Page 3 - Telecom Reseller October November 2020
P. 3

October/November 2020
Telecom Reseller 3
            THE LATEST
NOWORATZKY
SMITH
AUDIN PERCY
TECH BLOGS
DANIEL
ALLISON
GARY ALAN
    TR
Graphic Design
Stacey Potter
The publishers of this newspaper assume
no responsibility for statements made by advertisers. in their advertisements, nor do they assume responsibility for statements or opinions expressed or implied in the columns of this newspaper.
 SUBSCRIPTIONS & CIRCULATION
SE 28th Street, Vancouver, WA 98683 Call: 561-732-2335
E-mail: publisher@usernews.com
ADVERTISING
Call: 360-260-9708
Toll Free: 800-667-8965
E-mail: publisher@usernews.com
Software Defined
NEWS DEPARTMENT
Please e-mail articles and press releases as attachments in Microsoft Word format to editor@ telecomreseller.com. Suggested length is 250-300 words. At the end of the article, please provide contact information. Do not send graphics. We reserve the right to edit for content and length. For further clarification, please visit www.telecomreseller.com and click on Submission Guidelines. Our Editorial Calendar (also online) is useful for appropriate subject matter.
Editor & Publisher
Douglas Green – publisher@usernews.com Associate Publisher & Director
of Advertising
Carole Sangiorgio – carole@usernews.com Operations Manager & Assistant Editor
Amy Ralls – amyralls@telecomreseller.com Accounting
Tracy Titus – accounts@telecomreseller.com
 TELECOM TELECOM
RERSESEELLLER
  Perimeter: A Security
How the Pandemic is Forcing Enterprises to Rethink Their
The report also notes the sudden shift
to employees working from home has created a host of issues, from inadequate videoconferencing capabilities to poor internet connectivity. They cite one European institution that saw its remote workforce increase by 15 times literally overnight.
Enter the Cloud-Based Consumption Model
To quickly fix this situation, enterprises have started turning to the cloud-based consumption for relief. And there are three reasons for this:
“As-a-service” subscription offerings: This drives agility and accelerates time-to-
lDAVIDGINSBURGcontinuesonpage 4
Approach for the Future
In essence, no user is “trusted” until they can prove who they are and that they have permission to access the specific asset.
SDP applies Zero Trust techniques for remote user connections. Application owners decide who gets access to what, leveraging micro-segmentation to apply
a “least privilege” set of criteria for user access. Rather than relying on IP addresses, SDP employs an identity-centric approach based on device attestation and identity verification to control user access.
Once authenticated, a user can get inside the network but for only a specific system.
l CHRIS WERPY continues on page 4
WAN Strategy
 DAVID
  CHRIS
GINSBURG
 WERPY
byDavidGinsburg,Vice President,productandsolutions atAryaka
ccording to McKinsey Digital, in the midst of the pandemic,
by Chris Werpy, COO at W PlanetOne(www.planetone.net)
A
e know a lot of businesses were forced to bypassed security best practices when rushing to set up
remote environments during the COVID-19 pandemic. Now, as they look to strengthen their security postures, many will continue to rely on VPN technology to provide secure communications between remote environments and corporate resources.
But is that the right approach? Not really. While VPN has proven effective in securing connections for more than two decades, today’s perimeter-less networks require
a new approach. Much like other legacy security solutions such as firewalls and Network Access Controls (NAC), VPNs were not designed to handle the variety of locations and devices that now make up an enterprise network.
That’s why businesses should consider software-defined perimeter (SDP) solutions. Deployed as a component in a Zero Trust strategy, SDP employs standard security tools such IPSec and PKI together with federation, device attestation and geo- location to connect users to applications and platforms from any location and device.
SDP is designed to address the security requirements of the modern network. The SDP model is ripe for growth, creating
new business opportunities for IT solution providers and telecom partners, who should acquaint themselves with it and introduce
it to customers as the security model of the future.
Legacy Shortcomings
Traditional networks had well-defined perimeters, which made security a lot more straightforward than what is required to protect hybrid, multi-cloud networks. That’s why Zero Trust has been gaining traction. Zero Trust makes security protocols a lot stricter, providing access to assets on a “need to know” basis. No access is granted unless users meet a pre-defined set of criteria whenever attempting to connect to an application, database, resource or service.
“CIOs are facing the greatest challenge of their careers.” Their recent report said they are seeing infrastructure breakdowns, denialofservice attacks,
and sites going down because of traffic load. Even as companies grapple with the implications of the COVID-19 pandemic, they suggest it is already clear that CIOs are playing a central role in navigating the crisis.”
          CVDS BY
YOUR PUBLIC SAFETY
RECORDING & COMMUNICATIONS PROVIDER
• Kenwood: NextEdge
• Motorola: Astro 25/MCC 7500 • Zetron: Max Disptach/Acom
• Avtec: Scout/Vpgate
• Telex: C-soft/IP223/IP225
• Airbus: Vesta
• Intrado-West: Viper
• Avaya
• Pantel Mitel SRC
• Many more
Komlog
. Geolocaon
. Real Time Stascs DashboardLines
. Listening
.VoIP, Analog, and Digital Recording
     . Connuous or On Demand Recording
. Unique or Mul-site Architecture Advance Web Search and Playback . Intuive and Flexible User Interface
. and Much More !
 877 225-9988 sales@komutel.com www.komutel.com
Copyright Komutel 2018
 








   1   2   3   4   5