cd5e2dfc776c50df38b1088872c68188

Disaster Recovery Planning

Disaster Recovery Planning

IT Disaster Recovery (DR) and Business Continuity (BC) plans used to be reserved for large enterprise level companies. Disaster Recovery and Business Continuity provision required a very large budget and often included cold or hot sites, expensive replication software and duplicate equipment ready to go in case the worst were to happen. Not only is this equipment expensive to purchase and house, it also needed staff with the knowledge and time to both manage IT and regularly test it. Face it a disaster recovery or business continuity plan that isn’t tested, is unlikely to perform well when a real disaster strikes. Disaster recovery as a Service (DRaaS) advances has brought the cost of developing and implementing a Disaster Recovery or Business Continuity solution down to the point where it can fit into nearly any size budget. Even so, planning for both IT Disaster Recovery and Business Continuity is still best done by partnering with experts in the field. A proper Disaster Recovery or Business Continuity plan needs to meets some key criteria for each organization. The criteria will depend on their individuals need sand their business model. The easiest starting point when creating a plan is to consider the Recovery Time Objective (RTO) and Recovery Point Objective (RPO) requirements for your critical IT systems. RTO: How long your critical IT systems can be down before your company starts to incur unacceptable consequences. For most companies this time frame will range anywhere from 8-24 hours, allowing for one business day of downtime. RTO can also be broken up into different categories for your resources. Mission Critical services (like email, human resource applications, customer facing applications and phones) may have a shorter time period, needing to be brought back up within just a couple of hours, while other resources it may be acceptable to be down for a day or more. RPO: How long you can afford to roll back to and lose any data added or changed during that time. RPO is how much data loss a company can handle at any point in time. For example, if your main file server goes down how much data would be lost since the previous backup? Services that have a high rate of change for their data, like database or email servers, will need a shorter RPO. Services that have little data change, like web servers, can be fine with a longer RPO. With these two objectives in mind, you can begin to create a disaster recovery plan that will keep your company operational.

Abtech
Once the RTO and RPO have been decided upon the next step is to decide where and how you will bring your services back up. It is also worth pointing out that achieving a shorter RTO and RPO often means a higher cost for the service. So available budget needs to be considered. For companies that do not have an enterprise budget having a cold or hot site may stretch the budget too thin and lead to a site that does not meet the full requirements of the plan.

DRaaS and cloud based disaster recovery and business continuity solutions are available as a monthly service, which allows organizations to move the cost from a capital to and operational cost. They are hosted and often fully managed solutions, providing the capabilities of a cold site without having to spend the capital to build one.

 

Even with a cloud disaster recovery or business continuity service, you cannot just set it up and forget it, then hope that it will work when a disaster strikes. Just like a fire drill, it is important to regularly test the solution and also test your procedures for getting staff connected to the cloud service. You also have to have a process in place for declaring a disaster and knowing who has the authority to do this. Returning your business back to normal, even if its a false alarm, can take time and effort. it is important to work with a DRaaS partner who can help with the planning and design of the solution. It is also important to work with a partner who includes a regular test of the solution and can help you plan for the test and also a disaster itself.

 

Abtech Technologies offers disaster recovery and business continuity services through their StorTrust brand, where we strive to provide a complete “white glove” service for every client. We partner with them through every step of their disaster recovery and business continuity process and make sure everything is thoroughly tested. We want our customers to be able to sleep at night!

Utilizing industry-leading DR tools and software, StorTrust offers total disaster recovery service for your data and your critical computer systems in a single package. Built upon a Tier 3+, SSAE16 compliant data center utilizing the latest in security, StorTrust is a safe and secure location to store your data offsite for when you need it. We can work with you to develop a DR plan that will meet your organization’s requirements. We also include a yearly test with the service, so you don’t have to worry how you will handle a disaster, you will already know. Abtech has a team of engineers with years of first-hand knowledge of disaster recovery and business continuity planning. Our engineers will be with you every step of the way to make sure that your critical IT systems are up and running when you need them most.

Backup-vs.-Replication

Backup and Replication – Why Replication Isn’t Enough

Backup and Replication – Why Replication Isn’t Enough

We frequently talk to customers about their backup and disaster recovery plans. A topic that often comes up is that the customer feels they are covered by their replication of data and don’t need to have a separate backup schema.

Let’s analyze that: The replication system will typically create a real time copy of the data to a secondary, possibly remote, site. Everything that is written to one storage system is replicated to the other. It’s pretty simple, and, if you have enough bandwidth between the site, very attractive. It can do a good job of protecting from site failure. If the storage systems include something like the Compellent Live Volume feature, you can have very fast recovery between sites.

But that doesn’t protect against what I call a “Layer 8” failure; the incredible ability we humans have to make a mistake. For instance: Bob decides he no longer needs a file and inadvertently removes the directory. Replication will immediately make the change to the remote site too. You no longer have any copy of the directory on either system.

 

Some customers have snapshots implemented. They can help if you can go back into one of the snapshots and retrieve the directory, but the snapshot has to be replicated to the remote site also for it to be recoverable in a DR scenario. The snapshots also have to be available for the time the error occurred. Most snapshot implementations only have a few days of snapshots online, if that many.

A backup that is constantly doing small incremental backups will usually have that data on it. It is a simple matter to recover the directory to its original location. A replicated backup will also provide recovery at the remote site if the primary site is unavailable. A typical backup/recovery system will have several months of backups available, so if Bob deletes a directory or file and doesn’t realize it for several weeks, he can probably get it back.

While we are talking about site failures, it is critical that your backups not be stored on your primary storage system. If you lose the system, you lose your backup data and the ability to recover it. If you are not using tape or replication of your backups, you could lose your complete company. Abtech recommends a separate backup server/appliance for your backups, especially if you want to eliminate tape from your backup process.

Give us a call for help with all of your backup and disaster recovery needs.

Robby Wright, Chief Architect & Consultant

images

DellEMC World Update – mid-range storage updates announcements

DellEMC World Update – mid-range storage updates announcements

New Product Releases for DellEMC SC Series and Unity Mid-Range Storage Platforms.

Often when two companies come together, customers fear the worst.

Will the technologies they rely on go away?

Will there continue to be development and enhancements to their preferred systems?

When Dell and EMC combined in 2016, they addressed these concerns immediately, telling their midrange customers that they are fully committed to the success of both Dell EMC Unity and the SC Series storage technologies. Abtech has also followed the same line by strengthening our SC-series team as well and adding Unity skills to our services portfolio.

At DellEMC World, DellEMCs commitment to both platforms was underlined by a series of product announcements for both Unity and SC Series. Here is a summary.

SC Series: Optimized for Economics

“The Dell SC Series is a value-oriented family with a proven track record, particularly in small and medium businesses. Focused on value and ease-of-use, the SC Series is a powerful hybrid solution that delivers intelligent and granular tiering, helping customers to dial-in flash as needed to balance performance and cost.”

Announcement:

The new SC Series 5020 is the next-generation upgrade to the popular SC4020 array, delivering with up to 45% more IOPS, 3X more bandwidth, and twice the capacity.

Dell EMC Unity Family: Optimized for All-Flash Performance and Flexibility

“The DellEMC Unity family is able to address most general-purpose midrange customer requirements for block, file, and unified workloads. Offering up to 295K IOPS, it packs an incredible amount of power into a dense 2U footprint.”

Announcements :

New Dell EMC Unity All-Flash models that deliver even better performance with up to 40% more processor cores and 2X the system memory for advanced data services
Dell EMC UnityOE Software updates that provide greater simplicity and efficiency including expanded 256TB file system capacity, block tiering to the cloud, new Dynamic Pools, and enhanced data protection and mobility
As a DellEMC Platinum Partner, Abtech is first to know about new product releases and promotions, so please check back here to future updates.

1633762691s_Dell

Dell EMC Storage Strategy

Dell EMC Storage Strategy

“Expanding The Horizon for Dell EMC Midrange Storage Customers (taken from DellEMC blog article published September 2016)”

Here we are as Dell EMC, and we’re champing at the bit to show our customers, partners and the world what we’re made of as a combined business. We were already recognized as the leader in data storage pre-merger and together we’re going from strong to stronger, now number one across all combined mid-range markets in which we play. If you’re a customer or partner of either company this bodes well for you, as Dell EMC can now offer an even greater choice of world-class products from a single vendor, which has become the largest privately controlled IT company in the world.

Since we started this journey nearly a year ago, we’ve had a number of questions from customers about our plans to support the midrange storage portfolios that are coming together. Let me confirm that we are 100% committed to supporting both EMC Unity and the Dell SC Series (Compellent) going forward. Why? Let’s start with a look at what both product lines have brought to the combined business and then fast forward to see what the future holds.

The Dell EMC midrange businesses represent:

  • Market share of 29.4%, nearly double that of our nearest competitor.
  • Leadership across all price bands. [i]
  • $5 billion in combined revenues [ii] within a total addressable market of more than $17 billion.
  • More than 100,000 existing, passionate storage customers [iii], with the heritage of both EMC technologies well positioned in large enterprises and of Dell’s incredible strength in the entry-level and mid-markets.

Abtech
The Combined Dell EMC Midrange Portfolio – Go Forward from Today
Dell EMC’s midrange portfolio now has a scale and breadth that is without comparison in our industry. Our combined midrange offerings are the strongest they’ve ever been as, this year, we have launched new products such as Unity Flash storage systems and made powerful enhancements to the SC Series OS. This all adds up to a combined portfolio for our customers and partners that is unmatched elsewhere in the industry.

Portfolio Approach = A Win-Win for Customers and Partners
While single “point solutions” may be temporarily viable for one-trick, cash-burning startups and niche players, neither Dell, nor EMC has ever believed ‘one-size fits all’ is the best approach because it limits choice and flexibility. It’s not about us; it’s about our customers, so we focus on offering a continuum of solutions. This means we’re able to tailor our offerings for specific customer needs, by combining unique capabilities from across our broad portfolio. As Dell EMC, we can bring customers an even deeper portfolio approach to midrange storage. Together, we can ensure choice of the right product for an even wider spread of our customer’s needs at the optimal price and performance, now covering almost any use case.

As a combined business, Dell EMC is the midrange segment leader in market share and offers two strong and distinct product families that meet customer needs from entry-level into upper midrange storage. For the sake of simplicity, let’s refer to them as Dell SC Series and EMC Unity. There are clear distinctions in both the use cases and scale that each product family addresses.

SC Series: Value-Optimized Mid-Market Proven Storage Systems
The Dell SC Series is a value-oriented family with a proven track record in many small and medium businesses. In analyzing the SC customer base, we’ve seen distinct areas of strength where Dell is the server vendor. Focused on value and ease-of-use, the automated data placement and data efficiency features provide performance at a low price. The range of configurations includes all-flash, hybrid and disk-only configurations. Ideally suited to smaller deployments across a variety of workloads, the SC Series products are easy to use and value optimized. We will continue to optimize the SC Series for value and server-attach.

Unity Family: The Ultimate in Simple, Flexible, Unified Storage
The EMC Unity family is able to address most general-purpose midrange customer requirements for block, file, and unified workloads with configurations for all flash, converged, hybrid and virtual deployments. The Unity architecture will continue to be optimized for simplicity, flexibility and affordability. In just a few more weeks, we will announce a powerful Unity code update to expand its all-flash data services, increase its category-leading density and provide advanced cloud services.

With such incredible assets and customers, the Dell EMC strategy is to retain both product families and continue investing in them according to their strengths. That benefits us, because it benefits our customers. It’s a strategy we believe supports customer choice and leaves no gaps for the competition.

While we are leading with Unity and SC Series for our midrange customers going forward, we will continue to support our N-1 platforms from both Dell and EMC. Customers can continue with their current products and then choose to evolve over time as Dell EMC invests more in seamless management and mobility across our product set.

For migration, management and mobility, we’ve got our customers covered. We already have EMC ViPR Controller – which is a common storage management platform across multi-vendor storage arrays. In addition, we have world-class data protection across Dell and EMC storage with EMC Data Domain, EMC Avamar, and EMC NetWorker. EMC RecoverPoint and EMC VPLEX can also be used today for replication between Unity and SC Series to facilitate easy coexistence and data mobility.

Bottom line
Dell EMC is better together, and we’re making sure that this is true most of all for our customers, who will be able to stick with what is most familiar and comfortable for them. Both Unity and SC Series product families will continue well into the future with support and R&D that will further develop their capabilities to handle the most diverse set of midrange use cases and workloads. The level of quality, product functionality and support that our customers have come to trust and appreciate will be a minimum baseline for Dell EMC today, and it will be the foundation from which we will exceed customer expectations in the future.

 
1200x580_blogg_Powerstore_D2D_okt20-1

Lower Cost Alternative to DellEMC Support

Lower Cost Alternative to DellEMC Support

The business landscape is growing at a fast speed. Therefore, the pressure of the introduction of new technologies into your IT system has been greater. Time and proficiency require higher costs including maintenance cost, requirements of the vendor, and stability of the system. These all require cost but also provide benefits to the business. To deliver customers with market-leading services and products as well as solutions, Abtech has done a partnership with Dell EMC. Due to Dell EMC support, we have become proficient in many of their technologies.

Here exists the complete wide-range of Dell EMC services. For example, Dell EMC storage products as well as design and implementation of DellEMC storage solutions. Abtech as a Dell chief partner works directly with Dell EMC accounts to provide services to their customers along with the offering of the best IT solutions. We offer cost-effective services for our customers that transform Dell EMC services into IT solutions.

Due to the high demand for IT and complexities in the IT environment, Dell support services are the most suitable option at an economical cost. Here, you can get professionals’ help as well as technologies in a cost-effective manner. This will allow you to focus on the business progress hence, make you competitive. You can get solutions for your data protection here in lower-cost alternative to others as Abtech along with DellEMC offers solutions over the whole continuum i.e. short term data storage to long term retention of data.

To support data storage and movement, DellEMC support services do not involve any additional cost even for big data. As compared to others, Abtech technologies do not charge both to and from external stores. The services for hardware, software, and maintenance of the network are incorporated in the pricing of Dell EMC support services. Also, it includes services of deployment as well as implementation. These services are available at a cost-effective price. The cost related to the power component of hardware as well as data center infrastructure power are based on reasonable estimates and it is market competitive.

It is honored to be a deliberate data protection partner with Dell EMC. We work harder to offer the latest Dell EMC solutions to our customers. Our sales team as well as implementation experts’ work with Dell EMC professionals to deliver these services at an efficient price. DellEMC can secure data for customer end-to-end. This end-to-end advanced Dell EMC service help to lessen or exclude tape infrastructure in an effective manner. Thus, help to reduce cost. With the help of DellEMC support services, energy costs can also reduce with the reduction in demand for bandwidth. Dell EMC services help to operate effective data protection and it represents the cost-saving process.

If you face pressure to support initiatives of new business as well as related to IT costs, you simply need to modernize your data centers and transform your IT system. With the help of Dell EMC support, you can get these services at a controlled cost. With the help of Dell EMC Support Services, we offer cost-effective software for the optimization of your infrastructure. This can cut your cost for the protection of data up to 81%.  Abtech provides a cost-effective system or storage array with EMC support. We have competitive teams for EMC support services and they are delivering premium quality services. For the planning and implementation of EMC solutions, we have architects and consultants. EMC support engineers to solve your complex issues. We have a team of specialists to focus on the unique needs of your business.    

Abtech is committed to Dell EMC and provides you to transform your business and thus help you to stay competitive and increase your market share. You can get this service at a very efficient cost.

For the improvement of operational efficiency and better customer experience, the organization must adopt innovations in technology. This technology innovation is used to keep pace with the speed of digital transformation. The valuable asset for any organization is its data and the most important aspect is the management and protection of data resides. In a highly competitive environment, Abtech helps you to gain a competitive advantage at a reasonable cost. Dell EMC support services help to transform and modernize the data storage environment. It helps you to strengthen your business by focusing on your valuable asset i.e. data. Dell EMC alternatives provide you IT solutions and deliver you the best quality in a cost-effective manner and this will progress your business.

AP_FLOODING_150525_DG_16x9_992

How we were able to prepare and protect our clients’ businesses from a major natural disaster.

How we were able to prepare and protect our clients’ businesses from a major natural disaster.

Watching the news late last August, we saw that Hurricane Harvey was headed for the Texas coast.

Abtech has customers in our StorTrust backup and disaster recovery cloud that would be right in the path of the hurricane, especially one of them, a supply company to the petrochemical industries.

We contacted our customer to talk about preparing for a possible disaster recovery invocation.

As a result of the call, we decided to do some advanced preparation and set up their disaster recovery environment. Using Rapid Recovery’s virtual standby server features, we created images of each server required for the disaster recovery.

As Rapid Recovery takes each recovery point in their production environment, it is replicated to the StorTrust cloud and the virtual standby server feature applies that data to the images of their servers. This allows a very small recovery point objective and minimizes lost data should the worst happen.

Our StorTrust cloud service includes an annual test. During this test, we configure and spin-up the customer’s disaster recovery environment and set up the networking to connect everything.

Once the test is finished, we store the configuration for use during a disaster.

In preparation for the possible invocation, we applied the configuration to the virtual standby servers we created and we were ready to spin-up if necessary. We supplied a unique IP address to the customer should they have to access their servers.

On the day the hurricane hit Houston, we sat near our phones waiting for a call.

18 hours into the event, we finally got it.

Our customer asked us to start spinning up their environment – they had lost communications with their servers in the colocation facility.

Because the StorTrust cloud does not rely on websites or menus to start a disaster invocation, the one call was all our customer had to make to get things started. In his case, that was important because they did not have a network connection to work from and would not have been able to set up their environment and start it.

We started to spin-up the servers and make them active.

We were almost ready to put everything on air when received another call saying that network contact with their servers had been restored and asked us to stand down.

It turned out that one of their colo’s network feeds had flooded and they were able to fail over to another feed entering the building from a different direction, which is proper for a good colo facility.

Our customer finished riding out the storm without further incident and we put their environment back in normal backup mode. Having everything ready ahead of time in this instance allowed our customer’s personnel to worry about their families instead of how to keep the company running.

663608_97177756

What to do when an ex-employee starts deleting your company data.

What to do when an ex-employee starts deleting your company data.

We had an interesting customer situation to deal with recently here at Abtech Technologies.

One of our StorTrust clients had to let one of their employees go.  Nothing too unusual.

However, they didn’t escort the person off the premises, delete their login and move on.  Instead, they let her go back to her desk while they sorted out the necessary paperwork.

So, what did the now ex-employee do with that time? Did she quietly pack up her stuff and say goodbye to her colleagues?

Unfortunately not.  Instead, she logged onto her system and started to delete company data, including files and emails.  The company was in the medical space and not having these files could have compliance implications.

Luckily, someone noticed and notified their manager, who removed the ex-employee from her desk and arranged for her network access to be revoked.  

I guess that person will not be getting a reference anytime soon.

So, what could they do to recover the data?

After a bit of head scratching, someone pointed out that they had recently signed up for a StorTrust backup and DR contract with Abtech.

They called us up and asked if we could help.

StorTrust uses Quest Rapid Recovery software at its core, which has powerful recovery capabilities.  It can be used to recover complete servers but also individual files and emails.  

Our engineer logged on and reviewed the logs.  They found where the files had been deleted and recover them from a recent backup.  

The whole process took less than 10 minutes.  All the data and emails were recovered to their original location.  

The first thing to learn from this is that, when you let go an employee, they can sometimes do irrational things.  So, have everything prepared, including instructions to cancel their network login, before you have that “we are having to let you go” conversation.

What this also shows is the value of having the right backup and data recovery solution in place. StorTrust and Rapid Recovery provide the protection against this and many other scenarios.  These include ransomware attacks and hardware failures as well as the more obvious natural disasters.

If you want to know more, please give us a call or download our ebooks on Disaster Planning and How to Deal with a Ransomware Attack

blog-whaling-1

An employee opens an email virus. Read what happens & see a timeline of events [Infographic]

An employee opens an email virus. Read what happens & see a timeline of events [Infographic]

Curious how a backup and disaster recovery (BDR) service can be really helpful? Here’s a real-life example: 

One of our managed services customers recently experienced a ransomware attack. A member of staff was sent an email with a virus attached to it. This is a widely used piece of ransomware, which encrypts the files on the computer it infects and any directories on other systems it has access to.

The email looked genuine and was addressed personally to that staff member by name, so he opened it. Immediately his system was encrypted. The virus also encrypted the company file server so none of the users could access their data. Everything ground to a halt.

Shortly after a ransom request arrived in the user’s inbox asking for a sizeable amount to be paid in bitcoins. The CEO and CFO were alerted and, after a short period of mild panic and discussion, they called Abtech for advice.

Fortunately, they were signed up to our StorTrust Backup and Disaster Recovery (BDR) services. The service uses Quest Rapid Recovery software that is configured to take snapshots of their systems every 30 minutes (it can take Snapshots every 5 minutes, but this customer preferred every 30). The data is then replicated to our StorTrust cloud data center in Nevada, for disaster recovery purposes.

The StorTrust engineer checked the logs and found that the last good backup happened 5 minutes before the ransomware attack. This meant that we would be able to recover the data to a clean file server and the client would only lose 5 minutes’ worth of data.

The client agreed and we restored their infected server from a clean backup. The user’s system was also reimaged and data restored from the backup. The whole process took less than an hour and no ransom was paid.

If the infection had been more widespread, we would have elected to spin up their critical systems in our cloud, using the replicated good backup, so their users could continue working, while we cleaned and restored all their infected systems.

If you want to know more, please give us a call or download our ebooks on Disaster Planning and How to Deal with a Ransomware Attack

pexels-pixabay-71116-e1656441777660-660x400-1

Preparing for Hurricane Harvey – Disaster Recovery in Action

Preparing for Hurricane Harvey – Disaster Recovery in Action

Watching the news late last August, we saw that Hurricane Harvey was headed for the Texas coast. Abtech has customers in our StorTrust backup and disaster recovery cloud that would be right in the path of the hurricane, especially one of them, a supply company to the petrochemical industries.

Abtech

We contacted our customer to talk about preparing for a possible disaster recovery invocation. As a result of the call, we decided to do some advanced preparation and set up their disaster recovery environment. Using Rapid Recovery’s virtual standby server features, we created images of each server required for the disaster recovery. As Rapid Recovery takes each recovery point in their production environment, it is replicated to the StorTrust cloud and the virtual standby server feature applies that data to the images of their servers. This allows a very small recovery point objective and minimizes lost data should the worst happen.

Our StorTrust cloud service includes an annual test. During this test, we configure and spin-up the customer’s disaster recovery environment and set up the networking to connect everything. Once the test is finished, we store the configuration for use during a disaster. In preparation for the possible invocation, we applied the configuration to the virtual standby servers we created and we were ready to spin-up if necessary. We supplied a unique IP address to the customer should they have to access their servers.

On the day Hurricane Harvey hit Houston, we sat near our phones waiting for a call. 18 hours into the event, we finally got it. Our customer asked us to start spinning up their environment – they had lost communications with their servers in the colocation facility. Because the StorTrust cloud does not rely on websites or menus to start a disaster invocation, the one call was all our customer had to make to get things started. In his case, that was important because they did not have a network connection to work from and would not have been able to set up their environment and start it.

We started to spin-up the servers and make them active. We were almost ready to put everything on air when received another call saying that network contact with their servers had been restored and asked us to stand down. It turned out that one of their colo’s network feeds had flooded and they were able to fail over to another feed entering the building from a different direction, which is proper for a good colo facility.

Our customer finished riding out the storm without further incident and we put their environment back in normal backup mode. Having everything ready ahead of time in this instance allowed our customer’s personnel to worry about their families instead of how to keep the company running.

Gen7

SonicWall Turbocharges Innovation with Unprecedented Delivery of New Wireless, Mobile and Wired Network Security Products

SonicWall Turbocharges Innovation with Unprecedented Delivery of New Wireless, Mobile and Wired Network Security Products

SonicWall Press Release

KEY ANNOUNCEMENTS FROM SONICWALL

  • New SonicOS 6.5, which includes more than 50 new features, powers SonicWall’s Automated Real-Time Breach Detection and Prevention Platform and is the biggest customer-driven SonicOS release in company history
  • New NSA 2650 firewall enables threat prevention over 2.5 Gigabit Ethernet wired and 802.11ac Wave 2 wireless networks, supports twice the number of DPI connections and offers 12,000 DPI SSL connections, an increase of 12X
  • New SonicWave 802.11ac Wave 2 wireless access points bring together high performance, security, and management into wireless networks with innovative pricing
  • New SonicWall Cloud Analytics application expands on management and reporting capabilities to empower better, faster and smarter security decisions
  • New Secure Mobile Access OS 12.1 ensures remote workers are protected with the same level of security from any location

PRESS RELEASE – SEPTEMBER 26, 2017

SANTA CLARA, Calif. — SonicWall, the trusted security partner protecting more than 1 million networks worldwide, announces an unprecedented range of advanced network security products and services that accelerate speed thresholds for its Automated Real-Time Breach Detection and Prevention Platform across wired, wireless and mobile networks.

“In a modern, hyper-connected world, there are no compromises,” said SonicWall President and CEO Bill Conner. “Our customers, and their end users, expect the best in real-time security, performance and analytics — regardless of network, device or physical location. This automated, real-time breach detection and prevention platform ensures organizations can build smart, consistent and sound security postures while meeting the speed, performance and cost-of-ownership demands of today’s businesses and their users.”

The platform enhancements include more than 50 new SonicOS features, a new high-performance firewall, a series of new 802.11ac Wave 2 wireless access points, an intuitive cloud analytics application and advanced secure federated single sign-on (SSO) capabilities.

“It’s imperative that any well-meaning, responsible organization take appropriate action to safeguard their networks, customer data and business as a whole,” said Jeff Wilson, senior research director for IHS Markit, a global information provider. “The threat landscape moves far too fast to rely on static solutions. More emphasis should be placed on real-time threat mitigation across wired and wireless networks. Companies of all sizes need to consider TLS/SSL decryption and inspection solutions as well, now that the majority of common internet traffic is encrypted by default.”

SonicOS 6.5 Boasts Modern Interface, Threat Intelligence API Capabilities for Security Automation

With more than 50 new features, SonicOS 6.5 is the biggest customer-driven release in SonicWall history. Highlighted by a modern, intuitive interface, SonicOS offers advanced networking and connectivity capabilities to optimize system availability, while scaling firewall performance to deliver uncompromised, uninterrupted threat protection for all connected networks.

“SonicWall products have always been very good, but the new SonicOS 6.5 is a giant step forward,” said Greg Thomas, owner of ComLogic, a SonicWall partner. “SonicWall is clearly visionary, not just in protection, but in analytics and usability as well. The new UI is fresh, relevant and easy to use.”

The operating system includes improved threat API capabilities to help businesses build automated security platforms that can leverage third-party threat intelligence feeds.

SonicOS 6.5 also features a suite of wireless features that enables security and connectivity for mobile users. Multi-domain authentication support also provides a simple and fast way to manage and enforce security policies across an entire organization.

New Multi-Gigabit Firewall Boosts Speeds, Adds Real-Time Security on Wired and 802.11ac Wave 2 Networks

Core to the platform expansion, SonicWall is unveiling the new SonicWall Network Security Appliance (NSA) 2650 firewall, which delivers automated, real-time breach detection and prevention, as well as TLS/SSL decryption and inspection, over multi-gigabit wired and Wave 2 wireless networks.

The NSA 2650 appliance is the first branch and campus firewall to support both multi-engine sandboxing via the Capture Advanced Threat Protection (ATP) service and full deep packet inspection of TLS/SSL-encrypted traffic for 2.5G wired and 802.11ac Wave 2 wireless networks.

With eight 2.5G Ethernet interfaces and 20 total ports, the NSA 2650 matches network throughput between multi-gigabit wired and 802.11ac Wave 2 wireless networks. Compared with the previous-generation NSA 2600 appliance, the NSA 2650 supports twice the number of DPI connections and offers 12,000 DPI SSL connections, an increase of 12X.

“One of our customers’ biggest challenges is ransomware, which is often sent around the internet using encryption,” said Spencomp Solutions security specialist Dominic Valois. “The NSA 2650, with high-speed TLS/SSL inspection, and the SonicWall Capture service, give them a whole lot more security from their firewall.”

To complement the NSA 2650 appliance, the new SonicWave series of access points meets the 802.11ac Wave 2 wireless standard, which features 4×4 MU-MIMO technology for best-in-class Wi-Fi performance, range and reliability.

“The new SonicWave access points give us throughput that matches our wired network,” said Dr. Michael Breen, Dean of Arts, Mary Immaculate College. “Whether someone is on a handheld device or directly wired to the network, the service is indistinguishable. Signal reception is consistently strong over a one-and-a-half-acre site.”

Centralized Firewall Security Analytics via the Cloud

Leveraging a powerful intelligence-driven engine, SonicWall Cloud Analytics is a new cloud application that is delivered as a service to customers and partners. It provides deep real-time visibility, insight and alerting for network traffic, user behavior and device activity from a centralized dashboard.

SonicWall Cloud Analytics empowers organizations to monitor, record, analyze and report security data for deep forensic analysis across multiple SonicWall firewalls and SonicWave wireless access points.

An extension of the recently introduced SonicWall Cloud Global Management System (GMS), SonicWall Cloud Analytics provides extensive drill-down investigative and forensic capabilities for deep security data analysis, including traffic, applications, threats, and user behavior and activities.

SonicWall Cloud Analytics — featuring real-time data presented in a structured, meaningful, actionable and easily consumable manner — enables security teams, analysts, auditors, boards, C-suites, and stakeholders to discover, interpret, prioritize and take appropriate defensive actions against both known and unknown cyber attacks or threats.

Extend Speed, Security to Remote Workforce

When employees are on the road, they require secure access to the same systems and applications they trust when on Wi-Fi or wired networks in the office. Not only must access be available anywhere, anytime and on any device, speed and security cannot be compromised.

To extend SonicWall security from wired and wireless networks to remote users, SonicWall Secure Mobile Access (SMA) 12.1 provides secure, policy-enforced access to email, file servers and corporate applications using federated SSO to both cloud and on-premise resources from authorized devices.

To defend corporations and security-conscious organizations against advanced cyber attacks, SMA now scans all file uploads with the SonicWall Capture ATP service, a cloud-based, multi-engine sandbox designed to discover and stop unknown, zero-day attacks, such as ransomware. This real-time sandbox approach ensures users have the same level of protection from zero-day threats when they are on the road as they have in the office.

Product Availability

For North American and European customers, SonicOS 6.5, NSA 2650 firewall and the SonicWave series of wireless access points are available immediately. SMA 12.1 and Cloud Analytics will be available in early Q4 in North America and Europe. For availability in other regions, please contact your local authorized SonicWall distributor for details.

About SonicWall

SonicWall has been fighting the cyber-criminal industry for over 25 years, defending small, medium-size businesses and enterprises worldwide. Backed by research from SonicWall Capture Labs, our award-winning real-time breach detection and prevention solutions, coupled with the formidable resources of over 18,000 loyal channel partners around the globe, are the backbone, securing more than a million business and mobile networks and their emails, applications and data. This combination of products and partners has enabled an automated real-time breach detection and prevention solution tuned to the specific needs of the more than 500,000 organizations in over 150 countries. These businesses can run more effectively and fear less about security.

Abtech Technologies is a leading SonicWall partner. Our engineers are fully certified in SonicWall technology.  We can design, implement and support any SonicWall solution to meet your security needs.