From my MI6
connections… LOL
Wednesday, July 30, 2014
Friday, July 25, 2014
S5000 SonicWall Sandwich
http://en.community.dell.com/techcenter/networking/m/networking_files/20439189.aspx
This is a highly scalable architecture using SonicWall firewalls and Dell Networking S5000 switch to create a high bandwidth Firewall architecture.
This is a highly scalable architecture using SonicWall firewalls and Dell Networking S5000 switch to create a high bandwidth Firewall architecture.
Thursday, July 24, 2014
File-encrypting Android ransomware 'Simplocker' targets English-speaking users
Malware was updated to use FBI-themed alerts and encrypt backup files, researchers from ESET said
The malware installer masquerades as a Flash video player application and requests to be granted device administrator permissions.
The malware installer masquerades as a Flash video player application and requests to be granted device administrator permissions.
Wednesday, July 23, 2014
Best Practice Videos for SonicWALL Firewalls
Best Practices: Site to site VPN on SonicOS -
Best Practices: NAT Policies on SonicOS -
Best Practices: How firewalls and security services work together
- https://www.brighttalk.com/webcast/5052/115493
Best Practices: Optimal firmware management -
Best Practices: High Availability on Dell SonicWALL -
Secure Mobile Access - Per App VPN and VPN client Java info
First, the per app vpn Youtube video demo:
https://www.youtube.com/watch?v=1v2pm2-PJdU&feature=youtu.be&a
Per-application VPN — Mobile Connect 3.1 in combination with Secure Mobile Access OS 11.0 for Dell SonicWALL E-Class SRA appliances, enables administrators to establish and enforce policies to designate which apps on a mobile device can be granted VPN access to the network.
I found above statement in the datasheet on the mobile-connect page at sonicwall.com:
http://www.sonicwall.com/us/en/products/Mobile-Connect.html#tab=overview
Second, below statement is from our SE team on how we use Java with our VPN clients:
The Aventail Connect Tunnel client is a stand-alone native client for Windows, Mac and Linux. Java is used on Linux to display the optional GUI.
When the Connect Tunnel client is provisioned via the Aventail Workplace portal, Java is used as a provisioning mechanism for Mac and Linux workstations.
The browser based Aventail OnDemand Tunnel agent is provisioned and runs transparently behind the Workplace portal to provide layer 3 access for web based users.
Lastly, the suggested solution starts from:
mfg part # 01-SSC-8487 is SonicWALL SRA EX6000 with 25 User License Bundle.
This bundle sku includes EX6000 appliance, 25 User License, Advanced End Point Control, Connect Mobile, Native Access Modules, Advanced Reporting and a 1-year E-Class Support 24x7 contract.
The above part number has a list price of $7,995.
https://www.youtube.com/watch?v=1v2pm2-PJdU&feature=youtu.be&a
Per-application VPN — Mobile Connect 3.1 in combination with Secure Mobile Access OS 11.0 for Dell SonicWALL E-Class SRA appliances, enables administrators to establish and enforce policies to designate which apps on a mobile device can be granted VPN access to the network.
I found above statement in the datasheet on the mobile-connect page at sonicwall.com:
http://www.sonicwall.com/us/en/products/Mobile-Connect.html#tab=overview
Second, below statement is from our SE team on how we use Java with our VPN clients:
The Aventail Connect Tunnel client is a stand-alone native client for Windows, Mac and Linux. Java is used on Linux to display the optional GUI.
When the Connect Tunnel client is provisioned via the Aventail Workplace portal, Java is used as a provisioning mechanism for Mac and Linux workstations.
The browser based Aventail OnDemand Tunnel agent is provisioned and runs transparently behind the Workplace portal to provide layer 3 access for web based users.
Lastly, the suggested solution starts from:
mfg part # 01-SSC-8487 is SonicWALL SRA EX6000 with 25 User License Bundle.
This bundle sku includes EX6000 appliance, 25 User License, Advanced End Point Control, Connect Mobile, Native Access Modules, Advanced Reporting and a 1-year E-Class Support 24x7 contract.
The above part number has a list price of $7,995.
Thursday, July 17, 2014
Dell SonicWall Email Security in bound order of operations
All checks are done inside the appliance. It does not pass any traffic to any third party servers.
Thank you to Adam Zimmerer, SonicWall SE, for image.
Thank you to Adam Zimmerer, SonicWall SE, for image.
Notification Announcing Support Portal Migration
|
Tuesday, July 15, 2014
Front Line Prospecting Staccato training notes
This sales training reminds me of training I received at Secureworks. I believe a lot has to do with attitude on the phone and your knowledge of the business solution that is being positioned. At the end of the day sales is a numbers game.
However the trainer is basing their recommendations off 1.8 million customer interactions. Referred it to a golf game. Sales people all prospect relatively the same but what if you can do something a little different that makes your stats be better than the next guy...
So prospecting is the calisthenics of selling. prospecting needs a mental change from sales to lead farming. It is activity to get more Meaningful Interactions (MIs). Organizations need your or your competitor's solution to solve a problem. They need to talk to someone. You need to unlock the social DNA of the company to make the Key Person (KP) to want to talk to you.
Prospecting is your process and approach to more than just the gatekeepers of the organization. You want them to become your tour guide to who else would need to know about your business solution.
Proper prospecting is a campaign for MIs. MIs are 20-30 minute conversations where you and the KP talk about a business solution and selling finally starts. You want to have 2-3 Touch Points (TPs) with KPs to get to a MI. 5 TPs is better than 4 but not as good as 6.
TP are referrals, quick conversations, email, voice mail, even faxes. Each TP has a pro and a con; such as a phone call; KP's pick up the phone around 5% of the time and 99% of that time the KP is doing something different than wanting a phone call.
The correct campaign to get a MI has rounds of TPs. The best wait time between rounds is every 3 business days. The first round is reaching out to the most KPs and having as many TPs as possible. The bell curve of success is around 3 to 4 rounds with 5 beginning of diminishing returns. 90% sales people do not get past second round.
Keys to Secure MIs is to disarm and disengage the KP. You can disarm the KP by identifying yourself, explain if referral, and lastly ask for help. Most company employees will want to help get you correct company information. State your purpose: set up 20-30 minute meeting at date/time. Ask question: what is best way to do that?
Prospecting is finding right contact and getting MIs. Then comes the selling. Prospecting and selling are two separate ideas. Stick to the template. People are busy and do not need to be sold during prospecting. When they ask, "what is this call about again?" it is probably b/c they were not paying attention, they are not needing more product details.
Why do we start with the top of the organization? You want to enable the social DNA of the organization working for you in-between campaign rounds.
http://info.frontlineselling.com/
Wednesday, July 9, 2014
SonicWall Email Security Services
What makes you better than the rest?
We have a proven and patented service for delivering email security.
Annual cost - 600 users?
-SonicWall Licensing is stackable.
Hosted (cloud):
dpn: A7489738 mfg: 01-SSC-5045 SonicWALL Hosted Email Security w/24x7 Support 500 Users (1 Year) $5,575
dpn: A7489732 mfg: 01-SSC-5039 SonicWALL Hosted Email Security w/24x7 Support 100 Users (1 Year) $1,455
Appliance (hardware or virtual):
dpn: A7489688 mfg: 01-SSC-7397 SonicWALL TotalSecure Email Subscription 500 (1 Yr) $3,265
dpn: A7489694 mfg: 01-SSC-7406 SonicWALL TotalSecure Email Subscription 100 (1 Yr) $1,300
Inhouse/cloud?
-We have either option.
If inhouse - VM/appliance?
-Yes.
Scripting language/custom rules?
-Not aware of scripting but I am aware of custom rules for compliance license and email boxes.
Filtering - inbound/outbound or both?
-Both
Outlook plugin or only web access to quarantine?
-We have a plugin you can download.
Storage quota – if so per user or aggregate?
-Not aware of… Storage is for Junk box.
Online/web based portal for users?
-Can provide access to URL optional login.
Whitelist/blacklist by administrator?
-Allow by IP address, blacklist by domain, defer list by IP, and greylist by IP.
User self-service whitelist/blacklist?
-User can have access to junk folder.
Whitelist users address list members?
-Not that I am aware of. Don’t completely understand question.
Immediate access to quarantined messages?
-Yes. We have real time reports.
RBLs – can we choose which ones are used?
-Yes, Under blacklist services.
Message retention time – can we define?
-Don’t know.
Quarantine reports – frequency – can we define?
-We offer real time reports, yes.
Quarantine reports - customizable/by user?
-There is auditing that can get you per user reports.
Quarantine - malware – can users release their own?
-I assume yes, if you give them access to their junk box.
Can users right click a message and mark as trusted/spam/release/block, etc?
-There is capability to marking messages as spam.
Image control and scanning – do you offer it?
-We do offer image control with compliance license. It is part of our TotalSecure licensing.
AD integration – do you require it/use it?
-We use LADP services or you can import your own tab-delimited user list.
What happens when an email arrives for an invalid user?
-Logged and dropped.
User account creation – automatic?
-LDAP services.
Blocked file types – can we define?
-Yes, part of compliance.
Can we bypass by user?
-This is part of the admin whitelist.
Support offering - phone/call back/email/chat?
-24x7 phone tech support. There is also an online chat and incident ticket support.
Archiving – is than an option?
-Only storage set up is Junk Box.
Policy enforcement/content control – don’t send cc #s, etc?
-Would be part of compliance licensing. It is part of our TotalSecure licensing.
Built in AV?
-Yes, We have our signatures and MacAffee AV signatures as part of TotalSecure licensing.
Language filtering support – no messages in Russian, etc?
-Yes this is an option.
We have a proven and patented service for delivering email security.
Annual cost - 600 users?
-SonicWall Licensing is stackable.
Hosted (cloud):
dpn: A7489738 mfg: 01-SSC-5045 SonicWALL Hosted Email Security w/24x7 Support 500 Users (1 Year) $5,575
dpn: A7489732 mfg: 01-SSC-5039 SonicWALL Hosted Email Security w/24x7 Support 100 Users (1 Year) $1,455
Appliance (hardware or virtual):
dpn: A7489688 mfg: 01-SSC-7397 SonicWALL TotalSecure Email Subscription 500 (1 Yr) $3,265
dpn: A7489694 mfg: 01-SSC-7406 SonicWALL TotalSecure Email Subscription 100 (1 Yr) $1,300
Inhouse/cloud?
-We have either option.
If inhouse - VM/appliance?
-Yes.
Scripting language/custom rules?
-Not aware of scripting but I am aware of custom rules for compliance license and email boxes.
Filtering - inbound/outbound or both?
-Both
Outlook plugin or only web access to quarantine?
-We have a plugin you can download.
Storage quota – if so per user or aggregate?
-Not aware of… Storage is for Junk box.
Online/web based portal for users?
-Can provide access to URL optional login.
Whitelist/blacklist by administrator?
-Allow by IP address, blacklist by domain, defer list by IP, and greylist by IP.
User self-service whitelist/blacklist?
-User can have access to junk folder.
Whitelist users address list members?
-Not that I am aware of. Don’t completely understand question.
Immediate access to quarantined messages?
-Yes. We have real time reports.
RBLs – can we choose which ones are used?
-Yes, Under blacklist services.
Message retention time – can we define?
-Don’t know.
Quarantine reports – frequency – can we define?
-We offer real time reports, yes.
Quarantine reports - customizable/by user?
-There is auditing that can get you per user reports.
Quarantine - malware – can users release their own?
-I assume yes, if you give them access to their junk box.
Can users right click a message and mark as trusted/spam/release/block, etc?
-There is capability to marking messages as spam.
Image control and scanning – do you offer it?
-We do offer image control with compliance license. It is part of our TotalSecure licensing.
AD integration – do you require it/use it?
-We use LADP services or you can import your own tab-delimited user list.
What happens when an email arrives for an invalid user?
-Logged and dropped.
User account creation – automatic?
-LDAP services.
Blocked file types – can we define?
-Yes, part of compliance.
Can we bypass by user?
-This is part of the admin whitelist.
Support offering - phone/call back/email/chat?
-24x7 phone tech support. There is also an online chat and incident ticket support.
Archiving – is than an option?
-Only storage set up is Junk Box.
Policy enforcement/content control – don’t send cc #s, etc?
-Would be part of compliance licensing. It is part of our TotalSecure licensing.
Built in AV?
-Yes, We have our signatures and MacAffee AV signatures as part of TotalSecure licensing.
Language filtering support – no messages in Russian, etc?
-Yes this is an option.
Wednesday, July 2, 2014
Subscribe to:
Comments (Atom)