Author Archives for Scott Hermanson

About Scott Hermanson

Scott leads the national network and unified communication solutions team, which encompasses network cyber-defense technologies, transport systems and unified communication platforms.

Prior to joining RSM in 2003, Scott worked for a software company as a senior network engineer where he was responsible for the design and implementation of data and voice networks to support financial transactions in excess of over $1 million every minute and up to 800,000 online traders.

Scott also has an extensive background in network design and architecture. He has designed infrastructures to support both front and back-office financial transactions with a variety of firms.

Scott has great discipline in the field of network documentation and operational procedures. He has created web-based systems to capture network-based move, add and change requests, and a live documentation management system. He also has detailed experience for the implementation of network monitoring and management tools from a variety of vendors.

In order to accommodate government regulation of financial-based networks, Scott has designed networks for five nines of availability. During his employment with a software company, the core network designed by Scott was able to switch all 800,000 users and over a dozen back-end connections to a remote recovery facility in less than three minutes. Switching services to the remote facility was performed once per month to ensure clients of the business continuance plan.

COVID-19: Securing your employees’ remote access

,

COVID-19: Securing your employees’ remote access

- April 24, 2020

In a race to provide employees first-time remote access to systems and applications, it is imperative that security is not...

Read More

Dealing with remote network connectivity during COVID-19

,

Dealing with remote network connectivity during COVID-19

- April 21, 2020

COVID-19 (coronavirus) is forcing more employees to work remotely.  While many companies have remote access capabilities, they were never designed...

Read More

Risk Impact of SD-WAN to Financial Institutions

- March 21, 2019

Software-Defined Wide Area Networks (SD-WAN) are expected to have exponential adoption rates over the coming 18 months, as organizations look...

Read More

firewall security

Top 10 firewall assumptions that can cost you your job

- February 22, 2019

When (not if) your environment is breached and the forensics auditors are reviewing the environment, will they find you were...

Read More

Software Defined Wide Area Networking

What carriers don’t want you to know about SD-WAN

- February 17, 2019

Software Defined Wide Area Networking (SD-WAN) is the next generation of WAN technologies to provide connectivity between people and applications....

Read More

Wireless Guest Access – Not as easy as you may think

Wireless Guest Access – Not as easy as you may think

- April 30, 2015

Businesses and organizations of all types are deploying wireless access for their guests.  Coffee shops, schools, libraries, shopping centers, restaurants,...

Read More

Prevent security breach if credentials are stolen

Prevent security breach if credentials are stolen

- December 10, 2014

The headlines for 2014 were full of incidents involving stolen credentials. One of the bigger headlines involved a Russian crime...

Read More

Multi-Vendor Networks: More Secure or More Risk?

Multi-Vendor Networks: More Secure or More Risk?

- November 10, 2013

Clients often ask if it would be wise to diversify their network components for fear a single code vulnerability could...

Read More

Security through Segmentation: Reducing Scope, Risks and Costs

Security through Segmentation: Reducing Scope, Risks and Costs

- November 10, 2013

I recently saw an episode from one of those “caught on camera” television series that featured a group of thieves...

Read More

The Evolution of the Firewall, Why You Need a Next Generation Firewall

The Evolution of the Firewall, Why You Need a Next Generation Firewall

- July 30, 2013

As security threats continue to evolve, we must ensure our defense strategies are keeping pace.  One important element of most...

Read More

Receive Posts by Email

Subscribe and receive notifications of new posts by email.