What Sets Us Apart
At Sun Management, our engineers and many of our long-term clients review prospective technologies in terms of whether they are 1) compelling and 2) practical & necessary. We define a product as “compelling” via a diagnosis of the technology and an assessment as to whether it has created a completely different “mouse trap” (think TESLA). A “practical & necessary” product refers to whether the marketplace is willing to pay the asking price, and whether the company and their technology are financially viable. Only after both of these conditions have been assessed and approved will Sun Management enter into a discussion about possible representation of a product suite.
Sun Management has made a conscious decision to limit our core product solutions to no more than 10 products. Representing a limited product suite forces us to be extremely diligent during our evaluation and selection process and also allows our engineers and sales force to be well-versed on the products we represent. We have no desire to be Walmart of networking.
Sun Management was founded in 2003 with the core belief that the most important asset of a company or salesperson is their product together with the engineering expertise and support provided for that product. Hence, Sun Management is purposely very discriminating and selective when choosing the products that we will represent.
Sun Management was the first VAR to bring Palo Alto Networks to the marketplace and we are proud to offer compelling and necessary solutions from all of our start-up partners. Our experience in training customers to become their own experts and to solve their own problems is key to our continued success.
Sun Management currently offers the following technology solutions:
Application Layer Firewall
The Palo Alto Networks products are the next generation firewalls, enabling organizations to accurately identify and control applications flowing in and out of a network. Based on an innovative traffic classification technology called Application Identification (App-ID ©), Palo Alto Networks products can accurately determine which applications are flowing across the network, irrespective of port, protocol, SSL encryption or evasive characteristic. Palo Alto Networks products also give customers the ability to identify Threats though Spyware, Malware, Vulnerability, and Anti-virus signatures. In addition, the devices also support URL filtering for complete control over malicious or unwanted network behavior.
Application Delivery Networking
The Thunder Series Advanced Traffic Manager family from A10 Networks is designed to meet the growing demands of Web sites, carriers and enterprises. The Thunder offers intelligent Layer 4 through 7 application processing capabilities with industry-leading performance and scalability to meet critical business requirements at competitive prices.
The Thunder Series’ unique Advanced Core Operating System (ACOS) offers true scalable performance. With rich Layer 7 features and its aFleX scripting language, the Thunder Series.
Appliance-based DNS SEC/ DHCP/ IP Address Management (IPAM)
Infoblox appliances deliver network identity services-including DNS, DHCP, IPAM, and File Transfer Services in reliable, secure, easy to deploy, manageable platforms. Infoblox ID Grids are created by linking appliances together across a distributed enterprise. The ID Grid is not a separate management and reporting application which overlays the individual appliances. Instead, devices within an ID Grid are linked using sophisticated distributed database technology embedded within each appliance. All traffic is encrypted via SSL VPN tunnels. This transforms the collection of appliances into a unified system with very unique and beneficial attributes. Additional services provide centralized time synchronization via Network Time Protocol (NTP), and file delivery services via TFTP, FTP, and HTTP, allowing devices such as phones, RFID readers, IP cameras, and others to receive up-to-date firmware, software, and configuration data.
The Infoblox Grid configuration addresses the basic problems and cost inefficiencies that remain unresolved when independent servers or appliances are deployed across a distributed enterprise. Namely, each server or appliance must be individually deployed, configured, managed and upgraded, and also each independent server or appliance cannot ensure the availability, accuracy and timeliness of network identity data. Individual servers or appliances: do not act as an integrated system, cannot offer high availability, are not robust enough in the face of network outages, increase the burden on IT staff, and fail to reduce Total Cost of Ownership.
High Performance Networking
A high-performance network is one that is fast, reliable, and secure at scale. The global infrastructure consists of rapidly increasing numbers of users and mobile device types. Multimedia applications, such as video, are placing unprecedented demands on the network and performance is the key to business success.
With Juniper Networks, customers are not forced to make sacrifices. Juniper delivers a high-performance network that enables the business, accelerating growth and innovation, while creating operational efficiencies and cost savings.
MX Series Ethernet Services Routers provide Ethernet switching capabilities without sacrificing carrier-class routing features. They offer high performance, high port-density routing and switching functionality for both service providers and enterprise networks.
EX Series Ethernet Switches deliver a scalable, compact, high-performance platform for supporting high-density data center, campus, and service provider deployments. The Virtual Chassis technology combines the availability and reliability of modular systems with the economics and flexibility of stackable switches.
SSL VPN appliances lead the market with their complete range of SSL VPN products packed with features and arranged in form factors that can be tailored to meet the remote-access needs of any size organization.
Cylance® is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Our technology is deployed on over four million endpoints and protects hundreds of enterprise clients worldwide including Fortune 100 organizations and government institutions.
Tanium is a systems management solution that provides instant visibility and allows enterprises to collect data and update machines in any sized network, in seconds. This powerful, yet simple-to-use solution can lead to benefits across numerous systems management capabilities including asset and software license management, outage management, patch management, unmanaged asset tracking, and more.
Cloud Networking Solutions
Arista Networks was founded to deliver software defined cloud networking solutions for large data center and high-performance computing environments. With more than one million cloud networking ports being deployed worldwide, Arista delivers a portfolio of 1/10/40 and 100 GbE capable products that redefine network architectures, bring extensibility to networking, and dramatically change the price/performance of data center networks.
At the core of Arista’s platform is the Extensible Operating System (EOS™), a ground-breaking network operating system with single-image consistency across hardware platforms, and modern core architecture enabling in-service upgrades and application extensibility.
Medical devices and SCADA/ICS systems present significant problems to network security with antiquated software and specialized communication. With the help of integration efforts by Palo Alto Networks and Aruba Networks, Sun Management can reduce the cyber attack surface. Combining the Device Fingerprinting and Network Access Control (NAC) capabilities of Aruba Networks ClearPass Policy Manager (CPPM) and the Next-Generation Firewall, IPS, and Application Visibility (App-ID) features of the Palo Alto Firewalls, administrators and security professionals can implement a Least Privilege, Zero Trust network security model to protect critical resources and avoid cyber attacks.
Security Analytics Platforms
- Access Analytics Platform (AAP): An Intelligent Access Technology that can Predict and Prevent Security Risks, Assist with High Privilege Access Monitoring, Compliance, and Intelligent Provisioning.
- Threat Analytics Platform (TAP): Intelligent User Behavior Analytics to Deter, Detect, and Block Insider Threats, Compromised Accounts and Fraud.
- Cloud Analytics Platform (CAP): Gain Full Visibility and Control Over Cloud Applications to Ensure Compliance, Access Governance and Monitor Insider Activity and get alerted on Anomalous Behaviors.
- Gurucul Risk Analytics (GRA): The most advanced User Behavior Analytics Platform that that provides near real-time contextual threat analytics for user’s & device’s access and activity for on premise and cloud applications
- Application Layer Firewalls
- Wireless Connectivity with control of applications and BYOD
- Data Center switching and routing with Software Defined Networking (SDN)
- Application Load Balancing-Global and Server for primary and DR provisioning
- Remote Access-employee and partner
- DNS, DHCP and IP Address Management
- Network Visibility Layers for advanced troubleshooting
Jim VanderzonFounder and Chief Executive Officer
Jim Vanderzon hated working as an engineer and, by his own account, was a terrible one. Unfortunately, he learned this information about himself the hard way after obtaining an ESM degree (Engineering Science and Mechanics) from Virginia Tech and moving to California to take a prestigious job working with Lockheed on the Hubble Telescope. His parents were so proud of their son until he let them down by quitting his job, moving back East and dabbling in a few different fields (while picking up a Masters in Economics from George Mason U.) before eventually landing a job in Sales with Alcatel. He was thrilled to find a career that combined his engineering background with his passion for a good argument—he got paid to argue for the advancement of technology! After working for others for several years, in 2003 he decided to strike out on his own and Sun Management was born. He started out making phone calls in his unheated garage, and over the years has built up an excellent team of sales, engineering and operations professionals who’ve made Sun Management the successful and trusted partner that so many clients rely on for their leading-edge security solutions.
(Bio composed by his loving wife.)Contact 202-588-2400 email address for Jim Vanderzon