Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

of

Cdi federal 2019 Slide 1 Cdi federal 2019 Slide 2 Cdi federal 2019 Slide 3 Cdi federal 2019 Slide 4 Cdi federal 2019 Slide 5 Cdi federal 2019 Slide 6 Cdi federal 2019 Slide 7 Cdi federal 2019 Slide 8 Cdi federal 2019 Slide 9 Cdi federal 2019 Slide 10 Cdi federal 2019 Slide 11 Cdi federal 2019 Slide 12 Cdi federal 2019 Slide 13 Cdi federal 2019 Slide 14 Cdi federal 2019 Slide 15 Cdi federal 2019 Slide 16 Cdi federal 2019 Slide 17 Cdi federal 2019 Slide 18 Cdi federal 2019 Slide 19 Cdi federal 2019 Slide 20 Cdi federal 2019 Slide 21 Cdi federal 2019 Slide 22
Upcoming SlideShare
What to Upload to SlideShare
Next
Download to read offline and view in fullscreen.

0 Likes

Share

Download to read offline

Cdi federal 2019

Download to read offline

Communication Devices, Inc.

Direct "console access" to network routers, firewalls, servers and other systems infrastructure. Connection OUTSIDE the main network bandwidth – via traditional phone circuits, cellular wireless services or secondary private/public IP networks. Power control as necessary to restart or reboot attached components. Security restrictions to prevent outsiders from entering network via an out-of-band connection

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all
  • Be the first to like this

Cdi federal 2019

  1. 1. CDI Proprietary and Confidential © 2016 Communication Devices, Inc. CDI Proprietary and Confidential © 2016 Communication Devices, Inc. Communication Devices, Inc.
  2. 2.  Direct "console access" to network routers, firewalls, servers and other systems infrastructure  Connection OUTSIDE the main network bandwidth – via traditional phone circuits, cellular wireless services or secondary private/public IP networks  Power control as necessary to restart or reboot attached components  Security restrictions to prevent outsiders from entering network via an out-of-band connection
  3. 3.  Deploy built-in security, to eliminate dependency on the network or other systems for secure operation  Gain control over remote devices for deployment, configuration and management  Respond quickly to failure events, including underlying network failures  Simplify management of devices across large-scale networks for multiple administrators
  4. 4.  Port Authority 100 Series (PA-100) ◦ FIPS 140-2 validated and FISMA-high approved devices for government customers  Out-of-Band Manager (OBM) ◦ Multi-user, SQL-based management software for system configuration and secure administrator access
  5. 5.  FIPS 140-2 Validated  AES 256 CFB Encryption  Hardware Encryption Engine  Multiple SSH Sessions  Real Time Heartbeat  RADIUS, TACACS+, SNMP at NOC  On-board RSA SecurID authentication (secure access in the event of a network failure)  Wired / Wireless / Network connectivity options  OBM Enterprise Manager enabled
  6. 6.  Available for PA-100 and PA-200  Integrated or attached, depending on device model  Controlled via RJ-11 cable using TTL signals  One-for-one on any circuit to handle larger loads than power strip-type switch devices  10amp and 20amp versions 110/230v  Multiple international configuration options
  7. 7.  Remote control for restart or reboot of failed network devices  Power control modules may be integrated or added externally  International operability
  8. 8. 1 PORT 1 PORT 5 PORT 9 PORT
  9. 9.  System components (user interface, application server, SQL database) may be distributed across network  Security controls may be defined within OBM, or may use external authentication (RADIUS, TACACS+)  Administrative groups, customer sites, device profiles can be readily segregated and controlled  Successfully deployed across large-scale sites with multiple network managers and engineers
  10. 10.  U.S. Carriers managing Federal Government Agencies  Devices are deployed when turning up new sites  Devices are configured from OBM once installed  Devices are access by remote engineers to “Turn up” the site – config routers firewalls run tests etc..  Device are used when sites have issues and require OOB access.  Devices are used to power cycle network appliances
  11. 11.  Most new customer installs are LTE  All customers have at lease a small mix of analog devices where LTE service is not available at the exact location of the equipment.  We still ship a lot of analog only based devices based off of legacy government contracts  We expect these to eventually migrate to LTE once the government catches up
  12. 12.  Industry leader in Secure Out-of-Band Management for over 15 years, in business for over 35 years.  Multiple, large-scale device deployments for commercial, financial and government customers.  Pioneer in gaining government certifications for Secure Out-of-Band Management products.  Closely involved with NIST standards, active on the X9 committee that authored both FIPS-171 and FIPS-140.  All products manufactured and built in USA.
  13. 13.  Corporate HQ 85 Fulton Street Boonton, NJ 07005 973-334-1980 www.commdevices.com  Personal Contact Adam Cady 732-423-2000 adamcady@commdevices.com Thanks! We appreciate the opportunity to work with you.

Communication Devices, Inc. Direct "console access" to network routers, firewalls, servers and other systems infrastructure. Connection OUTSIDE the main network bandwidth – via traditional phone circuits, cellular wireless services or secondary private/public IP networks. Power control as necessary to restart or reboot attached components. Security restrictions to prevent outsiders from entering network via an out-of-band connection

Views

Total views

10,468

On Slideshare

0

From embeds

0

Number of embeds

10,370

Actions

Downloads

0

Shares

0

Comments

0

Likes

0

×