Posts Tagged ‘network’

MS Graphics vulnerability leads to Remote Code Execution

MS Graphics is a vulnerability that leads to remote code execution if the user views content that contains specially crafted TIFF files. This vulnerability is known to effect all versions of Microsoft Lync, Windows Vista, Windows Server 2008, Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office Compatibility Pack, and Microsoft Office viewers.

Read more

Managed Service with reduced OPEX and CAPEX

The Banking industry knows very well on importance of application security, performance and data replication. You can imagine their feeling when unable to service a client promptly with accurate information. Small and medium banks are under immense pressure to secure data in the avalanche of security breaches and meet performance standard.

So when a local bank approached us with mortgage application performance issue, we knew it very well the issue is very critical.

Larger information technology service firms tend to be specialized in one area. So when there’s a problem and multi-vendor products are involved in the architecture, that’s when blame gave begins and start hurting the business.

Read more

Wireless Network Security

The use of Wifi wireless networks has lead to a new threat to companies. Many organisations are unaware of the threat this useful technology had in store.

1.What are the threats?

Some of the wireless network security risks include:

Read more

BYOD-Bring Your Own Device

BYOD is an upcoming trend that is being followed by many enterprises where employees can use their personal devices at workplace. BYOD’s easy to use mobile application helps to access shared data smoothly and also provides the advantage of working anytime and anywhere using their own devices. Use of BYOD devices has helped to improve employee satisfaction and productivity.

Read more

Linux Firewall

OOAC, LLC implemented linux firewall for one of its clients to provide perimeter security. Shorewall was used as the firewall to check on traffic in and out. This ensured quality of service and involved multiple security zones. Delimiter zones with access control was used.

Read more

Samba Remote Code Execution Vulnerability

Recent reports have found that Samba, a tool that is used to integrate linux servers with windows environment faces a vulnerability flaw that allows hackers to gain super user permissions on the networks. The impact is large since Samba is implemented practically everywhere Linux is in use. The flaw is said to have affected 3.6.3 and earlier versions.

Read more

Microsoft Exchange Upgradation from 2010 to 2013

OOAC,LLC helped one of its clients to migrate their exchange server from 2010 to 2013. It was carried out in a co-existence mode using service pack to ensure back up in case of a breakdown. This process required utmost care to ensure no data was lost.Before the migration we assured that a third party Exchange software that was currently running was also supported on Exchange 2013 such as antivirus,backup solutions,archiving, mail management,mobile device software.

Read more

Cisco ASA to Checkpoint UTM Migration

Cisco ASA’s offered discrete high-performance security services and we required an appliance which will implement security based on defence-in-depth principle. We migrated the existing Cisco ASA which was the perimeter firewall to Checkpoint UTMs based on the blade architecture The checkpoint offerings included a lot more services and also application intelligence.The checkpoint offers perfect combination of proven security, easy deployment and effective management

Read more

Data Centre Management

OOAC LLC provides datacenter management to one of its client organisation. Administering computing, storage and network infrastructure are a common attribute in operation and administration these days. Another aspect of administration was to introduce intelligent power management and remote console capabilities to our client’s infrastructure. We introduced intelligent power distribution units in each rack, IP KVM for remote console capability and UPS management module to monitor UPS.

Read more

VMWare ESXI P2V

OOACLLC using virtualization technologies helped organizations to minimize their capital expenses through server consolidation. Virtualization technologies also helps in provisioning an instance of application or OS on the fly. We proposed VMWare’s Vsphere solution to address the client requirements. Hardware requirements were planned based on the current utilization of the servers in the server farm and capacity for the virtualization infrastructure was arrived.

Read more
100 Arbor Oak Drive, #200
Ashland, Virginia 23005-2261
Phone: 1-(804)-368-8631
Toll Free: 1-(877)-230-7449
Website: http://www.ooacllc.com
Email: info@ooacllc.com