Articles

Idea 11 Blog

Shellshock Exploit Prevention Using Palo Alto Networks IPS

By Idea 11 Consulting / September 29, 2014

The Threat Prevention feature of Palo Alto Networks firewalls protects your network in several ways. One of these is an Intrusion Prevention System (IPS) that enables you to block known vulnerabilities at the network gateway. This approach to intrusion prevention helps to protect your network by detecting and blocking known attack signatures for security…

Read More

What is Shellshock, and How Can You Protect Your Networks?

By Idea 11 Consulting / September 26, 2014

A new security vulnerability called Shellshock has been discovered. Security experts are already calling it one of the most serious vulnerabilities of all time, even more serious than Heartbleed. The Shellshock vulnerability is present in Bash, a remote shell commonly used to remotely administer Linux-based systems. This includes many Linux distributions…

Read More

SSL Decryption of Web Traffic at the Network Gateway

By Rian Brooks-Kane / August 11, 2014

One thing I’ve realised from working with Palo Alto Networks firewalls is how much network traffic runs over HTTPS/SSL these days. Having your web traffic secured with SSL encryption is great for when you’re using your banking website, but it also means that malicious traffic can be masked from your network’s…

Read More

Verifying your SSL Certificate is secure

By James Kahn / January 17, 2014

Setting up SSL correctly is not as simple as it looks. The basics: install the certificate and check it works. But out of the box, it might not work in all browsers, and your server might not be as secure as you think. Qualys SSL Labs is a great (free) tool…

Read More

System configuration, hold the sauce

By Idea 11 Consulting / November 21, 2013

Let’s dive into building systems that build themselves. Sound complicated? It’s not. And making the switch can unlock some huge efficiency and flexibility improvements in your environment. Too much secret sauce Traditionally you build a system by gathering the recommended specifications from your software vendor or dev team, perform some sizing…

Read More

The Consumerisation of Enterprise IT Part 2: Information Security

By James Kahn / May 13, 2011

With the ongoing consumerisation of Enterpise IT, increasingly users need to access corporate information systems from any device, anywhere. Traditionally, IT has used heavy-handed techniques that involve locking the information down in one form or another. This is difficult – and in some cases not possible – with the consumerisation of…

Read More

Configuring virtual desktops

By Idea 11 Consulting / April 18, 2011

Since the introduction of Windows 2000, IT departments have used group policies to control and configure workstations. A corporate workstation build will typically contain the operating system, service packs and hotfixes and core applications common to all user groups – Microsoft Office, Adobe Reader, and the like. Whilst some configuration of…

Read More

The Consumerisation of Enterprise IT Part 1

By James Kahn / March 30, 2011

Yesterday there was an article in the Australian about Suncorp allowing staff to BYO their own computers and tablets. This isn’t an anomaly – it’s part of a growing trend within corporate IT. There is more focus on end user experience and less on rigid control. Enterprise IT is being consumerised.…

Read More

The easiest way to create a bootable USB flash drive for MDT

By Idea 11 Consulting / February 21, 2011

The Microsoft Deployment Toolkit (MDT) is an excellent – and free – tool for automated desktop and server builds. We use it all the time. Sometimes, for whatever reason, installing a PXE server or using a boot CD ISO isn’t desirable. Using a boot USB flash drive is the best bet…

Read More