What Sets Us Apart
At Sun Management, our engineers and many of our long-term clients review prospective technologies in terms of whether they are 1) compelling and 2) practical & necessary. We define a product as “compelling” via a diagnosis of the technology and an assessment as to whether it has created a completely different “mouse trap” (think TESLA). A “practical & necessary” product refers to whether the marketplace is willing to pay the asking price, and whether the company and their technology are financially viable. Only after both of these conditions have been assessed and approved will Sun Management enter into a discussion about possible representation of a product suite.
Sun Management has made a conscious decision to limit our core product solutions to no more than 10 products. Representing a limited product suite forces us to be extremely diligent during our evaluation and selection process and also allows our engineers and sales force to be well-versed on the products we represent. We have no desire to be Walmart of networking.
Sun Management was founded in 2003 with the core belief that the most important asset of a company or salesperson is their product together with the engineering expertise and support provided for that product. Hence, Sun Management is purposely very discriminating and selective when choosing the products that we will represent.
Sun Management was the first VAR to bring Palo Alto Networks to the marketplace and we are proud to offer compelling and necessary solutions from all of our start-up partners. Our experience in training customers to become their own experts and to solve their own problems is key to our continued success.
Sun Management currently offers the following technology solutions:
Application Layer Firewall
The Palo Alto Networks products are the next generation firewalls, enabling organizations to accurately identify and control applications flowing in and out of a network. Based on an innovative traffic classification technology called Application Identification App-ID©, Palo Alto Networks products can accurately determine which applications are flowing across the network, irrespective of port, protocol, SSL encryption or evasive characteristic. Palo Alto Networks products also give customers the ability to identify Threats though Spyware, Malware, Vulnerability, and Anti-virus signatures. In addition, the devices also support URL filtering for complete control over malicious or unwanted network behavior.
Data Backup/Recovery Management
Rubrik offers a converged appliance for data management (backup/recovery, replication, data archival, search, compliance) that has been battle-tested by the Fortune 500. Rubrik eliminates the need for backup software by integrating deduplicated storage, catalog management, and data orchestration into a single, scale-out fabric. www.rubrik.com
Medical devices and SCADA/ICS systems present significant problems to network security with antiquated software and specialized communication. With the help of integration efforts by Palo Alto Networks and Aruba Networks, Sun Management can reduce the cyber attack surface. Combining the Device Fingerprinting and Network Access Control (NAC) capabilities of Aruba Networks ClearPass Policy Manager (CPPM) and the Next-Generation Firewall, IPS, and Application Visibility (App-ID) features of the Palo Alto Firewalls, administrators and security professionals can implement a Least Privilege, Zero Trust network security model to protect critical resources and avoid cyber attacks.
Cylance is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Our technology is deployed on over four million endpoints and protects hundreds of enterprise clients worldwide including Fortune 100 organizations and government institutions.
Appliance-based DNS/ DHCP/ IP Address Management (DDI)
Infoblox appliances deliver network identity services-including DNS, DHCP, IPAM, and File Transfer Services in reliable, secure, easy to deploy, manageable platforms. Infoblox ID Grids are created by linking appliances together across a distributed enterprise. The ID Grid is not a separate management and reporting application which overlays the individual appliances. Instead, devices within an ID Grid are linked using sophisticated distributed database technology embedded within each appliance. All traffic is encrypted via SSL VPN tunnels. This transforms the collection of appliances into a unified system with very unique and beneficial attributes. Additional services provide centralized time synchronization via Network Time Protocol (NTP), and file delivery services via TFTP, FTP, and HTTP, allowing devices such as phones, RFID readers, IP cameras, and others to receive up-to-date firmware, software, and configuration data.
The Infoblox Grid configuration addresses the basic problems and cost inefficiencies that remain unresolved when independent servers or appliances are deployed across a distributed enterprise. Namely, each server or appliance must be individually deployed, configured, managed and upgraded, and also each independent server or appliance cannot ensure the availability, accuracy and timeliness of network identity data. Individual servers or appliances: do not act as an integrated system, cannot offer high availability, are not robust enough in the face of network outages, increase the burden on IT staff, and fail to reduce Total Cost of Ownership.
High Performance Networking
A high-performance network is one that is fast, reliable, and secure at scale. The global infrastructure consists of rapidly increasing numbers of users and mobile device types. Multimedia applications, such as video, are placing unprecedented demands on the network and performance is the key to business success.
With Juniper Networks, customers are not forced to make sacrifices. Juniper delivers a high-performance network that enables the business, accelerating growth and innovation, while creating operational efficiencies and cost savings.
MX Series Ethernet Services Routers provide Ethernet switching capabilities without sacrificing carrier-class routing features. They offer high performance, high port-density routing and switching functionality for both service providers and enterprise networks.
EX Series Ethernet Switches deliver a scalable, compact, high-performance platform for supporting high-density data center, campus, and service provider deployments. The Virtual Chassis technology combines the availability and reliability of modular systems with the economics and flexibility of stackable switches.
Application Delivery Networking
The Thunder Series Advanced Traffic Manager family from A10 Networks is designed to meet the growing demands of Web sites, carriers and enterprises. The Thunder offers intelligent Layer 4 through 7 application processing capabilities with industry-leading performance and scalability to meet critical business requirements at competitive prices.
The Thunder Series’ unique Advanced Core Operating System (ACOS) offers true scalable performance. With rich Layer 7 features and its aFleX scripting language, the Thunder Series.
Agentless security platform for the enterprise
Armis discovers all devices in your environment, analyzes their behavior to identify risks or attacks, and protects your critical business information automatically.
Through IoT devices, information is more accessible. The result is a more productive, more flexible workforce. We connect in the coffee shop as easily as the cubicle. But the infancy of the IoT Age has a fault; these devices are designed with connectivity first and security second. This means these devices are vulnerable. If the Mirai attack has taught us anything, it is that IoT devices can and will be leveraged for botnets, DDoS attacks, and cyber threats. A significant number of IoT devices exploited by Mirai were in businesses, that had no idea their devices had been compromised.
Using an agentless technology, Armis lets you see and control every device in your environment. It sees the connections those devices make. From a laptop to smart phone, smart TV, or Bluetooth headset, you can see a device, its connections, and determine if it’s behaving properly. If not, you can automatically remove it from the network.
Cloud Environment Supporting Highly Regulated Entities
ORock Technologies is a small business Infrastructure as a Service (IaaS) and Cloud Service Provider (CSP) serving organizations with the most stringent requirements for data security, performance, flexibility, compliance, and control. These include Independent Software Vendors (ISVs), IT solution providers, and enterprise customers in defense, federal government, financial services, healthcare, and other highly-regulated markets.
As a Red Hat Certified Cloud & Service Provider (CCSP), ORock operates a private, encrypted, carrier-grade fiber optic network and delivers a variety of IaaS and cloud solutions (ranging from dedicated hosting environments to private and multi-tenant open source clouds).
ORock products and services support the secure hosting and migration of applications and data; turnkey FedRAMP authorization; data storage, backup, and recovery; big data analytics; Software as a Service (SaaS) and Platform as a Service (PaaS); and Internet of Things (IoT) implementation.
Vulnerability and Risk Management
Kenna Security arms vulnerability and security managers with a technology platform that effectively combats risk. The Kenna Security Platform is a scalable, cloud-based solution that gives organizations of any size a centralized platform for collaboration and remediation against cyber risk. Powered by Cyber Risk Context Technology, the platform leverages data science to accurately track, measure and predict real-world exploit activity across the enterprise’s global attack surface. Kenna Security offers security and IT Operations a method to proactively manage the vulnerabilities within their organization.
Enterprise Data Cloud Storage
Pure Storage offers end-to-end data platforms – including FlashArray, FlashBlade and a converged offering with Cisco, FlashStack. This is powered by Pure’s software that’s cloud-connected for ease of management from any location. This is supported by Pure’s Evergreen business model. The company’s all-flash based technology drives business and IT transformation with storage solutions that are effortless, efficient and evergreen.
- Application Layer Firewalls
- Wireless Connectivity with control of applications and BYOD
- Data Center switching and routing with Software Defined Networking (SDN)
- Application Load Balancing-Global and Server for primary and DR provisioning
- Remote Access-employee and partner
- DNS, DHCP and IP Address Management
- Network Visibility Layers for advanced troubleshooting
Jim VanderzonFounder and Chief Executive Officer
Jim Vanderzon hated working as an engineer and, by his own account, was a terrible one. Unfortunately, he learned this information about himself the hard way after obtaining an ESM degree (Engineering Science and Mechanics) from Virginia Tech and moving to California to take a prestigious job working with Lockheed on the Hubble Telescope. His parents were so proud of their son until he let them down by quitting his job, moving back East and dabbling in a few different fields (while picking up a Masters in Economics from George Mason U.) before eventually landing a job in Sales with Alcatel. He was thrilled to find a career that combined his engineering background with his passion for a good argument—he got paid to argue for the advancement of technology! After working for others for several years, in 2003 he decided to strike out on his own and Sun Management was born. He started out making phone calls in his unheated garage, and over the years has built up an excellent team of sales, engineering and operations professionals who’ve made Sun Management the successful and trusted partner that so many clients rely on for their leading-edge security solutions.
(Bio composed by his loving wife.)Contact 202-588-2400