What Sets Us Apart
At Sun Management, our engineers and many of our long-term clients review prospective technologies in terms of whether they are 1) compelling and 2) practical & necessary. We define a product as “compelling” via a diagnosis of the technology and an assessment as to whether it has created a completely different “mouse trap” (think TESLA). A “practical & necessary” product refers to whether the marketplace is willing to pay the asking price, and whether the company and their technology are financially viable. Only after both of these conditions have been assessed and approved will Sun Management enter into a discussion about possible representation of a product suite.
Sun Management has made a conscious decision to limit our core product solutions to no more than 10 products. Representing a limited product suite forces us to be extremely diligent during our evaluation and selection process and also allows our engineers and sales force to be well-versed on the products we represent. We have no desire to be Walmart of networking.
Sun Management was founded in 2003 with the core belief that the most important asset of a company or salesperson is their product together with the engineering expertise and support provided for that product. Hence, Sun Management is purposely very discriminating and selective when choosing the products that we will represent.
Sun Management was the first VAR to bring Palo Alto Networks to the marketplace and we are proud to offer compelling and necessary solutions from all of our start-up partners. Our experience in training customers to become their own experts and to solve their own problems is key to our continued success.
Sun Management currently offers the following technology solutions:
Application Layer Firewall
The Palo Alto Networks products are the next generation firewalls, enabling organizations to accurately identify and control applications flowing in and out of a network. Based on an innovative traffic classification technology called Application Identification App-ID©, Palo Alto Networks products can accurately determine which applications are flowing across the network, irrespective of port, protocol, SSL encryption or evasive characteristic. Palo Alto Networks products also give customers the ability to identify Threats though Spyware, Malware, Vulnerability, and Anti-virus signatures. In addition, the devices also support URL filtering for complete control over malicious or unwanted network behavior.
Data Backup/Recovery Management
Rubrik offers a converged appliance for data management (backup/recovery, replication, data archival, search, compliance) that has been battle-tested by the Fortune 500. Rubrik eliminates the need for backup software by integrating deduplicated storage, catalog management, and data orchestration into a single, scale-out fabric. www.rubrik.com
Secure Network Access Control
Arubas NAC solution, ClearPass, provides a single RADIUS-based security and verification point for all your wired and wireless networks, applications, IoT devices, employee, contractor and guest devices. Aruba ClearPass allows organizations to create, define and enforce a consistent access policy of what can connect to which elements of the enterprise, based on the type of device, who is using it, where and when it is being used, the type of connection and its health status.
Enterprise Data Flow Tracing
Cyberhaven Lightbeam automatically traces all of your data as it moves through your enterprise in real time, on prem and in the cloud; enabling you to search, navigate, and control the flows of data as easily as finding your way around city streets with a GPS. Lightbeam, can trace unstructured and semi-structured data completely automatically, recording traces of all data and making it easily searchable when you need it.
These capabilities help you to comply with privacy regulations like GDPR and frameworks like NIST and ISO, manage data risks, and prevent accidental and malicious data leakage by employees
Appliance-based DNS/ DHCP/ IP Address Management (DDI)
Infoblox appliances deliver network identity services-including DNS, DHCP, IPAM, and File Transfer Services in reliable, secure, easy to deploy, manageable platforms. Infoblox ID Grids are created by linking appliances together across a distributed enterprise. The ID Grid is not a separate management and reporting application which overlays the individual appliances. Instead, devices within an ID Grid are linked using sophisticated distributed database technology embedded within each appliance. All traffic is encrypted via SSL VPN tunnels. This transforms the collection of appliances into a unified system with very unique and beneficial attributes. Additional services provide centralized time synchronization via Network Time Protocol (NTP), and file delivery services via TFTP, FTP, and HTTP, allowing devices such as phones, RFID readers, IP cameras, and others to receive up-to-date firmware, software, and configuration data.
The Infoblox Grid configuration addresses the basic problems and cost inefficiencies that remain unresolved when independent servers or appliances are deployed across a distributed enterprise. Namely, each server or appliance must be individually deployed, configured, managed and upgraded, and also each independent server or appliance cannot ensure the availability, accuracy and timeliness of network identity data. Individual servers or appliances: do not act as an integrated system, cannot offer high availability, are not robust enough in the face of network outages, increase the burden on IT staff, and fail to reduce Total Cost of Ownership.
High Performance Networking
A high-performance network is one that is fast, reliable, and secure at scale. The global infrastructure consists of rapidly increasing numbers of users and mobile device types. Multimedia applications, such as video, are placing unprecedented demands on the network and performance is the key to business success.
With Juniper Networks, customers are not forced to make sacrifices. Juniper delivers a high-performance network that enables the business, accelerating growth and innovation, while creating operational efficiencies and cost savings.
MX Series Ethernet Services Routers provide Ethernet switching capabilities without sacrificing carrier-class routing features. They offer high performance, high port-density routing and switching functionality for both service providers and enterprise networks.
EX Series Ethernet Switches deliver a scalable, compact, high-performance platform for supporting high-density data center, campus, and service provider deployments. The Virtual Chassis technology combines the availability and reliability of modular systems with the economics and flexibility of stackable switches.
Next-Generation Web Security
Detection-based approaches do not protect against modern-day attacks. But Menlo Securitys new approach to web protection — isolation — does. Rather than distinguishing between safe and malicious web traffic, Menlo Security simply isolates all web activity on an always-on pool of secure web browsers delivering a seamless browsing experience. With nothing being executed on users devices, there is no risk of malware. And with no endpoint software from a web security solution to install or manage, there is no admin overhead.
Agentless security platform for the enterprise
Armis discovers all devices in your environment, analyzes their behavior to identify risks or attacks, and protects your critical business information automatically.
Through IoT devices, information is more accessible. The result is a more productive, more flexible workforce. We connect in the coffee shop as easily as the cubicle. But the infancy of the IoT Age has a fault; these devices are designed with connectivity first and security second. This means these devices are vulnerable. If the Mirai attack has taught us anything, it is that IoT devices can and will be leveraged for botnets, DDoS attacks, and cyber threats. A significant number of IoT devices exploited by Mirai were in businesses, that had no idea their devices had been compromised.
Using an agentless technology, Armis lets you see and control every device in your environment. It sees the connections those devices make. From a laptop to smart phone, smart TV, or Bluetooth headset, you can see a device, its connections, and determine if it’s behaving properly. If not, you can automatically remove it from the network.
Cloud Environment Supporting Highly Regulated Entities
ORock Technologies is a small business Infrastructure as a Service (IaaS) and Cloud Service Provider (CSP) serving organizations with the most stringent requirements for data security, performance, flexibility, compliance, and control. These include Independent Software Vendors (ISVs), IT solution providers, and enterprise customers in defense, federal government, financial services, healthcare, and other highly-regulated markets.
As a Red Hat Certified Cloud & Service Provider (CCSP), ORock operates a private, encrypted, carrier-grade fiber optic network and delivers a variety of IaaS and cloud solutions (ranging from dedicated hosting environments to private and multi-tenant open source clouds).
ORock products and services support the secure hosting and migration of applications and data; turnkey FedRAMP authorization; data storage, backup, and recovery; big data analytics; Software as a Service (SaaS) and Platform as a Service (PaaS); and Internet of Things (IoT) implementation.
Traditional WLAN platforms are over fifteen years old, leveraging monolithic code bases that are expensive to scale, prone to bugs, and difficult to manage. They are not equipped for the scale and complexity of todays mobile users, and do not provide the reliability needed for business-critical wireless operations.
With a modern microservices cloud architecture, Mist delivers unprecedented scale and agility, and offers groundbreaking subscription services for Wi-Fi assurance, AI-driven assistance, user engagement, and asset visibility. Mist has an inline AI engine for unprecedented insight and automation. And enterprise-grade Access Points combine Wi-Fi, BLE and IoT for amazing wireless experiences in a cost-effective manner.
Enterprise Data Cloud Storage
Pure Storage offers end-to-end data platforms – including FlashArray, FlashBlade and a converged offering with Cisco, FlashStack. This is powered by Pure’s software that’s cloud-connected for ease of management from any location. This is supported by Pure’s Evergreen business model. The company’s all-flash based technology drives business and IT transformation with storage solutions that are effortless, efficient and evergreen.
- Application Layer Firewalls
- Wireless Connectivity with control of applications and BYOD
- Data Center switching and routing with Software Defined Networking (SDN)
- Application Load Balancing-Global and Server for primary and DR provisioning
- Remote Access-employee and partner
- DNS, DHCP and IP Address Management
- Network Visibility Layers for advanced troubleshooting
Jim VanderzonFounder and Chief Executive Officer
Jim Vanderzon hated working as an engineer and, by his own account, was a terrible one. Unfortunately, he learned this information about himself the hard way after obtaining an ESM degree (Engineering Science and Mechanics) from Virginia Tech and moving to California to take a prestigious job working with Lockheed on the Hubble Telescope. His parents were so proud of their son until he let them down by quitting his job, moving back East and dabbling in a few different fields (while picking up a Masters in Economics from George Mason U.) before eventually landing a job in Sales with Alcatel. He was thrilled to find a career that combined his engineering background with his passion for a good argument—he got paid to argue for the advancement of technology! After working for others for several years, in 2003 he decided to strike out on his own and Sun Management was born. He started out making phone calls in his unheated garage, and over the years has built up an excellent team of sales, engineering and operations professionals who’ve made Sun Management the successful and trusted partner that so many clients rely on for their leading-edge security solutions.
(Bio composed by his loving wife.)Contact 202-588-2400