Monday, 3 September 2012

IPv6 Introductory Workshop - Aug 2012

Businesses that continue to rely solely on IPv4 technology and have no plans to implement the new version protocol - IPv6 technology in the near future will risk running into a host of business challenges. Problems may occur from increasing costs, limits website functionality to inhibit critical growth opportunities in emerging markets and beyond if there is no transition made from IPv4 to IPv6 technology.

Progreso Networks had organised a half day Introductory Workshop on 31 August 2012 to equip network professionals with a quick understanding on IPv6 technology through some topics such as the evolution of IPv6, IPv6 Improvement and Features, IPv6 Security and IPv4 to IPv6 Co-Existence Overview.
  







If you had missed the above event and wish to attend the workshop, please email us at ipv6@progreso.com.sg, we will try to make it possible for you.

Friday, 3 August 2012

IPv6 Conference 2012



The IPv6 Conference 2012 is a three-day series of conferences and workshops that encourage Singapore businesses to understand the potential of IPv6, and provide practical knowledge on using this technology to expand your business. 

Progreso Networks was invited as the exhibitor to present our innovative live demo on IPv6 security during the 2 days exhibition. 











Our 'live' demonstration on IPv6 security

We have also introduced our IPv6 training programme which supported by iDA Singapore and the IPv6 Consultancy and Security Audit services to the local and overseas delegates.






Token of Appreciation from IDA Singapore

We would like to thank our partners; Palto Alto, A10 Networks and Spirent for the support in this event to make it a suceessful one.



Friday, 27 July 2012

Accelerated Learning with the New Network

As technology plays an ever more important role now than it was in the past in the enhancing learning industry, it is noticed that education institutions have overlooked the importance and challenges of the fundamental infrastructure with the advanced applications and tools like computers, mobile devices and more. 

Concerned with such issues, Westcon Convergence, Nera Communication and Juniper Networks had jointly held a discussion and solutions sharing on 26 July 2012, at M Hotel Singapore to assist learning institution scale new height in providing a better education system. 

Progreso Networks is one of the exhibitors at the event. We are glad to share with some of the participants in the education industry on our IPv6 training programme and services that help in the transition from IPv4 to IPv6 technology.

















Wednesday, 25 July 2012

IPv6 Security Audit Services

Following the transition of IPv4 to IPv6 and its official launch on the 6 June 2012, there has been security concerns on IPv6 issues. To assist our customer in network security issues, Progreso Networks now offers IPv6 Security Audit Services. The IPv6 Security Audit Services will involved  the following 4 processes.


1. Internal Assessment
This process involves a review of the internal network setup and collection of relevant data for further analysis. Detailed evaluation works will be conducted against the main network components with focus on software versions, security capabilities, configuration parameters and conformance to organisation policies. Risks of security exploits and configuration flaws or enhancements will be identified by the end of the process.
Range of devices typically covered for evaluation:
  • Routers
  • Switches
  • Firewalls
  • Servers
  • Client Hosts


2. External Assessment
This process is similar to the preceding one, except that it focuses on external facing devices. Evaluation of these devices encompass deeper examinations against extended guidelines, given their “frontline” position which exposes them directly to external security threats.
Devices typically examined in this process:
  • External facing Routers
  • External facing Firewalls
  • External facing Servers


3. Penetration Testing
This common industry method used for evaluating security of a network serves to detect and confirm security vulnerabilities (including those identified in preceding processes) which can be exploited to attack - or access without authorization - the network (or systems within). Industry standard penetration test tools employed can automatically / manually generate bogus and malicious traffic towards the target network and systems to pick up security vulnerabilities and flaws. The security vulnerabilities identified [along with their associated severity level, proposed mitigation action(s)] will be documented in the penetration test report.

4. Review & Recommendation of Security Policies
The closing process of this security audit framework summarizes the outputs from preceding processes and provides recommendations (in the form of security policies or other suitable measures) to strengthen security protection of the assessed network and the systems within. A follow-up assessment may be opted for to validate enhancements introduced or security vulnerabilities closed, based on the recommendations.

Please click here for our brochure or contact us at 6509 9600.

Tuesday, 10 July 2012

July Recreational Event – Happy Birthday KC!

09 July is KC’s birthday, and with the lack of July babies in Progreso, he had the honor to keep the July birthday cake all to himself!


To start with, we have our lunch at JustAcia, where the Progreso Hunks had a great feast and helped themselves to the free-flow of drinks and ice-cream. No words could describe how much they can eat, and so we shall let the following pictures speak for themselves.






Our Progreso Hunks have talents in many areas. In preparation for their participation in the upcoming Progreso Olympics 2012, Cindy, our event secretariat has specially arranged us for a Bowling session.











Our Winners of the day


And lastly, 
Happy Birthday, KC!