anti-malware, content filtering and SSL/TLS inspection. This scale-out architecture allows up to 16 Dell SonicWall SuperMassive devices to perform DPI inspection in parallel, supporting up to 160Gbps of DPI and 80Gbps of SSL-DPI. Users can start small and scale as needed, leveraging existing devices and removing the need to retire hardware prematurely for performance reasons directly impacting the costs of providing security. Every SonicWall device has the same security protections and up to the minute updates from the Dell SonicWall GRID (Global Response Intelligent Defense) network of 1.1m sensors collecting real-time threat intelligence.

Compared to alternatives, the Firewall Sandwich (FWS) has these advantages:

  • Unlike fixed form factor systems, FWS can scale beyond single unit or HA pair performance
  • Unlike chassis based systems, FWS has the economics of fixed form factor systems and can be deployed in a pay-as-you-grow model
  • FWS provides 1+n redundancy vs. 1+1 in traditional fixed-form factor or chassis based implementations
  • Performance and scalability are linear in FWS vs. fixed in single or HA deployments
  • As units are added to the FWS, cost per protected megabit drops

Using this architecture, SonicWall has helped many customers extend the life of their current security products, minimize risk of adopting DPI security services and scale to meet increasing demands while keeping the costs of providing greater security in check.

Wireless Firewall Solutions for Small Offices and Distributed Enterprises

If you are a small office, I have good news; the new SonicWall TZ Wireless Firewall Series now has integrated wireless. In an earlier life, the startup I was working for had a small compact office; it would be the perfect candidate for the integrated wireless product. For many, where the office is spread out or occupies multiple floors, the ability to use Access Points for an external solution would be the way to go.

Stay ahead of the threats with a product that reduces your threat surface with the security solution used by the big boys. If you are concerned that your security solution is not cutting it, now is the time to consider taking a look at the new TZ Wireless Firewall Series.

Why this is important for business owners

For the business owner, building the business is what commands your attention. Behind this is the absolute desire to avoid negative press associated with a data breach. Looking forward, the question remains “how do I use emerging trends to grow my business?” The new SonicWall TZ series gives you the confidence to grow your business and avoid embarrassing press. Security can help grow your business because a secure perimeter can be seen as a differential advantage, especially when working with enterprise customers.

Business owners are always dealing with tight budgets and look for ways to get the most out of their investment. No need to cut corners here. Both the wireless and wired products are not only affordable but over time deliver an impressively low total cost of ownership. With the TotalSecure bundle, combined with the wide range of product capabilities, the price to buy and the cost to own is something that should warrant investigation.

Over the past several years, SonicWall has invested in security to become the go-to provider of broad security solutions. With the SonicWall TZ products, there is a complete line of wired and wireless network security solutions that fit any type of business small to large. The TZ series enables businesses to achieve the same level of security on the wireless LAN that they have on their wired LAN through integrated wireless or by attaching an 802.11ac SonicWall SonicPoint wireless access point to the firewall. This high-speed “wireless network security” solution protects the WLAN by scanning wireless traffic for threats.

Why this is important for IT managers

For the small business, the IT department may be only one person. The focus is on maintaining a high performance network. The SonicWall TZ series can make the network more efficient by allocating the more bandwidth to important applications over the less important and unproductive apps. The moment you add remote or branch offices, the network becomes more complex. By deploying the same firewall across networks, the efficiencies found with one network expand to include all networks. Instead of complexity, you get simplicity.

Highly effective security can also make the life of an IT manger simpler as well. The security perimeter is much more robust when everyone has the same device and everyone can speak a common language. Our security engine is common to all of our products and has been recognized not only for security effectiveness, but value as well. Compared to Cisco we are more affordable; compared to Fortinet, we perform better; and compared with Palo Alto, we have a wider product offering for small businesses. With the multiple products we offer, there is a solution designed to fit your specific needs and your budget.

Network security is not a one shot event; it is a long-term race with many twists and turns. If you followed the Tour De France, you can see plenty of similarities. If you are going to wear the yellow jersey you need to be a leader but you also need a strong support team to help you can meet the challenges of the road ahead. In the security race that means that you need the latest technology and a strong team supporting you. Let SonicWall ‘s winning products bring a new level of performance to your security race.

Download eBook

A Winning Wireless Combo – New SonicWall TZ Wireless Firewalls and SonicWall SonicPoints 802.11ac

This is a guest post by Timothy Martinez, Founder and President of Western NRG, a premier partner of SonicWall Solutions.

The new  SonicWall TZ Wireless line offers comprehensive security and powerful performance for wired and wireless networks, all in one unit. These network security appliances bring huge technical strides in processing and inspection power to the TZ line, along with 802.11ac wireless, which has up to 3x the throughput of previous wireless standards. The new TZ Wireless series is a powerful all-in-one solution that is perfect for small and medium-sized businesses that are looking for top-notch network performance with the latest wireless improvements.

We have had phenomenal results deploying the SonicPoint AC wireless access points since their release earlier this year. Every customer that has implemented the AC SonicPoints has seen significant improvement in the quality and speed of their wireless network. The technical improvements of the 802.11ac wireless standard combined with the high quality of the SonicPoint hardware have made the release the best one yet. The AC SonicPoints make enterprise-class wireless accessible and affordable for anyone with a SonicWall firewall. Organizations that require large areas to have complete wireless coverage love how the SonicPoints integrate with their existing network infrastructure and can be centrally managed from a familiar and intuitive interface. Wireless technology has improved by leaps and bounds over the last five years, and the performance that customers who are using the new SonicPoint AC access points are experiencing is the truest testament to that.

The  SonicWall TZ Wireless firewall line is ideal for customers that have need for a single wireless access point for their location. Customers with networks that are distributed across multiple geographies love how the TZ Wireless solution allows them to implement a single device for network routing, security and wireless access. They also benefit from having a single integrated device because it lowers the cost and complexity of implementation and ongoing support. The new TZ line has the latest security and wireless technologies combined into one simple, desktop form-factor appliance.

One word of caution I would offer about recommending these appliances for certain environments is placement. The location of the firewall will need to be central enough in the customer location to provide adequate wireless coverage. Often, we see the location of the internet modem, and therefore the firewall is in a telco closet in the back of the building, which is generally not the ideal location to have your wireless broadcast point situated. This is something you will want to clarify in the pre-sales process in order to guarantee a successful implementation and happy customer.

The Generation 6 TZ SonicWall and SonicWall SonicPoint AC lines are the most powerful firewall and wireless products that  SonicWall has released to date. They bring true enterprise-level firewall and wireless capabilities to the SMB market with outstanding performance and rich feature sets. The SonicWall TZ Wireless line puts these great products into a single package that is ideal for security specialists and customers alike.