Red Education Partners with AlgoSec to Drive Best Practices in Enterprise Security Management

SYDNEY, AUSTRALIA – February 1st, 2019 – Red Education has been announced as AlgoSec’s Authorised Training Centre (ATC) for Australia & New Zealand, offering administration training for AlgoSec’s client base across the region.

This partnership will allow AlgoSec to focus on bringing further growth to their business and supporting their existing customers, while Red Education will ensure AlgoSec’s clients and partners are empowered with the knowledge and skills they need to extract their optimal value from AlgoSec’s solutions.

AlgoSec is the market leader in network security policy management and their solutions are serving the world’s largest and most complex enterprise organisations.

Mike Landwehr, AlgoSec’s Regional Director of ANZ, said, “As the leader in the Security Policy Management market, servicing many of Australia’s tier-1 companies, AlgoSec is committed to ensuring its customers are able to get the most out of their AlgoSec investment. The partnership with Red Education represents a powerful opportunity for AlgoSec’s customers and partners in Australia and New Zealand to receive knowledge and experience through training, offered locally from industry experts. Red Education is the leader in training for the Asia Pacific region and we are excited to extend our course offerings through them in the ANZ market.”

Zach Zuravle, Managing Director at Red Education said, “Red Education continues to take action by partnering with AlgoSec to bring a regular training schedule of AlgoSec courses across the Australia and New Zealand region.”

He continued, “AlgoSec’s customers and partners are assured of the very best in enterprise security management education. The training is delivered by highly experienced instructors – absolute experts in cyber security. We have added yet another market leader to our portfolio with AlgoSec, and they have been amazing in their support of this initiative thus far. We hope to expand our Algosec course offerings across APAC very soon.”

Red Education will be providing the 3 day AlgoSec Firewall Analyzer and AlgoSec FireFlow Administration course. In the future Red Education will look to offer more advanced Algosec courses in their portfolio. All courses include hands-on courses consisting of lectures, labs and real-world discussions.

All AlgoSec courses will be available in-class, on-site and virtually. Red Education will be delivering AlgoSec courses starting from February 2019.

To view all available AlgoSec’s training courses please visit Red Education’s course schedules.

About AlgoSec

Founded in 2003, AlgoSec is a U.S.-based leading provider of business-driven network security management solutions. AlgoSec helps the world’s largest organizations align security with their mission-critical business processes. With AlgoSec, users can discover, map and migrate business application connectivity, proactively analyze risk from the business perspective, tie cyber-attacks to business processes and intelligently automate network security changes with zero touch – across their cloud, SDN and on-premise networks. Over 1,800 enterprises, including 20 of the Fortune 50, have utilized AlgoSec’s solutions to make their organizations more agile, more secure and more compliant – all the time. Since 2005, AlgoSec has shown its commitment to customer satisfaction with the industry’s only money-back guarantee.

Share on FacebookTweet about this on TwitterShare on Google+Share on LinkedInPin on PinterestShare on StumbleUponBuffer this page

Check Point’s Annual Charity Regatta 2018

Red Education took part at Check Point’s Annual Charity Regatta 2018

The exciting race took place from Rushcutters Bay and proceeds of the event were donated towards Sydney Children’s Hospital at Randwick.

A large group of children from the Sydney Children’s Hospital at Randwick were on boarded to the tall ship, “Southern Swan”. The owners generously donate their ship each year to allow the kids, their carers, siblings and Hospital staff to enjoy a break from Hospital routine and see the Regatta in action.

Red Education is a Check Point Authorised Training Centre and has received “Best 2016 Authorised Training Centre Partner Globally” Award for being the top training provider not only in APAC but globally.

Share on FacebookTweet about this on TwitterShare on Google+Share on LinkedInPin on PinterestShare on StumbleUponBuffer this page

Red Education to Deliver Training on Pure Storage Solutions across Asia Pacific and Japan

Red Education and Pure Storage

Australia — November 9th, 2018 — Red Education, the leader in specialist IT training in Asia Pacific, today announced that it has been appointed by Pure Storage, the all-flash storage platform that helps innovators build a better world with data, as its first Authorized Training Centre in the region.

This appointment will allow Pure Storage to focus on bringing further growth to their business and supporting their existing customers and partners, with Red Education ensuring that they are equipped with the knowledge and skills they need to extract the ultimate value from Pure Storage’s solutions.

“Red Education is a leader in its field and we’re pleased to be partnering with them across Asia Pacific,” said Soo Masson, Director of PUREIQ, Pure Storage’s training division. “Providing quality training and education on Pure Storage’s solutions to our customers and partners is essential to their success in maximizing the value of Pure’s industry-leading all-flash technologies.”

“With the publicized data storage skills shortage, Red Education continues to take action by partnering with Pure Storage to bring a regular schedule of training courses on Pure Storage Administration across Asia Pacific region,” said Zach Zuravle, Managing Director at Red Education.

“Pure Storage is an exciting vendor to partner with due to their fast growth and expansion in the market. We have added yet another technology leader to our portfolio with Pure Storage, and they have been amazing in their support of this initiative thus far.”

Red Education will provide hands-on courses consisting of lectures, labs and discussions. All Pure Storage courses will be available in-class, on-site and virtually. Red Education will be delivering Pure Storage courses starting from November 2018.

To view the available Pure Storage training courses please visit Red Education’s course schedules.

Share on FacebookTweet about this on TwitterShare on Google+Share on LinkedInPin on PinterestShare on StumbleUponBuffer this page

RED EDUCATION ANNOUNCES A CHANGE IN LEADERSHIP

Executive management change follows the departure of Managing Director Rob Howard

 

SYDNEY — May. 04, 2018 —Red Education Pty Ltd today announced a transition of leadership after Rob Howard, Managing Director, sold his shares to Red Education’s co-founder, Daniel Storey.

Red Education was founded in 2005 by Rob and Daniel. Throughout the years they were able to draw on their motivational skills and determination to tackle all challenges of growing a small business in the IT market. They succeeded in transforming Red Education from a start-up company being run from a home office to a multi-national company that covers all of the Asia Pacific Region. After nearly 15 years, Rob has decided it was time to leave the company.

With this news, Daniel Storey’s position in the company changes from Technical Director to Managing Director, responsible for the company’s overall continued success.

“The future is looking very bright for Red Education.  We continue to invest in the APAC region and in Australia to ensure we deliver the best training experience to our clients and continue to grow every year.” Commented Daniel.

Rob Howard, now former Managing Director, said: “Red Education will continue to provide the outstanding learning experience that it is known for. I wish everyone involved all the very best for the future.”

Daniel Storey is pleased to announce the appointment of Zach Zuravle as Executive Director of Sales and Operations. Zach joined Red Education in 2014 and has been the Sales Manager of the ANZ region until now. With his track record as a rigorous and dynamic manager, he is the logical choice to ensure the organization’s continuing success.

“I’m confident that Zach, with his experience from Global Knowledge and his last four years at Red Education, will be the best successor of Rob Howard. I see him as a great leader for a future of continuous growth and guaranteed quality.” commented Daniel.

Zach noted: “I have been very fortunate to spend over 4 years learning the Red Education’s business under a great mentor in Rob. I wish Rob all the best on his new journey and look forward to building an excellent future with Dan.”

Red Education Thanks Rob Howard for all his contributions and wishes him all the best in his future endeavours.

Red Education:

Red Education is the leader in IT training and professional services in the Asia Pacific region. Since its launch in 2005, Red Education has trained more than 50,000 IT professionals of many industries including financial services, government, telecommunications, education, healthcare and many others. The combination of extensively experienced trainers and courses that balance theoretical concepts and hands-on labs is the formula to Red Education’s class success. Red Education ensures quality class across all delivery methods; in-class, virtual instructor led training (VILT) or on clients’ sites.

Media Contact:

Dalia Habbak

Marketing Manager – Red Education

M: +61 450 409 992

dalia.habbak@rededucation.com

Share on FacebookTweet about this on TwitterShare on Google+Share on LinkedInPin on PinterestShare on StumbleUponBuffer this page

How to Monitor ISP Bandwidth With PRTG Then Tweet about It!

 

Are you getting the speed that you are paying your ISP for?

A step by step guide on how to use PRTG to monitor the bandwidth you are getting, and how to let your ISP know via a Tweet once it drops below a threshold!

Please enter your email below to get instant access to the full guide.

 

Sanjay

By: Sanjay Kanesamoorthy
Senior Trainer/Consultant at Red Education

 

Share on FacebookTweet about this on TwitterShare on Google+Share on LinkedInPin on PinterestShare on StumbleUponBuffer this page

Securing my home network, #DoIEvenBother

 

When I get back home after a long day at work, it’s dark, and my mind often wanders into thoughts of how secure (physically) my home actually is. As I unlock the front gate, then the flyscreen door, then the actual front-door (3 locks), I grin as I consider how easy it is for someone to simply break a window to get in, or jimmy the flimsy sliding door locks on the side of the house. I suppose it’s more of a deterrent than anything else. Why do I concern myself with these things? Well, I’ve had my prized possessions stolen before.  My mountain bikes mean the world to me, and the scum of the earth bike thieves took them. Absolute scum.

As I opeDoorLockn my door, it’s nice to see that my TV is still hanging on the wall, and everything is as I left it. I suspect this is a thought that goes through the minds of a lot of people. Did I remember to lock the front door? Who REALLY cares if you didn’t? (Well to start off with, without any signs of forced entry, it’s unlikely your insurance company will replace that TV!). If you were confident you left it unlocked, chances are you’d turn around, even if it meant being late to that important meeting, and lock up. Why do we give so much credence to physical security, yet the majority of us don’t even bat an eyelid in regards to our meta-physical security, our data… (which I know technically isn’t meta-physical, It just sounds so cool I had to say it…)

 “Home network security is something that we tend to overlook, and I suspect the primary reason is that we don’t value its contents to the same extent as our physical world.”

Let’s take the worst-case scenario. Assuming your home network gets 100% pwned. What will you lose? Let’s follow Doctor Angela Ziegler as an example. Doctor Ziegler is a medical scientist conducting some ground-breaking research at the state-of-the-art facilities at work. She works long hours and tends to bring work home with her on her work issue laptop. At home, she enjoys watching live gaming streams of overwatch on twitch, and the occasional episode of the (legitimately downloaded) TV-Show “Where Are My Pants?”.

At home, she has a NAS drive she purchased from her local target, containing precious photos of her colleagues (some who have passed away, others suffered a worse fate), as well as some auxiliary research papers. Connected appliances such as her cloud controlled Air-conditioner, and her Lucky-Goldstar (LG) Internet Connected refrigerator also form part of her network, along with all the latest generation gaming consoles.
Back at the office, we trust that all her research is secured by the security team, but what about back home?
Who setup the network at home? Were there any thoughts towards security during its design? Was it even designed, or did she just use the default Huawei Modem/Router supplied by her ISP?

Securing home network

What are the risks here? What does Dr. Ziegler have to lose? If your thoughts jumped to the NAS drive, with the photos and research, you would be partially correct. This is indeed the most obvious concern, if this data were to be lost, would it be replaceable? A TV at home is easy to replace, in fact, you would probably upgrade, but the photos, they are gone. What dollar value would Dr. Ziegler place on these? If you could buy your own photos that were previously lost, how much would you pay? Especially if it contains photos of friends and family who are no longer with us… Think ransomware. Apart from the personal effects, what about the auxiliary research documents? What value do they have for Dr. Ziegler, and the organisation funding her research? What if these got into the hands of a competitor? (Talon)

If you are thinking that those documents should be stored on the servers back at the office… yeah, that’s fair… in best practice. However, as humans, we are often the weakest part of any network. We are lazy, and take shortcuts when available. It’s far quicker for Dr. Ziegler to have these files locally when she works from home, rather than VPN in to the office, using that annoying 2-factor authentication the security team back at the office implemented… Where did she leave that key-fob anyway?

On that note, she doesn’t only use her work issue laptop for research either. She sometimes uses her personal desktop (gaming rig) to crunch some numbers. After all, it’s far more powerful. This is the same machine she uses to watch twitch.tv streams and browse the Internet. What security does she have on this machine? Surprisingly, the common answer here is “none”.

We have barely scraped the surface though. Remember those connected appliances? It wasn’t long ago that a vulnerability in Miele dishwashers was discovered (Article Here), allowing an attacker root access to them. So what? I hear you cry. What’s the attacker going to do? Clean my dishes?

Fair response I suppose. I guess it would be possible to control different aspects of the machine itself, but that’s not the likely goal for an attacker (although I can think of a few funny pranks to do). They could use your machine as part of a botnet, to be used for an attack on an external party (such as DDOS’ing Blizzards servers), or they could use it to move laterally through your network. I.e. once they have control of your dishwasher, they can attack your NAS drive. This same concept applies to all devices on your network.

The good news is, it’s not that hard to follow some security best practices at home. Simple things like changing the default passwords on your devices and NAS go a surprisingly long way, Setting up Wifi with a strong password and appropriate encryption, segregating work from play by not using the same machines, and ensuring that a sufficient endpoint solution (anti-virus, anti-malware etc) is present on ALL your machines.  Above all, backup your important documents! Not just on a NAS locally, but offsite too. There are many cloud-based backup solutions that could be used for Photos and Private material… BUT NOT FOR SENSITIVE WORK CONTENT!

I will address Doctor Zieglers not so unique situation in a later post, detailing a potential solution. The first step however, is identifying the risk. So the next time you return home, and follow your own unlocking routine, maybe have a think about what it is that you’re securing, and more importantly, what you’re not!

 

Ronen

Written by Ronen Meshel
You can read more about Ronen on his website: ronen.it/

Share on FacebookTweet about this on TwitterShare on Google+Share on LinkedInPin on PinterestShare on StumbleUponBuffer this page