VPN

MetTel Launches Global Cloud Network to Deliver SASE Managed Services to Safeguard Network Data in the Borderless Enterprise

MetTel | November 11, 2021

MetTel, an IT communications and digital transformation leader, announced the launch of its global cloud network designed to extend its secure networking services purpose-built for the Secure Access Service Edge (SASE).  MetTel will make the enterprise transition to SASE easy by delivering its MetTel SASE solutions through the same fully managed service to which its clients are accustomed.

MetTel will launch its SASE portfolio with its Zero-Trust Network Access (ZTNA) offering in addition to its existing Software Defined Wide Area Network (SD-WAN) and Firewall as a Service (FWaaS).  MetTel's ZTNA solution provides secure remote access to an organization's applications, data, and services based on clearly defined access control policies. It is an evolutionary step beyond virtual private networks (VPNs) in that ZTNA provides access only to services and applications an individual has been explicitly granted versus the broad network access VPNs afford.  This stricter user validation becomes more valuable as more remote workers join the network and is the basis for any organization looking to adopt a Zero-Trust security framework.

"MetTel is poised to deliver fully managed SASE services through our U.S. and global cloud centers on demand for enterprise clients, providing benefits such as AI-based threat correlation without the complexity. There are no easy answers to SASE today because no single technology vendor does it all well.  A multi-vendor approach lets organizations get the best technology at a pace and timing that makes sense for them, and MetTel is here to make sure all of the pieces come together exactly as they are needed without abandoning existing investments – the most logical choice for many organizations." 

Ed Fox, Chief Technology Officer of MetTel

MetTel has engineered some of the largest commercial implementations of SD-WAN in North America, each connecting thousands of locations with high performance and scalable bandwidth in many different verticals such as retail, automotive, waste management and including the largest jewelry retailer in the world.   A recognized leader in the Gartner Magic Quadrant for Managed Network Services, MetTel is well-positioned for success as SD-WAN is an essential component of SASE.

Similarly, MetTel is guarding the perimeter of the network with implementations of FWaaS, including many of its SD-WAN customers.  One such client is a distributed network of family-focused medical facilities spread across the southwestern U.S.  MetTel is also providing SD-WAN, FWaaS and ZTNA for a national healthcare provider that has entrusted MetTel to implement ZTNA for greater security at the individual user level.  Healthcare organizations are tasked with protecting the privacy of patients by HIPAA (Health Insurance Portability and Accountability Act) regulations and ZTNA is being used as an effective method of securing patient data by requiring user authentication at every turn.

Many organizations perceive the need to quickly move to a SASE architecture but are not sure how best to implement it.  Gartner, which defined the SASE concept, projects that by 2024 at least 40 percent of all enterprises will have explicit strategies to adopt SASE.  In addition, the global SASE market is expected to reach a compound annual growth rate of 10.8 percent by 2026, according to Market Insight Reports. 

MetTel finds many organizations are not aware that SASE resources perform best when IT delivery systems are in close proximity to the "edge" where end-users reside.  Building a global network offers accessibility and scalability to meet overall market and individual enterprise demand for surges in resources during times of need.  There are also data privacy laws in several nations that require voice or data generated in-country remain local and not transit international IT facilities.

With these client needs in mind, today MetTel is announcing a major expansion of its network infrastructure with new, cloud-based communication delivery centers worldwide. The first wave of international centers being installed in 2021 include: Montreal, Toronto, Calgary, Mexico City, London, Madrid, Mumbai, Singapore, Tokyo and Sydney with further expansion expected in 2022.  This build out is in addition to MetTel's ubiquitous network of physical and virtual data centers around the US including Ashburn, VA; Atlanta, GA; Denver, CO; Dallas, TX; Santa Clara and San Jose, CA; Seattle, WA; New York City and Chicago, IL.

This full complement of cloud delivery centers, along with a healthy list of preferred ecosystem partners places MetTel in a position to provide a wide array of high-performance, secure network as a service offerings building upon current products with additional SASE features, the main components of which are:

  • Zero Trust Network Access (ZTNA)
  • Software Defined – Wide Area Network (SD-WAN)
  • Firewall as a Service (FWaaS)
  • Secure Web Gateway (SWG)
  • Cloud Access Security Broker (CASB)

In addition to these SASE core elements, there are a number of supporting services that are required for organizations to be successful and meet the needs of their business.  Additional network services include Network as a Service, WAN optimization, bandwidth aggregation, advanced networking services.   Additional future integrated security services will include: Remote Browser Isolation (RBI), Data Loss Prevention (DLP), DDoS, DNS protection and AI threat detection.

Providing the network as a service, as MetTel does, requires the most responsive and real-time capabilities with little margin for error -- any mistakes are immediately and transparently seen in the network world.  MetTel takes the same approach to SASE, extending its DNA to make resources responsive and constantly available, using leading technology providers with best-of-breed security capabilities. Current security technology partners that contribute to MetTel's SASE stack include VMware, Forcepoint, Fortinet and several others currently under evaluation in MetTel Labs.  Another point of emphasis for MetTel will be providing an overarching AI-guided threat detection service that aggregates malicious activity gathered from the network into actionable tasks.

MetTel sees clear benefits for enterprises by providing the best in secure networking in the form of SASE:

  • Security embedded into high performance networking.
  • Unified threat portal to view all threats and response actions.
  • Reduction in complexity and costs through vendor consolidation.
  • Increasing situational awareness through a single threat portal.
  • Moving to the latest generation of protections designed for the edge.
  • Simplifying vendor management, while improving compliance.
  • Preventing engineering bloat, while optimizing capabilities.
  • Reducing latency and improving user experience by executing at the edge.
  • Enabling new digital business scenarios through greater flexibility and resiliency.

About MetTel
MetTel is a leader in communications and digital transformation (DX) solutions for enterprise customers. By converging all communications over a proprietary network, MetTel gives enterprises one, unified view and control point for all their communications and advanced network services.  MetTel's comprehensive portfolio of customer solutions can boost enterprise productivity, reduces costs and simplifies operations.  Combining customized and managed communication solutions with a powerful platform of cloud-based software, the company's MetTel Portal enables customers to manage their inventory, usage, spend and repairs from one simple, user-friendly interface.

Spotlight

In this video we demonstrate -" How to enable virtualization" in windows 10 .In the upcoming videos we will demonstrate "how to install Vmware Workstation" and "installing kali linux as virtual os" in windows 10.

Spotlight

In this video we demonstrate -" How to enable virtualization" in windows 10 .In the upcoming videos we will demonstrate "how to install Vmware Workstation" and "installing kali linux as virtual os" in windows 10.

Related News

VIRTUAL DESKTOP TOOLS

Deloitte Launches Zero Trust Access, a New Managed Security Service

Deloitte | July 16, 2022

To help organizations adopt zero trust more quickly and efficiently, Deloitte is launching a new managed service – Zero Trust Access— that offers a cloud-native approach to securing communications between users, on any device, and enterprise applications, wherever they may reside. The Zero Trust concept commits to removing implicit trust within an information technology (IT) ecosystem and replacing it with a risk-based approach to accessing organizational resources across identities, workloads, data, networks and devices. This trend is gaining momentum, given legacy approaches to security architecture are no longer suitable to secure the ubiquitous nature of the modern enterprise. Part of the newly expanded Zero Trust by Deloitte, Zero Trust Access facilitates zero trust adoption and the evolving needs of organizations in protecting their applications, infrastructure, and data. Following the integration of recently acquired talent and technology into existing Deloitte services, the Zero Trust Access managed service connects users to applications through a frictionless cloud-native solution that is inherently scalable, resilient, agile, and secure. Further, the managed service is available standalone, integrated with other Deloitte offerings, or as part of a broader solution leveraging technologies from Deloitte's alliances ecosystem. "As perimeter-based approaches are no longer suitable to secure the modern enterprise, many organizations are working to enhance protection for their IT ecosystems via zero trust, Zero Trust Access was built as a turnkey managed service helping ourselves and our clients accelerate adoption of this transformative security framework. Our goal was to create a cost-effective solution that can be delivered standalone or complementary to a broader ecosystem and ultimately help decrease the burden on IT and security teams who likely need to manage multiple heterogenous solutions to achieve similar outcomes." Andrew Rafla, Deloitte Risk & Financial Advisory's zero trust offering leader and principal, Deloitte & Touche LLP With innovative data protection leveraging device-level secure microcontainer technology, Zero Trust Access helps protect infrastructure while also enabling organizations to protect sensitive enterprise data and enforce least privilege through dynamic access control to enterprise assets. The managed service can replace remote access solutions inclusive of virtual private network (VPN), virtual desktop infrastructure (VDI), and desktop as a service (DaaS), all of which typically require significant capital expenditure for infrastructure, high operating costs, and technology management overhead. Zero Trust Access includes features such as ephemeral connectivity built upon secure peer-to-peer (P2P) communication, conditional access and continuous authorization, as well as robust data protection for data at-rest, in-use, and in-transit are consistently applied to each session, regardless of the type or location of the applications being accessed (e.g., legacy hosted applications, software as a service (SaaS), thick-client, web-based applications). Implementation of Zero Trust Access can help organizations leverage outcome-based solutions that improve business agility, enhance user productivity, and reduce cost and complexity of security operations. "Beginning zero trust adoption isn't simple, fast or easy for most organizations," Deborah Golden, Deloitte Risk & Financial Advisory Cyber and Strategic Risk leader and principal, Deloitte & Touche LLP. "We're launching Zero Trust Access as the first in many adoption-enabling services and solutions to come, so that our clients are better able to modernize their security programs, enable agile operations and confidently advance with emerging technologies and transformative risk management principles that can build more resilient security practices." About Deloitte Deloitte provides industry-leading audit, consulting, tax and advisory services to many of the world's most admired brands, including nearly 90% of the Fortune 500® and more than 7,000 private companies. Our people come together for the greater good and work across the industry sectors that drive and shape today's marketplace — delivering measurable and lasting results that help reinforce public trust in our capital markets, inspire clients to see challenges as opportunities to transform and thrive, and help lead the way toward a stronger economy and a healthier society. Deloitte is proud to be part of the largest global professional services network serving our clients in the markets that are most important to them. Building on more than 175 years of service, our network of member firms spans more than 150 countries and territories.

Read More

SERVER VIRTUALIZATION

Companies Rethink Strategies for Enabling Hybrid Work

Citrix | August 05, 2022

Forced by the pandemic to provide employees with access to the systems and information they needed to work from home, IT organizations around the world turned to traditional technologies like Virtual Private Networks (VPN). And they worked. But as the world moves to hybrid work, 96 percent of IT leaders who participated in a recent global survey conducted by Gartner Peer Insights on behalf of Citrix Systems, Inc. (NASDAQ: CTXS), say they no longer cut it. And they’re rethinking their approach. A Seismic Change Hybrid models have radically changed where and how work gets done – and even who does it. Of the organizations who participated in the Citrix poll: 96 percent have a hybrid work policy or allow both fully remote and hybrid work 85 percent say their workforce is more geographically dispersed than it was two years ago 75 percent have seen an increase in the number of seasonal, contract, or freelance workers A Major Miss When it comes to supporting these changes, respondents say the solutions they put in place to enable remote work fall short in the following areas: Fail to protect against additional security risks posed by employees working from anywhere (96 percent) Create a digital divide between in-office and remote employees (63 percent) Don’t provide a consistent user experience (46 percent) Hinder efficient collaboration among distributed employees (46 percent) Don’t support bring-your-own-device initiatives (33 percent) Difficult to scale and manage (25 percent) A Strategic Shift And they are increasing their investments in technologies that allow them to provide a simpler, more consistent and secure experience for employees regardless of where they work, including: Virtual desktop infrastructure (VDI) (69 percent) Virtual apps and desktops (56 percent) Desktops as a Service (DaaS) (42 percent) Zero trust network access (34 percent) A Layered Approach VPN remains the most popular solution to support remote work. But as the Citrix research reveals, it’s not enough to enable safe and productive hybrid work on its own. According to the poll, 87 percent of respondents using VPN have implemented at least one other solution to close the gaps, including: VDI (69 percent) Virtual Apps and Desktops (49 percent) DaaS (39 percent) Desired Results And in doing so, they’re achieving their goal. When asked to identify the top three benefits their hybrid work solutions provide, participants in the Citrix poll said they: Provide layered protection for all devices on the network, including unmanaged and BYOD Create an equitable work experience by providing employees with consistent and reliable access to applications and data regardless of where they are working Provide layered protection and consistent security management for all applications “Hybrid work is the future of work, Innovative organizations recognize this and are reimagining the solutions used to support it so they can deliver it today.” Tim Minahan, Executive Vice President of Strategy, Citrix Citrix provides a complete digital workspace platform that companies of all sizes can use to enable secure work. With Citrix, employees can work where and how they prefer, and IT can be confident their information and devices remain safe. Click here to learn more about Citrix solutions and the value they can provide. About Citrix Citrix builds the secure, unified digital workspace technology that helps organizations unlock human potential and deliver a consistent workspace experience wherever work needs to get done. With Citrix, users get a seamless work experience and IT has a unified platform to secure, manage, and monitor diverse technologies in complex cloud environments.

Read More

VIRTUAL DESKTOP TOOLS

Trellix Finds Business Services Top Target of Ransomware Attacks

Trellix | July 19, 2022

Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), today released The Threat Report: Summer 2022, analyzing cybersecurity trends and attack methods from the first quarter of 2022. The report features research from Trellix Threat Labs into connected healthcare and access control systems. It also includes analysis of email security trends and details the evolution of Russian cybercrime related to the conflict in Ukraine where new malware or methods have yet to be observed. Key findings: Increased Threats to Business Services: Companies providing IT, finance and other types of consulting and contract services were targeted by adversarial actors more often, demonstrating cybercriminals desire to disrupt multiple companies with one attack. Business services accounted for 64% of total U.S. ransomware detections and was the second most targeted sector behind telecom across global ransomware detections, malware detections, and nation-state backed attacks in Q1 2022. Ransomware Evolution: Following the January arrests of members of the REvil ransomware gang, payouts to attackers declined. Trellix also observed ransomware groups building lockers targeting virtualization services with varied success. Leaked chats from the quarter’s second most active ransomware gang, Conti, which publicly expressed allegiance to the Russian administration, seem to confirm the government is directing cybercriminal enterprises. Email Security Trends: Telemetry analysis revealed phishing URLs and malicious document trends in email security. Most malicious emails detected contained a phishing URL used to steal credentials or lure victims to download malware. Trellix also identified emails with malicious documents and executables like infostealers and trojans attached. “With the merging of our digital and physical worlds, cyberattacks cause more chaos in our daily lives, Adversaries know they are being watched closely; the absence of new tactics observed in the wild during the war in Ukraine tells us tools are being held back. Global threat actors have novel cyber artillery ready to deploy in case of escalation and organizations need to remain vigilant.” -Christiaan Beek, Lead Scientist and Senior Principal Engineer, Trellix. The Threat Report: Summer 2022 leverages proprietary data from Trellix’s network of over one billion sensors, open-source intelligence and Trellix Threat Labs investigations into prevalent threats like ransomware and nation-state activity. Telemetry related to detection of threats is used for the purposes of this report. A detection is when a file, URL, IP-address, suspicious email, network behavior or other indicator is detected and reported via the Trellix XDR ecosystem. Additional Resources Trellix Threat Center Trellix Threat Labs Blog The Threat Report: Summer 2022 About Trellix- Trellix is a global company redefining the future of cybersecurity and soulful work. The company’s open and native extended detection and response (XDR) platform helps organizations confronted by today’s most advanced threats gain confidence in the protection and resilience of their operations. Trellix, along with an extensive partner ecosystem, accelerates technology innovation through machine learning and automation to empower over 40,000 business and government customers with living security.

Read More