2011 Newsletter Header

Like us on Facebook   View our profile on LinkedIn   Follow us on Twitter   Find us on Pinterest   View our videos on YouTube

August 2016
In This Issue
NPS Update
Trivia
Ask the Expert
**URGENT AVAYA EoS**
Mitel Next - Innovation
Fortinet New Firewall
DR for the Midmarket
Do you know SD WAN?
What's in a Security Score?
Quick Links to CCC...
Solutions
Manufacturer Links Below are links to manufacturer support and/or update sites. Please note some sites may require registration.  
NPS® Update
NPS
 NPS Score: 76.94%
Surveys Completed:3931

Click here to learn more about Net Promoter Score. 
Trivia
Trivia
 
TRIVIA ANSWER:

1975 was the year Bruce Springsteen had his first hit single. What was the name of the song?   

ANSWER:
"Born to Run"

WINNERS:
Marta Rinaldi
Dan Kurkiewicz
Neil Smith
_________________ 
   
NEW TRIVIA

The 1976 album Frampton Comes Alive! was recorded at this music venue in San Francisco, CA.
Ask the Expert:
Avaya SAL Gateways Requiring New SHA-2 Certificate
Kevin Jermyn, Sr. Project Manager  
Kevin JermynA SAL Gateway on a customer premise communicates with a SAL Concentrator in the Avaya datacenter. The authenticity of the concentrator is verified using digital certificates. The Avaya SAL Concentrator presents an identity certificate which is signed by a certificate authority (CA), and the SAL Gateway authenticates that certificate by using a CA root certificate.

A similar authentication process can occur between the SAL Policy Server and the SAL Gateway, with a different set of certificates that may be provided by the customer. This authentication does not occur if the customer does not load these certificates.

This process is analogous to a web browser authenticating a secure website. The secure web server presents an identity certificate signed by a CA - such as Symantec, for example. The web browser authenticates that identity certificate by using a Symantec root certificate. This certificate-based authentication employs data encryption using a Secure Hash Algorithm (SHA).

Read more and Download Avaya's Playbook for Upgrading
***URGENT***
End of Sale Avaya Communication Manager 4 and Older User Licenses
EFFECTIVE AUGUST 26, 2016
avaya logoAvaya is announcing the End of Sale (EoS) of Communication Manager 4 and older user licenses. This includes AURA, MultiVantage, and Definity systems that pre-date Communication Manager 5.

These solutions have been superseded by new releases.

EFFECTIVE AUGUST 26, 2016, Avaya will no longer sell (make commercially available) CM user licenses for all Avaya offerings for CM 4 or older. Customer seeking additions should look to upgrade to supported versions of Avaya offerings.

Avaya now offers the following solution(s). Avaya Aura 7.0.1 is now available to provide unified communication solutions.

Download the Avaya Annoucement here...
Mitel Next San Diego 2016 - Innovation


Introducing the World's Fastest and Most Secure Distributed Enterprise Firewall
Nirav Shah - Fortinet - July 26, 2016
Fortinet Logo
Distributed enterprises are undergoing a dramatic change, driven by the adoption of mobility, direct Internet access, public cloud applications, and the Internet of Things (IoT). This has resulted in an exponential increase in devices, users, bandwidth, and transactions flooding their networks through the cloud applications. At the same time, the more connected and flexible enterprises become, the more opportunities it creates for cybercriminals to exploit new technologies and services that haven't yet been fully secured.


As a result, distributed enterprise locations are quickly becoming a preferred entry point for hackers and data thieves, which makes it more critical than ever that distributed networks are inspected, authenticated, and secured from the advanced, dynamic threat landscape. Unfortunately, most firewall vendors struggle with the performance of their devices designed for these distributed enterprise locations, especially when enabling advanced security features, just when performance is becoming a critical requirement. Far too often, security and IT teams are forced to choose between providing essential security inspection and preserving the performance of their networks.
 
Axcient Blog:
Disaster Recovery Strategies for Midmarket Companies
Disaster recovery is on many "to do" lists for midsize businesses, but due to lack of time, resources and money, the job either never seems to get done. Even worse, it can sometimes be done without the necessary attention to detail - and that ironically can scare businesses away from fixing problems and beefing up IT recovery efforts, said Mike Dupuy, product marketing at Axcient, a data recovery vendor.

"Customers often have situations in which they are wondering, 'do I have to build another data center? Do I have the resources and expertise needed to create and deploy a DR solution?" Dupuy noted. "We can provide the hardware and software so there is no need to build a redundant center."

Axcient sat down with us at the MES East 2016 Conference in Indianapolis and discussed disaster recovery efforts at midsize business and how his company views the challenges facing the market.

Read more...
Are You in the "Know" About SD WAN?
SD WAN is some of the latest and greatest technology to come out, allowing you to manage your network, optimize bandwidth and service quality, without compromising security. This is "the new MPLS"
 
Key Benefits:
  • Replace both firewall and router with one service
  • Seamless failover in case of link failure, when using two or more network connections
  • Optimize bandwidth
  • Real-time applications such as voice and video get higher priority - congestion prevention at the edge combined with smart QoS settings.
Both cloud VPN and hybrid VPN services are available.
 
To set up a demo and find out more, please contact your CCC Technologies' Representative.
What's in a Security Score?
Stacy Collett | CSO | August 4, 2016
Fair Isaac Corp., the company that issues credit scores for individuals, was tired of other analytics companies developing security scoring tools for businesses and then proclaiming themselves "the FICO of security scores."

So in May, FICO upped its own scoring game. It acquired cybersecurity firm QuadMetrics to create its own brand of enterprise security scores for enterprises. The new scoring tool, available in August, uses predictive analytics and security risk assessment tools to issue scores and predict a company's likelihood of a significant breach compared to other firms within the next 12 months.

"Our own cyber breach insurance underwriters commented how great it would be if there was really a FICO score on this for the underwriting process," says Doug Clare, vice president of cybersecurity solutions. The company had already invested in cybersecurity detection technology that assesses network traffic, and it saw the addition of QuadMetrics as "the right opportunity at the right time," he adds.

Read more...