Clearpath’s Blog on IT Infrastructure, Hybrid Clouds and IT Security

Clearpath Solutions Group

Recent Posts

Getting to the Cloud Faster and More Securely with VMware NSX

Posted by Clearpath Solutions Group on Thu, Mar 09, 2017 @ 10:07 AM

The hybrid cloud model is becoming an attractive option for a growing number of businesses 
looking to differentiate, innovate, and quickly meet expanding business requirements.  In addition to offering greater agility, flexibility, and scalability, hybrid clouds also help maintain security and high performance for business critical applications and data.  The software-defined data center (SDDC) enables this transition to the cloud by providing an infrastructure that is virtualized and fully automated by software. 

Read More

Topics: VMware NSX

Network Virtualization and Disaster Recovery as a Service (DRaaS): The Right Match for Faster Recoveries

Posted by Clearpath Solutions Group on Wed, Mar 01, 2017 @ 09:56 AM
The concept of virtualization has revolutionized today’s data center – from server to storage and now networking. As a result, it has paved the way for many cloud offerings such as Software as a Service (SaaS) and Disaster Recovery as a Service (DRaaS). Small and medium businesses, or really enterprise customers of any size, can now implement comprehensive disaster recovery plans that were once out of reach due to cost or lack of resources.
Read More

Topics: VMware NSX

Clearpath Solutions Group Recognized for Excellence in Managed IT Services

Posted by Clearpath Solutions Group on Tue, Feb 21, 2017 @ 01:28 PM

Clearpath Solutions Group  announced today that CRN®, a brand of The Channel Company, has named Clearpath to its 2017 Managed Service Provider (MSP) 500 list in the Elite 150 category. This annual list recognizes North American solution providers with cutting-edge approaches to delivering managed services. Clearpath has a comprehensive portfolio of managed services offerings that address all aspects of the infrastructure including voice, network, compute, storage, virtual, cloud-based and customer on-premises environment solutions. Clearpath’s offerings deliver the performance, resiliency, and availability necessary to support our clients’ business initiatives while lowering their overall IT support costs.

Read More

Greater IT Security Through Network Virtualization: Why VMware NSX Should Be A Part Of Your Security Solution

Posted by Clearpath Solutions Group on Thu, Feb 16, 2017 @ 10:00 AM

“Yahoo says 500 million accounts stolen” – CNN Money

“Snapchat and Seagate fall prey to new W-2 scam” - CBS News

“Cyber hack got access to over 700,000 IRS accounts” - USA Today

“LinkedIn Data Breach: 117 Million Emails and Passwords Leaked” - Fortune

“The Perfect Weapon: How Russian Cyberpower Invaded the US” – New York Times

Headlines like these are increasingly more common as data breaches, leaks, and hacks continue to affect companies of all sizes, types, and prominence.  Unfortunately, no one is immune to the sophisticated attacks performed at the hands of cybercriminals.  And despite greater focus and effort on defending the data center, the speed at which technology is evolving creates new challenges for implementing a secure network. 

Read More

Topics: VMware NSX

Cisco ACI and VMware NSX: How They Can Coexist

Posted by Clearpath Solutions Group on Thu, Feb 09, 2017 @ 10:02 AM

For customers looking to adopt a software-defined networking (SDN) approach to automating their data center network, Cisco ACI and VMware NSX are likely not foreign terms.  These SDN platforms, being two of the leading solutions in the market, have often been positioned against each other as apples-to-apples competitors.  In fact, of the 250 SDN-related inquiries that Gartner fielded in 2016, more than 50 specifically requested comparisons between VMware NSX and Cisco ACI.

Read More

Topics: VMware NSX, Cisco ACI

Enabling Secure IT Operations for your Organization

Posted by Clearpath Solutions Group on Tue, Jan 17, 2017 @ 11:29 AM

Over the past several weeks we have examined ways to protect your organization from malware and other malicious code throughout the corporate environment. If it is not evident at this point - we are examining data from a multitude of devices scattered throughout the corporate IT infrastructure. We find that the devices and software used for this task are both diverse and disjointed. These devices include Firewalls, laptops, desktops, multifunction devices, A/V software, basically anything that is connected to the network. These devices and software provide valuable information in the form of logs that can be used to trigger alerts based on multiple inputs.

Read More

Topics: Security, SIEM

Complete Endpoint Solutions

Posted by Clearpath Solutions Group on Thu, Jan 05, 2017 @ 11:39 AM

The battle at the endpoint - phones, tablets and mobile computing - faces an endless onslaught of malware delivered from websites, bots, and pretty much any other malicious code that can be thrown at endpoints. Why are the endpoints always under attack? Simple, when they are off corporate networks there are no firewalls, no IPS, none of the enterprise grade protection that exists in a corporate environment. You and I know this, unfortunately so do the bad guys. Understanding this helps us understand why these devices are frequently targeted by malicious individuals and organizations.  It is good to think of the endpoints as the new perimeter.

Read More

Topics: Security, Endpoint Security

Hunting Hidden Malware in your Datacenter

Posted by Clearpath Solutions Group on Thu, Dec 22, 2016 @ 02:13 PM

All malware does not immediately trigger a security alert as some new variants are quite stealthy and designed to lay in wait until such time as they are activated. In this section we describe malware and in particular ransomware.

Northeastern University published an interesting piece, “Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks” Between 2006 and 2014, this research team analyzed 1,359 ransomware samples and found that a “close examination on the file system activities of multiple ransomware samples suggests that by… protecting Master File Table (MFT) in the NTFS file system, it is possible to detect and prevent a significant number of zero-day ransomware attacks.”

Read More

Topics: Security, Ransomeware

Educating the User and Social Engineering

Posted by Clearpath Solutions Group on Thu, Dec 15, 2016 @ 10:08 AM

For the second part of the series we would like to dive into educating the user as well as social engineering. The user continues to be the weakest link in many organizations; while it is not that a user has bad intentions, they just frequently represent the easiest target. This can be easily depicted by using a house analogy, the organization can put locks on the doors and
windows as well as installing a state of the art alarm system. This does not prevent the attacker from simply knocking on the door and being invited in by the homeowner. As a matter of fact, this is what makes phishing campaigns so successful. The user is actually tricked into unknowingly granting attackers access to corporate resources.

Read More

Topics: Security

Detecting and Blocking Malware at the Gateway

Posted by Clearpath Solutions Group on Thu, Dec 08, 2016 @ 02:13 PM

Modern malware is evolving at an extremely rapid pace. In fact, a new malware is created nearly every second. Due to the dynamic landscape of ever-growing malware variants, traditional antivirus solutions are becoming less effective - unable to detect and block the unknown malware before it can infiltrate and compromise an organization’s network and systems, driving the need for a more comprehensive solution. In the past two years this has become an increasing busy space among OEM solutions providers. Cisco Systems, Checkpoint software, and Fortinet have invested in providing cost effective solutions that are easily managed resulting in low effort required to provide critical protection of your organizations devices.

Read More

Topics: Security

Subscribe to Email Updates

Live Chat Support Software