Search Results for:

ZR System Group VPLS Better Together Banner 1200x628

VPLS acquires ZR Systems and expands its managed IT services in Hawaii

Published

Written by

Filed under

We are excited to announce VPLS’s acquisition of ZR Systems, an Aiea-based managed IT services company. The combined company will more effectively serve the growing Hawaiian client base with a range of dedicated onsite support, professional services, and industry-leading software and hardware solutions.

With this acquisition, VPLS expands its data center footprint into Hawaii, bringing its total number of global sites to 19. Additionally, Ricky Zheng, founder of ZR Systems, will join VPLS’s executive management team, bringing more than 20 years of industry experience to his new VP role.

ZR Systems will be known as “ZR Systems, a VPLS company” for a short period following this acquisition. Its expanded service portfolio will now include public and private cloud, bare metal and VPS hosting, colocation, disaster recovery and backup, as well as expanded professional services including managed network and managed SOC services.

Read More from this Author

If you enjoyed this article, you'll probably like:

VPLS Forigate Banner 1200x628

FortiGate SSL VPN Certificate Vulnerability

Published

Written by

Filed under

A new article detailing an SSL VPN certificate vulnerability in FortiGate firewalls is making its rounds in cybersecurity circles. The article details how a FortiGate, if left with its default settings, could allow a man-in-the-middle attack to take place for SSL VPN users.

The article mentions that potentially 200,000 FortiGates are deployed in the wild with the “major security flaw” that this attack exploits.

Fortinet’s response is that they already provide a warning to IT administrators not to use this default configuration, so they will take no action on their part at this time. As of this blog post, no unique CVE number has been assigned to this vulnerability, and the article itself has drawn criticism for reporting as new an already well-known vulnerability that applies to this default configuration.

ForiGate Settings 591x381

If you are using the default, self-signed certificate for your SSL VPN as shown in the photo above, VPLS recommends purchasing and installing a valid SSL certificate to use for the SSL VPN to mitigate this vulnerability.

Please reach out to us if you would like more information on if this vulnerability applies to your environment and what mitigation steps are required.

Additionally, VPLS would be happy to assist you with the mitigation steps mentioned above, including assistance with purchasing and installing a valid SSL certificate for your VPN, for a $500 flat fee.

Read More from this Author

If you enjoyed this article, you'll probably like:

VPLS SD-WAN Banner 1200x628

Secure SD-WAN for Multi-Cloud & Hybrid Cloud Environments

Published

Written by

Filed under

The Current State of Multi-Cloud & Hybrid Cloud

The current state of multi-cloud and hybrid cloud can be quickly summarized with these statistics from Flexera:

And these numbers from Flexera are not unique. Businesses are rapidly embracing multi-cloud and hybrid cloud environments because of their flexibility. They allow organizations to avoid vendor lock-in and leverage the best and/or most cost-effective cloud services available for a given business need.

However, while businesses are eager to take advantage of the flexibility a multi-cloud or hybrid cloud environment can offer, providing a consistent user experience to cloud environments over an Internet connection can feel like an uphill battle. Much of the connectivity path will be out of your control, and often riddled with many latency-inducing hops.

In addition, securely connecting workloads together between multiple clouds, as well as connecting your on-prem data center and office to these cloud environments, can be complex. Even if you have the staff with cloud networking and security expertise, the lack of end-to-end visibility and centralized management across multiple cloud environments increases the risk of breaches, data loss, and compliance penalties.

Cloud On-Ramps & VPLS CloudHop™

Cloud on-ramps directly address the need for a consistent user experience by bypassing the Internet and instead providing your users with a high speed, low latency connection to a cloud provider. Services like Direct Connect from AWS and ExpressRoute from Azure allow a business, via a service provider like VPLS, to establish these direct links to their cloud environments, bypassing the many hops it would normally take to reach that cloud via the Internet. This dedicated link guarantees a reliable, consistent experience for users and their cloud assets.

However, with multi-cloud architectures, establishing and managing all of these cloud on-ramps can be an administrative burden. In addition, the more cloud on-ramps you have, the less ROI each of these direct links provide. VPLS CloudHop™ solves these challenges by having VPLS do the administrative legwork to maintain these direct links with the cloud providers. Instead, we just provide your business a single, cost-effective connection point that can be provisioned to connect to any and all major public cloud providers.

Combine CloudHop™ with Internet or Ethernet Transport services from VPLS, and we can extend your multi-cloud environment all the way back your offices and existing data centers.

Intelligent Path Selection & Path Redundancy with Secure SD-WAN

Although cloud on-ramps with VPLS CloudHop™ and VPLS Internet and/or Ethernet Transport services will provide the best user experience for your business’ multi-cloud and hybrid cloud environments, there is a possibility that not all of your cloud workloads need this level of performance.

With VPLS’s Managed Secure SD-WAN service, all possible paths become part of a unified SD-WAN “overlay” network, and each path is measured for the current latency, jitter, and packet loss. SD-WAN then, in real-time, can intelligently route traffic across the links that meet your defined SLA for that specific application or traffic flow. VPLS’s Managed Secure SD-WAN service is application aware, powered by a database of known applications, but also supporting custom application signatures. This means traffic can be identified and steered very granularly, but without requiring complex rules to do so.

Multi-Cloud SD-WAN 1282x653

If more than one path meets your SLA, rules can be engineered to favor one link, or load balance traffic across multiple links. This allows you to provision and use a dedicated cloud on-ramp with just the right bandwidth requirements for critical workloads and use the lower cost path over the Internet only when it is performing up to the mark.

All SD-WAN endpoints can be centrally managed and orchestrated in a “single pane of glass”, giving you end-to-end actionable visibility across all cloud environments. With deep cloud-native integrations, VPLS’ Managed Secure SD-WAN service not only provides the performance that you need in multi-cloud and hybrid cloud architectures, but also provides advanced, industry-leading prevention and detection capabilities as your cloud next-gen firewall.

Optimize Your Multi-Cloud and Hybrid Cloud Environments with VPLS

To recap, businesses are rapidly adopting multi-cloud and hybrid cloud environments for their flexibility, but getting blindsided with unnecessary expense, configuration complexities, and unpredictable network performance.

Whether your business is already in this boat, or you are soon to adopt a multi-cloud or hybrid cloud architecture and want to do it right the first time, VPLS can guide your organization to optimize costs, provide a consistent user experience, and secure all of your cloud environments with industry-leading protection managed by a single pane of glass.

With the help of VPLS CloudHop™, our Internet and/or Ethernet Transport services, and our fully-managed Secure SD-WAN-as-a-Service, your business can take charge of this unstoppable industry move towards multi-cloud and hybrid cloud environments, and continue serving your customers in bigger and better ways.

John Headley

Read More from this Author

If you enjoyed this article, you'll probably like:

Enterprise wifi problems

Common Enterprise WiFi Problems and Solutions

Published

Written by

Filed under

Many organizations frequently experience challenges with their enterprise wifi that, with the right advice, can be resolved in a few simple steps.

Here are some of the most common enterprise wifi problems that the VPLS team has helped our clients solve.

Problem #1

Enterprise Wifi isn't working at my desk even though I'm sitting over it

AP transmit power configuration

In some situations, the Access Point (AP) transmit power is configured too high, which can cause clients to stay connected to an AP while they move further away. When this happens, the client still “sees” their current AP at sufficient signal strength because their device is not roaming properly to the nearest AP.

Use of old legacy rates

Poor wifi can also be caused by using old legacy data rates supported by 802.11b/g. In this case, when a client is further away from the APthey stay connected by having their current data rate change to a lower supported rate. This may also cause another impact on performance which we will discuss in the solution portion of this article. 

Solutions

These solutions can typically be performed on your AP’s management console or wireless LAN controller.

Disable legacy rates

If possible, disable legacy rates. However, when doing so be aware that this may impact clients with older wireless cards. To avoid any issues, check the capabilities of the client first via manufacturer specifications or other resources, and then disable the legacy rates. 

Reduce power on your APs

First, reduce transmit power on your APs and set the 2.4 GHz radio to a lower power level than the 5 GHz radio. This will help clients roam more effectively and let clients find the preferred 5 GHz band where less congested airtime is available. Afterward, remember to validate that this does not cause coverage holes for your clients. 

Problem #2

Enterprise Wifi access is slow even with full bars

Slow legacy data rates

Along with roaming issues, legacy 802.11b/g data rates can cause slow performance on a wireless LAN. Unlike wired, switch networks, wifi is a shared medium and requires that a client wait until the medium is available before it can transmit. In the wireless world, this is known as the Clear Channel Assessment (CCA) process. 

Every client on a wifi network performs this before transmitting data over the air. If a client is connected at slower 802.11b/g data rates, it requires more airtime to transmit data, causing slower performance. A good analogy is when you are on a multi-party conference call. Each party takes turns to speak, waiting for an opportunity to talk. A client communicating at 802.11b speeds is the equivalent of someone speaking very, very slowly. Until that party finishes talking, no one else can talk. The same is true in wifi. 

APs are on the same channel

Access Points located near each other may be set to the same channel, causing co-channel interference (CCI). In this case, clients will contend for available airtime on adjacent APs because they are both configured on the same channel.

AP is at max capacity

If your wifi is slow, it may indicate a capacity issue where too many clients are associated with an AP in each area. Often, access points are not located in high-density client areas like conference rooms, lobby, or employee break rooms. Therefore, in areas where large numbers of clients are located, such as in an open office floor plan, more access points may be needed to provide enough service.

Solutions

Disable legacy rates

Disable legacy rates, as previously mentioned. 

Adjust or re-configure the APs

Adjust or re-configure the channels on the APs so that they do not overlap.

Install or move APs

 Install or move APs in areas of high client density.  Additional APs may be required. 

Is your organization facing any of these issues?  Do you need assistance in applying the solutions described above?  VPLS can assist with troubleshooting and resolving these issues.  We have experienced and trained professionals who can address your wireless LAN needs, including wireless LAN design, site surveys, and assessments.

Read More from this Author

If you enjoyed this article, you'll probably like:

VPLS Inc. 5000

VPLS Ranks No. 3918 on the 2020 Inc. 5000 List With Growth of 90.24%

Published

Written by

Filed under

Inc. magazine today revealed that VPLS is No. 3918 on its annual Inc. 5000 list, the most prestigious ranking of the nation’s fastest-growing private companies. The list represents a unique look at the most successful companies within the American economy’s most dynamic segment—its independent small businesses. Intuit, Zappos, Under Armour, Microsoft, Patagonia, and many other well-known names gained their first national exposure as honorees on the Inc. 5000.

Not only have the companies on the 2020 Inc. 5000 been very competitive within their markets, but the list as a whole shows staggering growth compared with prior lists as well. The 2020 Inc. 5000 achieved an incredible three-year average growth of over 500 percent, and a median rate of 165 percent. The Inc. 5000’s aggregate revenue was $209 billion in 2019, accounting for over 1 million jobs over the past three years.

“The companies on this year’s Inc. 5000 come from nearly every realm of business,” says Inc. editor-in-chief Scott Omelianuk. “From health and software to media and hospitality, the 2020 list proves that no matter the sector, incredible growth is based on the foundations of tenacity and opportunism.”

Read More from this Author

If you enjoyed this article, you'll probably like:

VPLS-CRN Fast Growth Banner 1200x628

VPLS named to the 2020 CRN® Fast Growth 150 List

Earlier this year, VPLS also ranked on the 2020 CRN Top 500 Solutions Provider list

Published

Written by

Filed under

We are proud to announce that CRN®, a brand of The Channel Company®, has named VPLS to its 2020 Fast Growth 150 list. Each year, CRN® recognizes the fastest-growing technology integrators, solution providers, and IT consultants across North America for the substantial growth and performance they’ve achieved over the previous two years. The elite group of companies named to this year’s list have generated a combined total revenue of more than $37.8 billion between 2018 and 2019.

Today’s solution providers vie for market share within the highly competitive, fast-paced IT channel, making sustained growth and profitability noteworthy achievements. Ranking within the top 150 requires companies to continuously evolve with the seismic shifts taking place within the marketplace. The 2020 Fast Growth 150 list recognizes these companies’ extraordinary accomplishments and dedication to the IT channel.

“Evolution within the IT ecosystem is occurring at breakneck speed. The CRN® 2020 Fast Growth 150 list highlights the achievements of elite industry-leading companies in the IT channel and their ability to innovate in an ever-changing market,” said Blaine Raddon, CEO of The Channel Company®. “The extraordinary group of companies on this year’s list serve as an inspiration, setting an exemplary level of excellence for us to follow. We are excited to honor these industry leaders and wish them continued success in the years to come.”

Read More from this Author

If you enjoyed this article, you'll probably like:

VPLS Ransomware Prevent Banner 1200x628

How to Prevent Ransomware – A Technical Checklist

Published

Written by

Filed under

Unfortunately, there is no single solution to prevent ransomware or stop the spread once it has infiltrated your network; a defense in depth approach must be used. Below is a comprehensive, but not exhaustive, list of technical and administrative controls that can be used in your business’ defense against ransomware.

Your Ransomware Technical Checklist

Employee Training

Security Awareness Training

Source: KnowBe4

According to the Sophos May 2020 report, the most common attack vector for ransomware is email, with infection occurring from a user unknowingly clicking on a malicious link or attachment. Before focusing on email security (our next recommendation on this checklist), security awareness training is imperative to decrease the odds that your workforce falls for common social engineering tactics employed by attackers.

With simulated phishing attacks on your employees, ransomware simulation, domain spoof testing, and more, good security awareness training programs go far beyond than just presenting a boring slideshow to your employees, and will leave your workforce much more cautious and prepared to defend themselves against these clever attacks.

VPLS Recommends: KnowBe4

Email Security

Secure Email Gateway

As we discussed above, email is statistically the most likely threat vector for ransomware and therefore one your organization should not take lightly. Major email providers, such as Office 365, do offer some level of threat prevention built into their platform, but data shows administrators are not confident in the capabilities of this included protection. Secure email gateways offer a more complete list of protection mechanisms to thwart the ever-changing techniques employed by modern day attackers, as well as providing better visibility to any incidents that may occur.

VPLS Recommends: Proofpoint Essentials

How Proofpoint Helps

Zero-Day Threat Prevention (Sandboxing)

Of the assortment of comprehensive protection features offered by secure email gateways, ensure that your solution includes both attachment and URL sandboxing. Sandboxing is the solution for zero-day ransomware threats that can bypass normal filters. Files and URLs are automatically scanned using a cloud-based or on-prem sandbox environment, allowing full execution and analysis of the attachment or URL to ensure no bad behavior will occur once the attached has been opened or the URL visited.

VPLS Recommends: Proofpoint Essentials (email only) or FortiSandbox(standalone/multi-source)

Endpoint Security

Endpoint Detection & Response (EDR)

We discuss the what and why of EDR in our 5-minute primer on EDR, but the crux is that traditional endpoint protection is not good enough to protect against sophisticated threats like ransomware. A modern endpoint detection and response solution is what will enable both protecting the host from getting infected in the first place (pre-infection protection), as well as detecting an infection has occurred and handling the threat if it infiltrates the computer (post-infection protection).

The ability to detect and defuse ransomware, as well as automatic playbooks for responding and remediating the infection are critical to ensure one infected host does not compromise the rest of your corporate assets.

VPLS Recommends: FortiEDR via VPLS’s Managed Detection & Response (MDR) Service

Zero Trust Network Access (ZTNA)

Next-Gen Firewall

For protecting both on-prem and remote corporate users and company assets, a next-gen firewall is critical to ensure you have the detailed visibility and granular policy enforcement required to protect a network environment from ransomware. The old days of creating policies using just IP addresses and port numbers alone are gone, as a next-gen firewall has the intelligence to allow layer 7 application filtering and granular network access based on user ID or user group, regardless of their IP address or port numbers.
FortiGate Next Gen Firewall 1199x501

In addition to smarter policies, a next-gen firewall will commonly come equipped with things like IPS/IDS, network-level antivirus, web content filtering, DNS filtering, and SSL inspection, which when configured with ransomware in mind, will ensure that you notice and block even the most elusive indicators of attack (IOA) and indicators of compromise (IOC).

VPLS Recommends: Fortinet FortiGate via VPLS’s Managed Firewall Service

SSL Deep Packet Inspection

Commonly overlooked or put at the bottom of a firewall admin’s to-do list, SSL deep packet inspection, also known as SSL decryption, allows a next-gen firewall to inspect the payload of encrypted traffic being sent to and from corporate assets. This is important because without SSL deep packet inspection, ransomware hiding in encrypted payloads will not be caught by the next-gen firewall. Additionally, since many next-gen firewall features will not function or will only function partially, like IPS/IDS and network-level antivirus, you may miss out on key indicators of attack (IOA) and indicators of compromise (IOC) that you would otherwise have visibility into.

VPLS Recommends: Fortinet FortiGate via VPLS’s Managed Firewall Service

SSL Security Profile 608x215

Internal Network Segmentation/Microsegmentation

All next-gen firewall deployments are not created equal. “Flat networks” of yesteryear allow unrestricted lateral movement of ransomware once a computer becomes infected. Internal network segmentation solves this issue by putting devices in different segments based on device type. With the next-gen firewall as the L3 gateway, you can apply the same layer 7 and user-based policies to even your internal-to-internal traffic, not just for traffic leaving the network edge.
Internal Segmentation Example 843x510

Microsegmentation takes this internal network segmentation one step further and allows you fine-grained control to police the traffic between devices that are a part of two internal segments or even the same internal segment. This can be achieved by creating policies based on user identity and/or deploying an endpoint-level application firewall on the hosts themselves.

VPLS Recommends: Fortinet FortiGate via VPLS’s Managed Firewall Service + FortiSwitch via VPLS’s Managed Network Service

Network Access Control (NAC)

Whether your users are on-prem or remote, one computer infected with ransomware is all it takes to begin a chain reaction that will quickly bring your business to a halt. In conjunction with your next-gen firewall and the internal network segmentation deployment topology, NAC should be in place to facilitate dynamic network access control, which ensures only trusted corporate devices will automatically get placed in an appropriate internal network segment and have access to sensitive resources. Other guest and BYOD devices should be isolated and placed on a restricted network.

After the NAC solution dynamically allows access based on device trust, endpoint compliance should also be continually evaluated. If the host does not meet compliance requirements, such as if the host becomes infected, does not have antivirus running or it is out of date for too long, or the host does not have the latest OS patches installed, the host should be moved to a restricted quarantine or remediation VLAN until the missing criteria is met.

Remote users aren’t excluded here—NAC and endpoint compliance can and should be enforced for users before allowing them to connect to the corporate VPN.

VPLS Recommends: Fortinet FortiNAC

Security Information & Event Management (SIEM)

SIEM

A defense in depth approach to cybersecurity provides thorough protection against ransomware, but it also provides a thorough amount of something else—logs! Not only will many logs be generated from these various systems we have talked about, but your team must devise an efficient method to parse through the logs, pull out key information, and alert IT personnel about security events that are occurring to ensure your business has a firm grasp of the activity occurring in the network environment.
AlienVault-SIEM 692x347

Enter the SIEM. A SIEM solves the complex problem of aggregating logs from multiple sources and performing event correlation. The logs and real-time diagnostic data from all of your endpoints and network equipment allow the SIEM to intelligently zero in on suspicious or malicious activity and send appropriate alerts to your staff in real-time. SIEMs typically also include vulnerability scanning capabilities, cloud monitoring, host-based IDS, and an assortment of other complementary components too, providing your security team with even more powerful analytics and response capabilities at their fingertips.

VPLS Recommends: AlienVault via VPLS’s Managed SOC Service

Business Continuity

Offsite Backups & Disaster Recovery

When it comes to ransomware, a prepared business should always plan for the worst-case scenario—infection, data being held at ransom, and business grinding to a halt. In this unfortunately common doomsday scenario, having offsite backups protected from infection, as well as a dependable disaster recovery plan, can exponentially decrease financial loss and ensure your business gets back up and running within minutes.

VPLS Recommends: VPLS’s Backup as a Service (BaaS) and Disaster Recovery as a Service (DRaaS)

Backip DRaas 700x437

My checklist is complete; now what?

The checklist above contains truly business-saving technical controls that can be used to enhance your business’ security posture and increase its defenses against ransomware. However, as mentioned at the beginning of this post, this list is not exhaustive, and many things were left out from this checklist for the sake of brevity—mobile device management (MDM), cloud access security broker (CASB), browser isolation, and user entity and behavior analytics (UEBA), just to name a few.

The fight against ransomware never stops, and whether you want to discuss the items mentioned in this checklist, or are ready to explore what’s next, VPLS is here to help.

Read More from this Author

If you enjoyed this article, you'll probably like:

VPLS NASOP Banner 1200x628

VPLS Now Authorized to Participate in HPE’s NASPO Indirect Fulfillment Program

VPLS is part of the Server/Storage contract for California

Published

Written by

Filed under

Today, VPLS announces that we are now authorized to participate in HPE’s National Association of State Procurement Officials (NASPO) Indirect Fulfillment Partner Program under HPE’s NASPO ValuePoint Server/Storage MNNVP-134 agreement for California. VPLS secured the same designation for the State of Hawaii in 2019. The NASPO ValuePoint contract allows public entities to purchase HPE’s industry-leading storage and server solutions from VPLS via a pre-negotiated cooperative contract.

As an HPE Partner for over eight years, VPLS has both the technical and industry expertise required to address the various IT needs of government agencies and school districts. Recently, we completed a network refresh for the City of Beaumont, the third fastest-growing city in California. In addition to its strong partnership with HPE, VPLS is also on the HPE NASPO contract for Aruba Wireless, as well as the NASPO contracts for RUCKUS, Extreme Networks, Cisco Systems, and other industry-leading technology partners. Learn more about the solutions we offer government agencies.

Read More from this Author

If you enjoyed this article, you'll probably like:

Zero Trust Model Security IT Services

The Zero Trust Model

Published

Written by

Filed under

Zero Trust Model Security IT ServicesWith the ever-increasing number of breaches, it is quite evident that the traditional “trust but verify” model hasn’t been able to withstand today’s cybersecurity threat landscape.

In the “trust but verify” model, the network is divided into either “untrusted” network ( a network connected to the public internet) or “trusted” network (a network connected to the inside of the organization where all the users are trusted and have unrestricted access to anything and everything). As reported by Verizon, 34% of data breaches in 2019 involved internal actors. As a result, trusting anyone, on either side of the perimeter, should not be the de-facto anymore. Thus, it is quite imperative to redesign the network on a Zero Trust Model.

Defining Zero Trust

A Zero Trust Model refers to a threat model where no users, agents, or actors are trusted, irrespective of their location. Instead, all access is based upon a “need-to-know” philosophy and is enforced strictly. This even boils down to cutting off access to any network resource until the user is identified by the network and the need to access the requested resource is proven. Zero Trust Model shifts focus from securing just the network boundaries to securing the network endpoints, which implies a need for redesigning the network from the inside out.

Building a Zero Trust Model

The Zero Trust Model is vendor-agnostic and is built upon the following systems:

Micro-segmentation

Micro-segmentation is a granular approach of segregating the network according to workloads or applications. Virtualization solutions such as VMs and containers, cloud services, and Software Defined Networks (SDNs) are all part of the Micro-segmentation strategy. Being built onto the software, Micro-segmentation comes with an added benefit of reducing the management overhead of the ACLs or the security policies on the firewall.

Identity and Access Management (IAM)

The principle of least privilege should be the modus operandi to implement IAM systems for managing the access to all resources. Technologies such as Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Privileged Access Management (PAM) forms the core of any IAM system.

Log and Analyze Traffic

All traffic traversing through the network should be logged and analyzed. Security information and event management (SIEM) solutions can help easily corelate all the traffic and provide a centralized view to monitor the environment.

In today’s cyber world, it is only logical to assume that there is bound to be a network intrusion. It is not a matter of if; it’s only a matter of when. And when the inevitable occurs, micro-segmentation along with IAM can severely restrict the lateral movement of the intruder, while monitoring all the activities in the network can alert you to any unusual activity. The Zero Trust Model, thus, provides a secure framework to defend against data breaches or any advanced cyber threats.

Interested in learning more about other security tips? Check out this primer on EDR or endpoint detection and response. And learn more about the Managed Security options available from VPLS.

Read More from this Author

If you enjoyed this article, you'll probably like:

Mohamed Arab PR New Hire

Mohamed Arab Joins VPLS as VP of Cloud and Managed Services

The 20-year industry veteran will lead our growing engineering and services delivery team.

Published

Written by

Filed under

Mo Arab
Mohamed Arab, VP of Cloud and Managed Services

We are excited to announce that Mohamed Arab has joined VPLS in the role of Vice President of Cloud and Managed Services. In his new role, Mohamed will oversee the company’s strategic direction, operational management, and technical product innovation.

Prior to joining VPLS, Mohamed served as the Vice President of Technology at Hivelocity Hosting, a provider of cloud hosting, bare metal, and colocation services. During his tenure there, he grew the company’s West Coast business by fourfold. He was also similarly instrumental as the CTO at Rack Alley, a company which he founded, grew, and eventually divested in 2017. Mohamed brings decades of experience in the area of internet technologies, specifically design, security, support, and sales.

“I am thrilled at the opportunity to join the team,” said Mohamed Arab. “Having worked in the tech industry for more than 20 years, I’ve enjoyed tackling challenges that clients faced when it came to their IT projects. I look forward to working with my new team and delivering cutting-edge solutions and services to our clients as well as contributing to VPLS’s rapid growth.”

Read More from this Author

If you enjoyed this article, you'll probably like:

Scroll to Top