Cyber Resiliency through Out-of-Band

Using out-of-band for improved network cyber resiliency.

[fsn_row][fsn_column width=”12″][fsn_text]

The Uplogix out-of-band platform brings a combination of network independence, intelligence and automation to give your team the tools to make your network more resilient — especially during a network hack. Here’s how it works.

Uplogix locates with — and directly connects to — managed devices. Like a virtual technician, Uplogix performs the monitoring, config & change, automated problem resolution and security tasks that are best done or can only be done onsite. With a dedicated out-of-band connection, Uplogix can always be reached remotely even when the primary network is down or degraded from a hack.

Zero-day, near zero-hour responsiveness

From the moment you become aware that your network might have been hacked, a clock starts ticking. You want to minimize the impact by locking down impacted or potentially impacted network functions.

Uplogix can store configurations for a “safe mode” for network devices, limiting functionality to effectively quarantine sections of your network. With Uplogix you can push a config to one device, or thousands deployed across your network. Think of it as a panic button.

As the scope of the breach becomes more clear, Uplogix can push additional configurations to bring unaffected services and locations back up across your network, ensuring the fastest return to normal possible. Network resiliency is defined not just by how unlikely your network is to get hacked, but maybe even more importantly how quickly you can recover.

[/fsn_text][/fsn_column][/fsn_row][fsn_row][fsn_column width=”7″][fsn_text]

Scale your response team with automation

In an emergency it’s all hands on deck, but even that is often not enough. Uplogix acts as a multiplier for your response team with safe and reliable automation for configuration and OS changes.

Using the network or an out-of-band link, Uplogix can automatically and remotely push configuration changes and upgrades without the risk that the changes could result in further network outages.

Automated SurgicalRollback™ restores valid configurations automatically, plus highlights issues requiring human intervention when problems occur.

Access passwords on one or hundreds of devices can be securely updated in a single action. Using configuration differencing to review recent changes to network and communications devices, admins can easily discern if either problematic or corrective changes have been made to devices.  Administrative complexity created by heterogeneous network infrastructures is reduced by providing a single consistent management interface.

Always connected—Out-of-Band options

Key features of Uplogix is persistent connectivity and continuous monitoring to remote gear. With Uplogix connected to your network and communications devices, and an out-of-band connection of your choice, you can count on maintaining management access and two-way control even when the network is down or degraded.

In addition to being able to connect to devices, when the network is down Uplogix Local Managers continue to enforce security policies, log all changes and the results of those changes, and continuously monitor critical device statistics and user interactions.

Uplogix Local Managers are the most reliable and secure out-band-access solution on the market today, with unique capabilities to ensure that when you need access, you get it. Uplogix Local Managers feature an array of communications, secure access and automation capabilities not found in commodity console or terminal servers.

Connectivity options include:

  • V.92 modem
  • Cellular (GSM and CDMA) including support for non-circuit switched service with SMS triggered “phone home”
  • Secondary Ethernet
  • LEO satellite

You can also configure multiple options and use rules to decide which option to use and when.

[/fsn_text][/fsn_column][fsn_column width=”5″ style=”display: block;” column_style=”light” background_color=”#e5e5e5″ margin=”{#fsnquot;top#fsnquot;:#fsnquot;20px#fsnquot;}”][fsn_image image_id=”17389″ image_size=”full” image_align=”align-center” image_style=”img-default” background_color=”#e5e5e5″ margin=”{#fsnquot;top#fsnquot;:#fsnquot;20px#fsnquot;}” padding=”{#fsnquot;top#fsnquot;:#fsnquot;20px#fsnquot;}”][/fsn_image][fsn_text margin=”{#fsnquot;top#fsnquot;:#fsnquot;15px#fsnquot;,#fsnquot;right#fsnquot;:#fsnquot;15px#fsnquot;,#fsnquot;bottom#fsnquot;:#fsnquot;15px#fsnquot;,#fsnquot;left#fsnquot;:#fsnquot;15px#fsnquot;}” text_align=”left” background_color=”#e5e5e5″]

Uplogix: Network First Responder

eBook: Achieving cyber resiliency for your network infrastructure

Uplogix is your day zero first responder when it comes to response and recovery from a network hack. With the secure out-of-band access and automation that you can rely on both as a “panic button” to initiate a lock-down as well as the tools needed for a quick and deliberate recovery.

[/fsn_text][fsn_code]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[/fsn_code][/fsn_column][/fsn_row][fsn_row][fsn_column width=”12″][fsn_text]

It’s not too late, but you are already behind the curve

The average detection time for network intrusions ranges from days to months. Average cost of a data breach is topping $3 million, and that doesn’t even factor in ongoing business impacts like negative press. You don’t want to end up on the front page of the Wall Street Journal for all the wrong reasons.

The time for action is now.

Network security is like a tug-of-war. Every time the good guys make incremental progress, the bad guys come up with something new and powerful to secure the advantage. Deploying Uplogix as a network first responder is like adding people to your side, pulling the rope back in your direction and making your network more resilient.

For more information on how Uplogix can make your zero day a hero day, please contact us.

[/fsn_text][/fsn_column][/fsn_row]

Published:

Share:

Subscribe to Blog Updates

More Posts

Uplogix Resource Center

Uplogix attacks the challenges of network management from a different angle. Take a few minutes to browse through our Data Sheets, Case Studies and additional resources to see for yourself.