Click here to close now.

SYS-CON MEDIA Authors: Elizabeth White, Pat Romanski, Yeshim Deniz, Liz McMillan, tru welu

News Feed Item

FishNet Security Expands Testing Capabilities With $5M Cloud-Based Lab

Virtual Product Evaluations and Threat Simulation Reduce Risk and Time to Deploy for Customers

ST. PAUL, MN -- (Marketwired) -- 08/05/14 -- FishNet Security, North America's largest independent information security solutions provider, announces the opening of a state-of-the-art, cloud-based technology testing lab in the company's newly expanded St. Paul office. The "cLab" is a $5 million investment that allows FishNet Security, its partners and customers to vet technologies in a virtual IT environment using simulated network conditions and attack scenarios. During the product selection phase, customers can test technologies and configurations prior to purchase to improve deployment time and reduce risk.

"The cLab is an investment in both our customers and our technology partners," said Rich Fennessy, FishNet Security CEO. "It serves as an extension of our deep technical expertise and vendor relationships. Customers who leverage the cLab will have peace of mind that they have fully vetted technologies and will understand how they address their network security needs."

The cLab is one of the first to offer one testing environment for both physical and virtual network components, allowing customers to plug in once and conduct multiple scenarios across their networks. The lab is fully customizable and can be rented space in weekly, monthly and annual time periods.

With more than 150 supported technologies, the lab accommodates a number of Proof of Concept services including mobile device management (MDM), next-generation firewalls, IPS, endpoint security and more. There is also a Software Defined Network (SDN) lab for testing and validating emerging technologies.

The cLab is capable of generating up to 100Gbps of simulated traffic for performance testing and up to 300Gbps of DDoS traffic for DDoS cloud scrubbing testing. For reference, most DDoS attacks generate traffic in the 50-75Gbps range.

"The capabilities of this lab are second to none," said Dan Thormodsgaard, VP of Solutions Architecture. "Customers can essentially create their own lab to simulate scenarios as they would occur in their environment, so they can make informed decisions about the technologies they are purchasing. We've helped our customers cut through red tape, expedite the technology selection process and ultimately save time and money."

In one use case, a financial customer looking to replace their legacy mobile security solution cut their decision making and implementation process from six to two months. FishNet Security solution architects developed a vendor decision matrix that narrowed down a list of 10 mobile security vendors to two. They tested each within the customer network to provide decision-making criteria to fast track the RFP process.

The investment is paying off for more than customers. Top technology manufacturers have used the lab to test new technologies before release. At the end of the test, FishNet Security experts provide feedback including competitive analysis, value proposition and use cases.

"As the industry evolves and new technologies emerge, we will continue to make investments in the lab," said Thormodsgaard. "It's our goal to meet not only the security demands of our customers, but to raise the bar for the information security industry as a whole."

About FishNet Security
FishNet Security is the leading provider of information security solutions that combine technology, services, support and training. Since 1996, the company has repeatedly been recognized for its rapid growth, high customer satisfaction and continuous business innovation. Today, FishNet Security has 29 regional offices, including nine training facilities, two product testing laboratories and two security operations centers that monitor and support customer networks. For more information, visit www.fishnetsecurity.com.

Media Contact

John Van Blaricum
FishNet Security
816.556.3548

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Cloud and Big Data present unique dilemmas: embracing the benefits of these new technologies while maintaining the security of your organization's assets. When an outside party owns, controls and manages your infrastructure and computational resources, how can you be assured that sensitive data remains private and secure? How do you best protect data in mixed use cloud and big data infrastructure sets? Can you still satisfy the full range of reporting, compliance and regulatory requirements? In...
T-Mobile has been transforming the wireless industry with its “Uncarrier” initiatives. Today as T-Mobile’s IT organization works to transform itself in a like manner, technical foundations built over the last couple of years are now key to their drive for more Agile delivery practices. In his session at DevOps Summit, Martin Krienke, Sr Development Manager at T-Mobile, will discuss where they started their Continuous Delivery journey, where they are today, and where they are going in an effort ...
Big Data is amazing, it's life changing and yes it is changing how we see our world. Big Data, however, can sometimes be too big. Organizations that are not amassing massive amounts of information and feeding into their decision buckets, smaller data that feeds in from customer buying patterns, buying decisions and buying influences can be more useful when used in the right way. In their session at Big Data Expo, Ermanno Bonifazi, CEO & Founder of Solgenia, and Ian Khan, Global Strategic Positi...
Storage administrators find themselves walking a line between meeting employees’ demands to use public cloud storage services, and their organizations’ need to store information on-premises for security, performance, cost and compliance reasons. However, as file sharing protocols like CIFS and NFS continue to lose their relevance, simply relying only on a NAS-based environment creates inefficiencies that hurt productivity and the bottom line. IT wants to implement cloud storage it can purchase a...
The cloud is everywhere and growing, and with it SaaS has become an accepted means for software delivery. SaaS is more than just a technology, it is a thriving business model estimated to be worth around $53 billion dollars by 2015, according to IDC. The question is - how do you build and scale a profitable SaaS business model? In his session at 15th Cloud Expo, Jason Cumberland, Vice President, SaaS Solutions at Dimension Data, discussed the common mistakes businesses make when transitioning t...
Are your Big Data initiatives resulting in Big Impact or Big Mess? In her session at Big Data Expo, Penelope Everall Gordon, Emerging Technology Strategist at 1Plug Corporation, shared her successes in improving Big Decision outcomes by building stories compelling to the target audience – and her failures when she lost sight of the plotline, distracted by the glitter of technology and the lure of buried insights. The cast of characters includes the agency head [city official? elected official?...
In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect at GE, and Ibrahim Gokcen, who leads GE's advanced IoT analytics, focused on the Internet of Things / Industrial Internet and how to make it operational for business end-users. Learn about the challenges posed by machine and sensor data and how to marry it with enterprise data. They also discussed the tips and tricks to provide the Industrial Internet as an end-user consumable service using Big Data Analytics and Industrial C...
The move to the cloud brings a number of new security challenges, but the application remains your last line of defense. In his session at 15th Cloud Expo, Arthur Hicken, Evangelist at Parasoft, discussed how developers are extremely well-poised to perform tasks critical for securing the application – provided that certain key obstacles are overcome. Arthur Hicken has been involved in automating various practices at Parasoft for almost 20 years. He has worked on projects including database dev...
DevOps Summit, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long developmen...
Security can create serious friction for DevOps processes. We've come up with an approach to alleviate the friction and provide security value to DevOps teams. In her session at DevOps Summit, Shannon Lietz, Senior Manager of DevSecOps at Intuit, will discuss how DevSecOps got started and how it has evolved. Shannon Lietz has over two decades of experience pursuing next generation security solutions. She is currently the DevSecOps Leader for Intuit where she is responsible for setting and driv...
Software-driven innovation is becoming a primary approach to how businesses create and deliver new value to customers. A survey of 400 business and IT executives by the IBM Institute for Business Value showed businesses that are more effective at software delivery are also more profitable than their peers nearly 70 percent of the time (1). DevOps provides a way for businesses to remain competitive, applying lean and agile principles to software development to speed the delivery of software that ...
“Oh, dev is dev and ops is ops, and never the twain shall meet.” With apoloies to Rudyard Kipling and all of his fans, this describes the early state of the two sides of DevOps. Yet the DevOps approach is demanded by cloud computing, as the speed, flexibility, and scalability in today's so-called “Third Platform” must not be hindered by the traditional limitations of software development and deployment. A recent report by Gartner, for example, says that 25% of Global 2000 companies will b...
JFrog on Thursday announced that it has added Docker support to Bintray, its distribution-as-a-service (DaaS) platform. When combined with JFrog’s Artifactory binary repository management system, organizations can now manage Docker images with an end-to-end solution that supports all technologies. The new version of Bintray allows organizations to create an unlimited number of private Docker repositories, and through the use of fast Akamai content delivery networks (CDNs), it decreases the dow...
More organizations are embracing DevOps to realize compelling business benefits such as more frequent feature releases, increased application stability, and more productive resource utilization. However, security and compliance monitoring tools have not kept up and often represent the single largest remaining hurdle to continuous delivery. In their session at DevOps Summit, Justin Criswell, Senior Sales Engineer at Alert Logic, Ricardo Lupo, a Solution Architect with Chef, will discuss how to ...
Thanks to Docker, it becomes very easy to leverage containers to build, ship, and run any Linux application on any kind of infrastructure. Docker is particularly helpful for microservice architectures because their successful implementation relies on a fast, efficient deployment mechanism – which is precisely one of the features of Docker. Microservice architectures are therefore becoming more popular, and are increasingly seen as an interesting option even for smaller projects, instead of bein...