New year, new threats - review of fresh vulnerabilities

The beginning of the year will probably be associated with the threat of coronavirus. This topic has dominated the media reports in recent weeks. It is also an excellent example of the fact that new threats may always appear in business, which have not been included in the risk analysis so far.

However, there is just as much going on in the world of cyber threats. On January 14, the end of support for the operating systems from the Windows 7 and Windows Server 2008 family, which was announced for a long time by Microsoft, took place. This means that for one of the most popular systems that are still used, unfortunately, also on company computers, security patches related to new discoveries will no longer be delivered. vulnerabilities.
The proof that this problem cannot be underestimated is the vulnerability found in the Remote Desktop Gateway service at the beginning of the year. Continue ...

New in the offer - 2 in 1 - training and security audit in one

Our offer includes a new service - technical training at the client's site combined with a security audit in the environment of the client being trained. The benefit is twofold: competences within the company (organization) as well as an audit and review of the client's actual environment.

We encourage you to read the annual of the CERT report for 2018 on cyber threats.

The topics of the 3-day training include:

  • Search and analysis of vulnerability to attacks,
  • Exploiting vulnerabilities to breach security,
  • Configuration of the metasploit environment - pentester workshop,
  • WIFI security and password cracking,
  • Generating a backdoor using the Metasploit environment,
  • and other.

If you want to know more, please visit our website read the agenda and fill in the form.

Report from the meeting "Safe storage of large amounts of data - one event in two scenes - presentation of Netapp"

On October 15, 2019 at the HP Park Hotel in Poznań, UpGreat together with Arrow Polska - a distributor of Netapp solutions, organized the first of two meetings devoted to Netapp mass storage technologies. The second of the meetings, i.e. free, 1-day training in the field of configuration and administration of the ONTAP system, managing FAS (hybrid Fabric-Attached Storage) and AFF (All Flash FAS) arrays will be held on November 14 at Concordia Design in Poznań. We encourage you to register for training with the use of form on our website. Please register as soon as possible as we have a limited number of places (25).

Netapp_15.10.2019_1
Netapp_15.10.2019_2
Netapp_15.10.2019_3

During the meeting, Łukasz Grzesiak from Arrow Polska presented the portfolio of mass memory products and discussed the basic concepts related to mass memory technologies, as well as showed the differences in the approach to technical issues between Netapp and other companies.

Gartner_primary_storage_magic_quadrant

With abbreviated text report published in September 2019 on mass storage, see the Gartner website.

In the second part of the meeting, Eugeniusz Wower from UpGreat conducted a live demonstration of the environment consisting of two Netapp matrices. The scope of the show was as follows:

  1. Description of the presented environment - laboratory and physical equipment (demo, disks, ports, controllers).
  2. Snapcenter and vCenter integration.
  3. Overview and definition of backup policies.
  4. Review of the backup history for a defined backup task.
  5. Backup policy and task definition (1 or 2 locations).
  6. Virtual machine backup (backup replication).
  7. Restore the virtual machine (from the specified location).
  8. Restore individual files / folders (from a specific location).
  9. Replication of volumes:
    - defining replication settings (protection policies),
    - replication,
    - demonstration of replication effects.

We are pleased to note that the attendance at HP Park was record-breaking and all those present stayed with us until the end 🙂 We understand that you are thinking about implementations and we would like to remind you that we have a pool of demonstration equipment. At your request, we will help you prepare the implementation of the test environment.

Below are links to presentations and materials related to the topic of the meeting:

Thank you for your presence and we invite you to contact. We are happy to talk to you about implementations.

Report from the lecture on Extreme Networks technologies and the visit to the Poznań Supercomputing and Networking Center on August 27, 2019

Thank you very much for your presence at our lecture.

As announced, the pace and amount of technical information were in line with the expectations of even the most demanding listeners. Piotr Kędra and Piotr Szołkowski from Extreme Networks thoroughly discussed the following topics:

  • Extreme Fabric Connect - standards-based (IEEE 802.1aq Shortest Path Bridging, IETF 6329) technology for building efficient and reliable fabric structures,
  • Extreme EXOS - Extreme Networks switch operating system,
  • Extreme Management Center - open network management console supporting devices from many manufacturers - live show.

The links below allow you to download the material discussed during the lecture:

We especially encourage you to watch the half-hour film called Technical Introduction to Extreme Fabric Connect, in which the technologies, standards and principles of operation of Extreme Fabric Connect are discussed in detail and accessible. It's worth it!

During the visit to the Poznań Supercomputing and Networking Center, we saw research laboratories, design laboratories and the network management center.

Another attraction was visiting the datacenter and the "museum" of servers, where, among other things, there were legendary CRAY computers that were no longer used.

We hope that everyone present has found something for themselves. we invite you to contact us - we will be happy to help you choose the Extreme solution, visit the Extreme Networks laboratory in Warsaw or carry out a pilot software implementation Extreme Management Center if Extreme Control (Advanced NAC).

Safe storage of large amounts of data - one event in two scenes

In October and November 2019, we organize a series of 2 meetings in Poznań devoted to NetApp technologies. During the first one, we will review mass memory technologies, while the second training session will allow participants to become familiar with the administration of the ONTAP system that manages NetApp arrays.

The events are addressed to companies and organizations that face the necessity to store large amounts of data in their activities, and at the same time, due to their nature and related requirements, must protect them against loss, which in the case of a large data size is not a trivial task.

We invite employees of cadastral offices, universities, companies storing archival data and scans, servicing large monitoring systems and others.

1. Overview of NetApp technologies - replication and backup combined with a live show - October 15, 2019. The agenda covers the following two topics:

  • Safe and fast on NetApp All-Flash solutions - building a SAN network,
  • Live demonstration of Array Replication and NetApp SnapCenter solutions
    (fast and universal data backup between NetApp arrays).

2. Training in the basics of administration and use of the ONTAP system - November 14, 2019. The second part of the training will include:

  • Basic ONTAP configuration,
  • Network configuration in ONTAP,
  • CIFS protocol configuration,
  • Space management in the ONTAP system.

If you are interested in taking part in our double training, please see agenda and registration using forms on our website.

See you later?

Report from the business breakfast "EXTREME AUTOMATED CAMPUS - BUILDING A SAFE AND EFFICIENT LAN NETWORKS" - June 13, 2019

The substantive level of our meeting (EXTREME AUTOMATED CAMPUS - BUILDING A SAFE AND EFFICIENT LAN NETWORKS) was highly rated by the participants. Some of the companies are interested in implementing a standards-based solution Extreme Automated Campus. For this reason, we plan to organize an Extreme Fabric configuration workshop after the summer holidays. We kindly ask interested persons to declare their participation.

Śniadanie biznesowe Extreme Automated Fabric

We invite you to read the presentations on Extreme Networks technology that you watched at our meeting:

We would like to thank everyone present for their time. We hope that it was not a waste of time for you and we will meet to discuss the implementation of a network based on Extreme Automated Fabric: o) Please contact us.

Another seminars after the holidays! See you soon!

In a few days our "Extreme Automated Campus" seminar!

As we wrote earlier, our company organizes a meeting devoted to building large and efficient LAN networks. It's in a few days, i.e. June 13!

Brief characteristics of the Extreme Automated Fabric solution:

- efficient fabric backbone in mesh topology creates a structure that ensures:
   - redundancy - automatic reconfiguration after a link or device failure,
   - load balancing - all connections are active and are created in a way that ensures even load of devices and ports,
- access switches are configured automatically thanks to Fabric Attach functionality,
- Extreme Management Center (XMC) and NAC (Extreme Control) management software support the administration and reconfiguration of the network, and ensure the security of IT resources.

Extreme Automated Fabric

More details in agenda. If interested, please register with form on our website.

We also invite you to read the presentations showing the use of Extreme Networks solutions in healthcare:
– Network infrastructure as the key to improving the quality of medical services - business presentation,
– Extreme Solutions for Healthcare - technical presentation.

We invite!

Palo Alto Networks - a weapon in the fight against new threats

The catalog of threats that IT system administrators have to take into account has changed significantly in recent years. Attack vectors, against which up to a point could be protected using traditional firewall and anti-virus protection of workstations, have undergone a significant transformation. Criminals quite quickly learned to bypass traditional security measures and developed techniques thanks to which the hijacking and surveillance of an IT system often takes place unnoticed. APT (Advanced Persistent Threat) threats have become very real. Known and high-profile attacks of this type are sometimes detected after months, and sometimes years, when criminals have already extracted all the data from the systems.

Defending against this type of threat using traditional tools is little that ineffective, it creates a false sense of security, which allows intruders to conduct their activities with complete freedom. The lack of appropriate alerts from security systems means that everyone seems to be safe and there is no need to look at it closely. Most serious security incidents happen not in security-deficient environments, but in security-defective environments. Often, as part of handling a security incident, new tools are launched that immediately detect a whole range of threats and generate a large number of alerts, while traditional antivirus systems and firewalls present in the network do not see anything.

Continue ...

How to avoid cybercriminals? - UpGreat training at WZP "Lewiatan"

On May 28 this year. The Wielkopolska Association of Employers Lewiatan invites you to a training entitled "How to avoid cybercriminals?" run by our IT security specialist.

 The training will cover the following issues:

  1. Where is the growing popularity of computer crimes coming from?
  2. Why are the rank and file of the organization the most frequent target of attacks?
  3. What are social engineering techniques and why are they effective and popular?
  4. Examples of social engineering attacks.
  5. Effects of cybercriminals' actions on individuals and organizations.
  6. Security incidents and legal regulations.
  7. What preventive measures should be implemented in the organization?

At the end of the presentation, a link to a more detailed study on security policies and risk analysis will be provided.

Training date: May 28, hours. 16.00–18.30.
Place of training: Wielkopolski Związek Pracatorów Lewiatan, ul. Grunwaldzka 104, local 216, 2nd floor

Registration for members of the Association at the address asystent@wzp.org.pl

We invite!

Report from the meeting dedicated to PaloAlto Networks technologies on April 11, 2019

On April 11, another of our meetings devoted to IT technologies took place. This time, the topic of the business breakfast was security for PaloAlto Networks networks and workstations. The title of the lecture is "PROTECTION AGAINST CYBER CRIME - PALO ALTO NETWORKS SAFETY SOLUTIONS".

O firmie UpGreat - Piotr Flis
NGFW & TRAPS - Marcin Szewczuk

In a relaxed atmosphere, we talked about next-generation firewalls (NGFW) and securing workstations using TRAPS software.

There are presentations at the following links:

Thank you for your presence and we invite you back. Next meeting on June 13 this year. will be devoted to building campus networks with Extreme Networks.