Author Archives for Scott Hermanson
About Scott Hermanson
Scott leads the national network and unified communication solutions team, which encompasses network cyber-defense technologies, transport systems and unified communication platforms.
Prior to joining RSM in 2003, Scott worked for a software company as a senior network engineer where he was responsible for the design and implementation of data and voice networks to support financial transactions in excess of over $1 million every minute and up to 800,000 online traders.
Scott also has an extensive background in network design and architecture. He has designed infrastructures to support both front and back-office financial transactions with a variety of firms.
Scott has great discipline in the field of network documentation and operational procedures. He has created web-based systems to capture network-based move, add and change requests, and a live documentation management system. He also has detailed experience for the implementation of network monitoring and management tools from a variety of vendors.
In order to accommodate government regulation of financial-based networks, Scott has designed networks for five nines of availability. During his employment with a software company, the core network designed by Scott was able to switch all 800,000 users and over a dozen back-end connections to a remote recovery facility in less than three minutes. Switching services to the remote facility was performed once per month to ensure clients of the business continuance plan.
COVID-19: Securing your employees’ remote access
In a race to provide employees first-time remote access to systems and applications, it is imperative that security is not...
Dealing with remote network connectivity during COVID-19
COVID-19 (coronavirus) is forcing more employees to work remotely. While many companies have remote access capabilities, they were never designed...
Risk Impact of SD-WAN to Financial Institutions
Software-Defined Wide Area Networks (SD-WAN) are expected to have exponential adoption rates over the coming 18 months, as organizations look...
Top 10 firewall assumptions that can cost you your job
When (not if) your environment is breached and the forensics auditors are reviewing the environment, will they find you were...
What carriers don’t want you to know about SD-WAN
Software Defined Wide Area Networking (SD-WAN) is the next generation of WAN technologies to provide connectivity between people and applications....
Wireless Guest Access – Not as easy as you may think
Businesses and organizations of all types are deploying wireless access for their guests. Coffee shops, schools, libraries, shopping centers, restaurants,...
Prevent security breach if credentials are stolen
The headlines for 2014 were full of incidents involving stolen credentials. One of the bigger headlines involved a Russian crime...
Multi-Vendor Networks: More Secure or More Risk?
Clients often ask if it would be wise to diversify their network components for fear a single code vulnerability could...
Security through Segmentation: Reducing Scope, Risks and Costs
I recently saw an episode from one of those “caught on camera” television series that featured a group of thieves...
The Evolution of the Firewall, Why You Need a Next Generation Firewall
As security threats continue to evolve, we must ensure our defense strategies are keeping pace. One important element of most...