Posts Tagged ‘Security’

MS Graphics vulnerability leads to Remote Code Execution

MS Graphics is a vulnerability that leads to remote code execution if the user views content that contains specially crafted TIFF files. This vulnerability is known to effect all versions of Microsoft Lync, Windows Vista, Windows Server 2008, Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office Compatibility Pack, and Microsoft Office viewers.

Read more

Managed Service with reduced OPEX and CAPEX

The Banking industry knows very well on importance of application security, performance and data replication. You can imagine their feeling when unable to service a client promptly with accurate information. Small and medium banks are under immense pressure to secure data in the avalanche of security breaches and meet performance standard.

So when a local bank approached us with mortgage application performance issue, we knew it very well the issue is very critical.

Larger information technology service firms tend to be specialized in one area. So when there’s a problem and multi-vendor products are involved in the architecture, that’s when blame gave begins and start hurting the business.

Read more

Wireless Network Security

The use of Wifi wireless networks has lead to a new threat to companies. Many organisations are unaware of the threat this useful technology had in store.

1.What are the threats?

Some of the wireless network security risks include:

Read more

K V M f o r S e r v e r V i r t u a l i z a t i o n

K V M  f o r  S e r v e r  V i r t u a l i z a t i o n KVM stands for Kernal-based virtual machine. It is considered as the newest hypervisor to enter the virtualization market. Like many other […]

Read more

Linux Firewall

OOAC, LLC implemented linux firewall for one of its clients to provide perimeter security. Shorewall was used as the firewall to check on traffic in and out. This ensured quality of service and involved multiple security zones. Delimiter zones with access control was used.

Read more

Microsoft Office 0365 Migration

Microsoft Office 0365 Migration

OOAC,LLC implemented 0365 migration for many of its clients. Microsoft Office 0365 serves all kinds of businesses ranging from individual consultants to enterprises.

Why use Office 0365 for your business?

Reduced maintenance costs, simple and improved productivity.

Anytime and anywhere access to emails, contacts, calendars using any device.

Disaster recovery, robust, security, privacy control and standards.

Read more

Samba Remote Code Execution Vulnerability

Recent reports have found that Samba, a tool that is used to integrate linux servers with windows environment faces a vulnerability flaw that allows hackers to gain super user permissions on the networks. The impact is large since Samba is implemented practically everywhere Linux is in use. The flaw is said to have affected 3.6.3 and earlier versions.

Read more

Cisco ASA to Checkpoint UTM Migration

Cisco ASA’s offered discrete high-performance security services and we required an appliance which will implement security based on defence-in-depth principle. We migrated the existing Cisco ASA which was the perimeter firewall to Checkpoint UTMs based on the blade architecture The checkpoint offerings included a lot more services and also application intelligence.The checkpoint offers perfect combination of proven security, easy deployment and effective management

Read more

Data Centre Management

OOAC LLC provides datacenter management to one of its client organisation. Administering computing, storage and network infrastructure are a common attribute in operation and administration these days. Another aspect of administration was to introduce intelligent power management and remote console capabilities to our client’s infrastructure. We introduced intelligent power distribution units in each rack, IP KVM for remote console capability and UPS management module to monitor UPS.

Read more

VMWare ESXI P2V

OOACLLC using virtualization technologies helped organizations to minimize their capital expenses through server consolidation. Virtualization technologies also helps in provisioning an instance of application or OS on the fly. We proposed VMWare’s Vsphere solution to address the client requirements. Hardware requirements were planned based on the current utilization of the servers in the server farm and capacity for the virtualization infrastructure was arrived.

Read more
100 Arbor Oak Drive, #200
Ashland, Virginia 23005-2261
Phone: 1-(804)-368-8631
Toll Free: 1-(877)-230-7449
Website: http://www.ooacllc.com
Email: info@ooacllc.com