ProtonVPN iOS app now supports the OpenVPN protocol

Your ProtonVPN iOS app is now better equipped to fight censorship and offers more flexible connection options with the launch of OpenVPN for iOS. The OpenVPN protocol is one of the best VPN protocols because of its flexibility, security, and because it is more resistant to blocks. You now have the option to switch between the faster IKEv2 protocol and the more stable and censorship-resistant OpenVPN protocol.

Spotlight

Momentum Protocol

The standard protocol for blockchain loyalty programs. Momentum is a blockchain based resolution to maximise the loyalty opportunity. Momentum protocol is set to revolutionise the world of marketing and customer loyalty.Redefining the way companies build and manage relationships with their customers.Launching the world’s first blockchain-based, marketing automation and loyalty rewards middleware.

OTHER ARTICLES
Virtual Desktop Tools, Server Hypervisors

Rising Importance of Network Virtualization

Article | June 8, 2023

Network virtualization combines network resources to integrate several physical networks, segment a network, or construct software networks among VMs. IT teams can construct numerous separate virtual networks using network virtualization. Virtual networks can be added and scaled without changing hardware. Teams can start up logical networks more rapidly in response to business needs using network virtualization. This adaptability improves service delivery, efficiency, and control. Importance of Network Virtualisation Network virtualization entails developing new rules for the delivery of network services. This involves software-defined data centers (SDDC), cloud computing, and edge computing. Virtualization assists in the transformation of networks from rigid, wasteful, and static to optimized, agile, and dynamic. To ensure agility and speed, modern virtual networks must keep up with the needs of cloud-hosted, decentralized applications while addressing cyberthreats. You can deploy and upgrade programs in minutes thanks to network virtualization. This eliminates the need to spend time setting up the infrastructure to accommodate the new applications. What is the Process of Network Virtualization? Several network functions that were previously done manually on hardware are now automated through network virtualisation. Network managers can construct, maintain, and provide networks programmatically in software while employing the hardware as a packet-forwarding backplane. Physical network resources, such as virtual private networks (VPNs), load balancing, firewalling, routing, and switching, are pooled and supplied in software. To do this, you merely require Internet Protocol (IP) packet forwarding from the hardware or physical network. Individual workloads, such as virtual machines, can access network services that have been distributed to a virtual layer. There are several kinds of virtual machines accessible. The finest virtual machines enable network administrators to access all parts of a network from a single point of access. Closing Lines Network virtualization will remain a critical component in both business and carrier network architectures. Network virtualization projects in the future will inevitably incorporate zero trust, automation, and edge and cloud computing.

Read More
Virtual Desktop Tools, Server Hypervisors

Network Virtualization: The Future of Businesses and Networks

Article | April 28, 2023

Network virtualization has emerged as the widely recommended solution for the networking paradigm's future. Virtualization has the potential to revolutionize networks in addition to providing a cost-effective, flexible, and secure means of communication. Network virtualization isn't an all-or-nothing concept. It can help several organizations with differing requirements, or it can provide a bunch of new advantages for a single enterprise. It is the process of combining a network's physical hardware into a single, virtual network. This is often accomplished by running several virtual guest machines in software containers on a single physical host system. Network virtualization is indeed the new gold standard for networking, and it is being embraced by enterprises of all kinds globally. By integrating their current network gear into a single virtual network, businesses can reduce operating expenses, automate network and security processes, and lay the groundwork for future growth. Network virtualization also enables organizations to simulate traditional hardware like servers, storage devices, and network resources. The physical network performs basic tasks like packet forwarding, while virtual versions handle more complex activities like networking service management and deployment. Addressing Network Virtualization Challenges Surprisingly, IT teams might encounter network virtualization challenges that are both technical and non-technical in nature. Let's look at some common challenges and discuss how to overcome them. Change in Network Architecture Practically, the first big challenge is shifting from an architecture that depends heavily on routers, switches, and firewalls. Instead, these services are detached from conventional hardware and put on hypervisors that virtualize these operations. Virtualized network services are shared, scaled, and moved as required. Migrating current LANs and data centers to a virtualized platform require careful planning. This migration involves the following tasks: Determine how much CPU, computation, and storage resources will be required to run virtualized network services. Determine the optimal approach for integrating network resilience and security services. Determine how the virtualized network services will be implemented in stages to avoid disrupting business operations. The key to a successful migration is meticulous preparation by architects who understand the business's network requirements. This involves a thorough examination of existing apps and services, as well as a clear knowledge of how data should move across the company most effectively. Moreover, a progressive approach to relocation is often the best solution. In this instance, IT teams can make changes to the virtualization platform without disrupting the whole corporate network. Network Visibility Network virtualization has the potential to considerably expand the number of logical technology layers that must collaborate. As a result, traditional network and data center monitoring technologies no longer have insight into some of these abstracted levels. In other circumstances, visibility can be established, but the tools fail to show the information correctly so that network operators can understand it. In either case, deploying and managing modern network visibility technologies is typically the best choice. When an issue arises, NetOps personnel are notified of the specific service layer. Automation and AI The enhanced level of automation and self-service operations that can be built into a platform is a fundamental aspect of network virtualization. While these activities can considerably increase the pace of network upgrades while decreasing management overhead, they need the documentation and implementation of a new set of standards and practices. Understand that prior network architectures were planned and implemented utilizing actual hardware appliances on a hop-by-hop basis. A virtualized network, on the other hand, employs a centralized control plane to govern and push policies to all sections of the network. Changes may occur more quickly in this aspect, but various components must be coordinated to accomplish their roles in harmony. As a result, network teams should move their attention away from network operations that are already automated. Rather, their new responsibility is to guarantee that the core automation processes and AI are in sync in order to fulfill those automated tasks. Driving Competitive Edge with Network Virtualization Virtualization in networking or virtual machines within an organization is not a new trend. Even small and medium businesses have realized the benefits of network virtualization, especially when combined with a hosted cloud service provider. Because of this, the demand for enterprise network virtualization is rising, driving higher end-user demands and the proliferation of devices and business tools. These network virtualization benefits can help boost business growth and gain a competitive edge. Gaining a Competitive Edge: Network Virtualization Benefits Cost-Savings on Hardware Faster Desktop and Server Provisioning and Deployment Improved Data Security and Disaster Recovery Increasing IT Operational Efficiency Small Footprint and Energy Saving Network Virtualization: The Path to Digital Transformation Business is at the center of digital transformation, but technology is needed to make it happen. Integrated clouds, highly modern data centers, digital workplaces, and increased data center security are all puzzle pieces, and putting them all together requires a variety of various products and services that are deployed cohesively. The cloud revolution is still having an influence on IT, transforming how digital content is consumed and delivered. This should come as no surprise that such a shift has influenced how we feel about current networking. When it boils down to it, the purpose of digital transformation for every company, irrespective of industry, is the same: to boost the speed with which you can respond to market changes and evolving business needs; to enhance your ability to embrace and adapt to new technology, and to improve overall security. As businesses realize that the underlying benefit of cloud adoption and enhanced virtualization isn't simply about cost savings, digital strategies are evolving, becoming more intelligent and successful in the process. Network virtualization is also a path toward the smooth digital transformation of any business. How does virtualization help in accelerating digital transformation? Combining public and private clouds, involving hardware-based computing, storage, and networking software definition. A hyper-converged infrastructure that integrates unified management with virtualized computing, storage, and networking could be included. Creating a platform for greater productivity by providing the apps and services consumers require when and when they utilize them. This should include simplifying application access and administration as well as unifying endpoint management. Improving network security and enhancing security flexibility to guarantee that quicker speed to market is matched by tighter security. Virtualization will also help businesses to move more quickly and safely, bringing products—and profits—to market faster. Enhancing Security with Network Virtualization Security has evolved as an essential component of every network architecture. However, since various areas of the network are often segregated from one another, it might be challenging for network teams to design and enforce network virtualization security standards that apply to the whole network. Zero trust can integrate such network parts and their accompanying virtualization activities. Throughout the network, the zero-trust architecture depends on the user and device authentication. If LAN users wish to access data center resources, they must first be authenticated. The secure connection required for endpoints to interact safely is provided by a zero-trust environment paired with network virtualization. To facilitate these interactions, virtual networks can be ramped up and down while retaining the appropriate degree of traffic segmentation. Access policies, which govern which devices can connect with one another, are a key part of this process. If a device is allowed to access a data center resource, the policy should be understood at both the WAN and campus levels. Some of the core network virtualization security features are: Isolation and multitenancy are critical features of network virtualization. Segmentation is related to isolation; however it is utilized in a multitier virtual network. A network virtualization platform's foundation includes firewalling technologies that enable segmentation inside virtual networks. Network virtualization enables automatic provisioning and context-sharing across virtual and physical security systems. Investigating the Role of Virtualization in Cloud Computing Virtualization in the cloud computing domain refers to the development of virtual resources (such as a virtual server, virtual storage device, virtual network switch, or even a virtual operating system) from a single resource of its type that also shows up as several personal isolated resources or environments that users can use as a separate individual physical resource. Virtualization enables the benefits of cloud computing, such as ease of scaling up, security, fluid or flexible resources, and so on. If another server is necessary, a virtual server will be immediately created, and a new server will be deployed. When we need more memory, we increase the virtual server configurations we currently have, and we now have the extra RAM we need. As a result, virtualization is the underlying technology of the cloud computing business model. The Benefits of Virtualization in Cloud Computing: Efficient hardware utilization Virtualization improves availability Disaster recovery is quick and simple Energy is saved by virtualization Setup is quick and simple Cloud migration has become simple Motivating Factors for the Adoption of Network Virtualization Demand for enterprise networks continues to climb, owing to rising end-user demands and the proliferation of devices and business software. Thanks to network virtualization, IT companies are gaining the ability to respond to shifting demands and match their networking capabilities with their virtualized storage and computing resources. In fact, according to a recent SDxCentral report, 88% of respondents believe it is "important" or "mission critical" to implement a network virtualization software over the next two to five years. Virtualization is also an excellent alternative for businesses that employ outsourced IT services, are planning mergers or acquisitions or must segregate IT teams owing to regulatory compliance. Reasons to Adopt Network Virtualization: A Business Needs Speed Security Requirements Are Rising Apps can Move Around Micro-segmentation IT Automation and Orchestration Reduce Hardware Dependency and CapEx: Adopt Multi-Tenancy Cloud Disaster Recovery mproved Scalability Wrapping-Up Network virtualization and cloud computing are emerging technologies of the future. As CIOs get actively involved in organizational systems, these new concepts will be implemented in more businesses. As consumer demand for real-time services expands, businesses will be driven to explore network virtualization as the best way to take their networks to the next level. The networking future is here. FAQ Why is network virtualization important for business? By integrating their current network gear into a single virtual network, businesses can reduce operating expenses, automate network and security processes, and set the stage for future growth. Where is network virtualization used? Network virtualization can be utilized in application development and testing to simulate hardware and system software realistically. Network virtualization in application performance engineering allows for the modeling of connections among applications, services, dependencies, and end users for software testing. How does virtualization work in cloud computing? Virtualization, in short, enables cloud providers to provide users alongside existing physical computer infrastructure. As a simple and direct process, it allows cloud customers to buy only the computing resources they require when they want them and to maintain those resources cost-effectively as the demand grows.

Read More
Server Hypervisors

Virtual Machine Security Risks and Mitigation in Cloud Computing

Article | September 9, 2022

Analyzing risks and implementing advanced mitigation strategies: Safeguard critical data, fortify defenses, and stay ahead of emerging threats in the dynamic realm of virtual machines in cloud. Contents 1. Introduction 2. 10 Security Risks Associated with Virtual Machines in Cloud Computing 3. Best Practices to Avoid Security Compromise 4. Conclusion 1. Introduction Cloud computing has revolutionized the way businesses operate by providing flexible, scalable, and cost-effective infrastructure for running applications and services. Virtual machines (VMs) are a key component of cloud computing, allowing multiple virtual machines to run on a single physical machine. However, the use of virtual machines in cloud computing introduces new security risks that need to be addressed to ensure the confidentiality, integrity, and availability of data and services. Effective VM security in the cloud requires a comprehensive approach that involves cloud providers and users working together to identify and address potential virtual machine security threats. By implementing these best practices and maintaining a focus on security, cloud computing can provide a secure and reliable platform for businesses to run their applications and services. 2. 10 Security Risks Associated with Virtual Machines in Cloud Computing Denial of Service (DoS) attacks: These are attacks that aim to disrupt the availability of a VM or the entire cloud infrastructure by overwhelming the system with traffic or resource requests. Insecure APIs: Cloud providers often expose APIs that allow users to manage their VMs. If these APIs are not properly secured, attackers can exploit them to gain unauthorized access to VMs or manipulate their configurations. Data leakage: Virtual machines can store sensitive data such as customer information or intellectual property. If not secured, this data can be exposed to unauthorized access or leakage. Shared resources: VMs in cloud environments often share physical resources such as memory, CPU, and network interfaces. If these resources are not isolated, a compromised VM can potentially affect the security and performance of other VMs running on the same physical host. Lack of visibility: Virtual machines in cloud environments can be more difficult to monitor than physical machines. This can make it harder to detect security incidents or anomalous behavior. Insufficient logging and auditing: If cloud providers do not implement appropriate logging and auditing mechanisms, it can be difficult to determine the cause and scope of a security incident. VM escape: This is when an attacker gains access to the hypervisor layer and then escapes into the host operating system or other VMs running on the same physical host. Side-channel attacks: This is when an attacker exploits the physical characteristics of the hardware to gain unauthorized access to a VM. Examples of side-channel attacks include timing attacks, power analysis attacks, and electromagnetic attacks. Malware attacks: VMs can be infected with malware, just like physical machines. Malware can be used to steal data, launch attacks on other VMs or systems, or disrupt the functioning of the VM. Insider threats: Malicious insiders can exploit their access to VMs to steal data, modify configurations, or launch attacks. 3. Best Practices to Avoid Security Compromise To mitigate these risks, there are several virtual machine security guidelines that cloud service providers and users can follow: Keep software up-to-date: Regularly updating software and security patches for virtual machines is crucial in preventing known vulnerabilities from being exploited by hackers. Software updates fix bugs and security flaws that could allow unauthorized access, data breaches, or malware attacks. According to a study, 60% of data breaches are caused by vulnerabilities that were not patched or updated in a timely manner.(Source: Ponemon Institute) Use secure hypervisors: A hypervisor is a software layer that enables multiple virtual machines to run on a single physical server. Secure hypervisors are designed to prevent unauthorized access to virtual machines and protect them from potential security threats. When choosing a hypervisor, it is important to select one that has undergone rigorous testing and meets industry standards for security. In 2018, a group of researchers discovered a new type of attack called "Foreshadow" (also known as L1 Terminal Fault). The attack exploits vulnerabilities in Intel processors and can be used to steal sensitive data from virtual machines running on the same physical host. Secure hypervisors that have implemented hardware-based security features can provide protection against Foreshadow and similar attacks. (Source: Foreshadow) Implement strong access controls: Access control is the practice of restricting access to virtual machines to authorized users. Multi-factor authentication adds an extra layer of security by requiring users to provide more than one type of authentication method before accessing VMs. Strong access controls limit the risk of unauthorized access and can help prevent data breaches. According to a survey, organizations that implemented multi-factor authentication saw a 98% reduction in the risk of phishing-related account breaches. (Source: Duo Security) Monitor VMs for anomalous behavior: Monitoring virtual machines for unusual or unexpected behavior is an essential security practice. This includes monitoring network traffic, processes running on the VM, and other metrics that can help detect potential security incidents. By monitoring VMs, security teams can detect and respond to security threats before they can cause damage. A study found that 90% of organizations that implemented a virtualized environment experienced security benefits, such as improved visibility into security threats and faster incident response times. (Source: VMware) Use Encryption: Encryption is the process of encoding information in such a way that only authorized parties can access it. Encrypting data both in transit and at rest protects it from interception or theft by hackers. This can be achieved using industry-standard encryption protocols and technologies. According to a report by, the average cost of a data breach in 2020 was $3.86 million. The report also found that organizations that implemented encryption had a lower average cost of a data breach compared to those that did not (Source: IBM) Segregate VMs: Segregating virtual machines is the practice of keeping sensitive VMs separate from less sensitive ones. This reduces the risk of lateral movement, which is when a hacker gains access to one VM and uses it as a stepping stone to gain access to other VMs in the same environment. Segregating VMs helps to minimize the risk of data breaches and limit the potential impact of a security incident. A study found that organizations that implemented a virtualized environment without adequate segregation and access controls were more vulnerable to VM security breaches and data loss. (Source: Ponemon Institute) Regularly Back-up VMs: Regularly backing up virtual machines is a critical security practice that can help mitigate the impact of malware attacks, system failures, or other security incidents. Backups should be stored securely and tested regularly to ensure that they can be restored quickly in the event of a security incident. A survey conducted found that 42% of organizations experienced a data loss event in 2020 with the most common cause being accidental deletion by an employee (29%). (Source: Veeam) 4. Conclusion The complexity of cloud environments and the shared responsibility model for security require organizations to adopt a comprehensive security approach that spans multiple infrastructure layers, from the physical to the application layer. The future of virtual machine security concern in cloud computing will require continued innovation and adaptation to new threats and vulnerabilities. As a result, organizations must remain vigilant and proactive in their security efforts, leveraging the latest technologies and best practices to protect their virtual machines, the sensitive data and resources they contain.

Read More
VMware

VMware NSX 3.2 Delivers New, Advanced Security Capabilities

Article | December 7, 2021

It’s an impactful release focused on significant NSX Security enhancements Putting a hard shell around a soft core is not a recipe for success in security, but somehow legacy security architectures for application protection have often looked exactly like that: a hard perimeter firewall layer for an application infrastructure that was fundamentally not built with security as a primary concern. VMware NSX Distributed Firewall pioneered the micro-segmentation concept for granular access controls for cloud applications with the initial launch of the product in 2013. The promise of Zero Trust security for applications, the simplicity of deployment of the solution, and the ease of achieving internal security objectives made NSX an instant success for security-sensitive customers. Our newest release — NSX-T 3.2 — establishes a new marker for securing application infrastructure by introducing significant new features to identify and respond to malware and ransomware attacks in the network, to enhance user identification and L7 application identification capabilities, and, at the same time, to simplify deployment of the product for our customers. Modern day security teams need to secure mission-critical infrastructure from both external and internal attacks. By providing unprecedented threat visibility leveraging IDS, NTA, and Network Detection and Response (NDR) capabilities along with granular controls leveraging L4-L7 Firewall, IPS, and Malware Prevention capabilities, NSX 3.2 delivers an incredible security solution for our customers“ Umesh Mahajan, SVP, GM (Networking and Security Business Unit) Distributed Advanced Threat Prevention (ATP) Attackers often use multiple sophisticated techniques to penetrate the network, move laterally within the network in a stealthy manner, and exfiltrate critical data at an appropriate time. Micro-segmentation solutions focused solely on access control can reduce the attack surface — but cannot provide the detection and prevention technologies needed to thwart modern attacks. NSX-T 3.2 introduces several new capabilities focused on detection and prevention of attacks inside the network. Of critical note is that these advanced security solutions do not need network taps, separate monitoring networks, or agents inside each and every workload. Distributed Malware Prevention Lastline’s highly reputed dynamic malware technology is now integrated with NSX Distributed Firewall to deliver an industry-first Distributed Malware Prevention solution. Leveraging the integration with Lastline, a Distributed Firewall embedded within the hypervisor kernel can now identify both “known malicious” as well as “zero day” malware Distributed Behavioral IDS Whereas earlier versions of NSX Distributed IDPS (Intrusion Detection and Prevention System) delivered primarily signature-based detection of intrusions, NSX 3.2 introduces “behavioral” intrusion detection capabilities as well. Even if specific IDS signatures are not triggered, this capability helps customers know whether a workload is seeing any behavioral anomalies, like DNS tunneling or beaconing, for example, that could be a cause for concern. Network Traffic Analysis (NTA) For customers interested in baselining network-wide behavior and identifying anomalous behavior at the aggregated network level, NSX-T 3.2 introduces Distributed Network Traffic Analysis (NTA). Network-wide anomalies like lateral movement, suspicious RDP traffic, and malicious interactions with the Active Directory server, for example, can alert security teams about attacks underway and help them take quick remediation actions. Network Detection and Response (NDR) Alert overload, and resulting fatigue, is a real challenge among security teams. Leveraging advanced AI/ML techniques, the NSX-T 3.2 Network Detection and Response solution consolidates security IOCs from different detection systems like IDS, NTA, malware detection. etc., to provide a ”campaign view” that shows specific attacks in play at that point in time. MITRE ATT&CK visualization helps customers see the specific stage in the kill chain of individual attacks, and the ”time sequence” view helps understand the sequence of events that contributed to the attack on the network. Key Firewall Enhancements While delivering new Advanced Threat Prevention capabilities is one key emphasis for the NSX-T 3.2 release, providing meaningful enhancements for core firewalling capabilities is an equally critical area of innovation. Distributed Firewall for VDS Switchports While NSX-T has thus far supported workloads connected to both overlay-based N-VDS switchports as well as VLAN-based switchports, customers had to move the VLAN switchports from VDS to N-VDS before a Distributed Firewall could be enforced. With NSX-T 3.2, native VLAN DVPGs are supported as-is, without having to move to N-VDS. Effectively, Distributed Security can be achieved in a completely seamless manner without having to modify any networking constructs. Distributed Firewall workflows in vCenter With NSX-T 3.2, we are introducing the ability to create and modify Distributed Firewall rules natively within vCenter. For small- to medium-sized VMware customers, this feature simplifies the user experience by eliminating the need to leverage a separate NSX Manager interface. Advanced User Identification for Distributed and Gateway Firewalls NSX supported user identity-based access control in earlier releases. With NSX-T 3.2, we’re introducing the ability to directly connect to Microsoft Active Directory to support user identity mapping. In addition, for customers who do not use Active Directory for user authentication, NSX also supports VMware vRealize LogInsight as an additional method to carry out user identity mapping. This feature enhancement is applicable for both NSX Distributed Firewall as well as NSX Gateway Firewall. Enhanced L7 Application Identification for Distributed and Gateway Firewalls NSX supported Layer-7 application identification-based access control in earlier releases. With NSX-T 3.2, we are enhancing the signature set to about 750 applications. While several perimeter firewall vendors claim a larger set of Layer-7 application signatures, they focus mostly on internet application identification (like Facebook, for example). Our focus with NSX at this time is on internal applications hosted by enterprises. This feature enhancement is applicable for both NSX Distributed Firewall as well as Gateway Firewalls. NSX Intelligence NSX Intelligence is geared towards delivering unprecedented visibility for all application traffic inside the network and enabling customers to create micro-segmentation policies to reduce the attack surface. It has a processing pipeline that de-dups, aggregates, and correlates East-West traffic to deliver in-depth visibility. Scalability enhancements for NSX Intelligence As application infrastructure grows rapidly, it is vital that one’s security analytics platform can grow with it. With the new release, we have rearchitected the application platform upon which NSX Intelligence runs — moving from a stand-alone appliance to a containerized micro-service architecture powered by Kubernetes. This architectural change future-proofs the Intelligence data lake and allows us to eventually scale out our solution to n-node Kubernetes clusters. Large Enterprise customers that need visibility for application traffic can confidently deploy NSX Intelligence and leverage the enhanced scale it supports. NSX Gateway Firewall While NSX Distributed Firewall focuses on east-west controls within the network, NSX Gateway Firewall is used for securing ingress and egress traffic into and out of a zone. Gateway Firewall Malware Detection NSX Gateway Firewall in the 3.2 release received significant Advanced Threat Detection capabilities. Gateway Firewall can now identify both known as well as zero-day malware ingressing or egressing the network. This new capability is based on the Gateway Firewall integration with Lastline’s highly reputed dynamic network sandbox technology. Gateway Firewall URL Filtering Internal users and applications reaching out to malicious websites is a huge security risk that must be addressed. In addition, enterprises need to limit internet access to comply with corporate internet usage policies. NSX Gateway Firewall in 3.2 introduces the capability to restrict access to internet sites. Access can be limited based on either the category the URL belongs to, or the “reputation” of the URL. The URL to category and reputation mapping is constantly updated by VMware so customer intent is enforced automatically even after many changes in the internet sites themselves.

Read More

Spotlight

Momentum Protocol

The standard protocol for blockchain loyalty programs. Momentum is a blockchain based resolution to maximise the loyalty opportunity. Momentum protocol is set to revolutionise the world of marketing and customer loyalty.Redefining the way companies build and manage relationships with their customers.Launching the world’s first blockchain-based, marketing automation and loyalty rewards middleware.

Related News

Virtual Desktop Tools, Virtual Desktop Strategies

Leostream Enhances Security and Management of vSphere Hybrid Cloud Deployments

Business Wire | January 29, 2024

Leostream Corporation, the world's leading Remote Desktop Access Platform provider, today announced features to enhance security, management, and end-user productivity in vSphere-based hybrid cloud environments. The Leostream platform strengthens end-user computing (EUC) capabilities for vSphere users, including secure access to both on-premises and cloud environments, heterogeneous support, and reduced cloud costs. With the Leostream platform as the single pane of glass managing EUC environments, any hosted desktop environment, including individual virtual desktops, multi-user sessions, hosted physical workstations or desktops, and hosted applications, becomes simpler to manage, more secure, more flexible, and more cost-effective. Significant ways the Leostream platform expands vSphere’s capabilities include: Security The Leostream platform ensures data remains locked in the corporate network, and works across on-premises and cloud environments, providing even disparate infrastructures with the same levels of security and command over authorization, control, and access tracking. The Leostream platform supports multi-factor authentication and allows organizations to enforce strict access control rules, creating an EUC environment modeled on a zero-trust architecture. Multivendor/protocol support The Leostream platform was developed from the ground up for heterogeneous infrastructures and as the connection management layer of the EUC environment, the Leostream platform allows organizations to leverage vSphere today and other hypervisors or hyperconvergence platforms in the future as their needs evolve. The Leostream platform supports the industry’s broadest array of remote display protocols, including specialized protocols for mission-critical tasks. Consistent EUC experience The Leostream platform enables IT to make changes to the underlying environment while ensuring the end user experience is constant, and to incorporate AWS, Azure, Google Cloud, or OpenStack private clouds into their environment without disruptions in end-user productivity. By integrating with corporate Identity Providers (IdPs) that employees are already familiar with, and providing employees with a single portal they use to sign in, the Leostream platform offers simplicity to users too. Connectivity The Leostream Gateway securely connects to on-prem and cloud resources without virtual private networks (VPNs), and eliminates the need to manage and maintain security groups. End users get the same seamless login and high-performance connection across hybrid environments including corporate resources located off the internet. Controlling cloud costs The Leostream Connection Broker implements automated rules that control capacity and power state in the cloud, allowing organizations to optimize their cloud usage and minimize costs, such as ensuring cloud instances aren’t left running when they are no longer needed. The Connection Broker also intelligently pools and shares resources across groups of users, so organizations can invest in fewer systems, reducing overall cost of ownership. “These features deliver a streamlined experience with vSphere and hybrid or multi-cloud resources so end users remain productive, and corporate data and applications remain secure,” said Leostream CEO Karen Gondoly. “At a time when there is uncertainty about the future of support for VMware’s end-user computing, it’s important to bring these options to the market to show that organizations can extend vSphere’s capabilities and simultaneously plan for the future without disruption to the workforce.” About Leostream Corporation Leostream Corporation, the global leader in Remote Desktop Access Platforms, offers comprehensive solutions that enable seamless work-from-anywhere environments for individuals across diverse industries, regardless of organization size or location. The core of the Leostream platform is its commitment to simplicity and insight. It is driven by a unified administrative console that streamlines the management of users, cloud desktops, and IT assets while providing real-time dashboards for informed decision-making. The company continually monitors the evolving remote desktop landscape, anticipating future trends and challenges. This purposeful, proactive approach keeps clients well-prepared for the dynamic changes in remote desktop technology.

Read More

Virtualized Environments

Vuzix Introduces Z100 Smart Glasses to Seamlessly Connect Workers with AI Optimization Tools

PR Newswire | January 10, 2024

Vuzix Corporation, a leading supplier of smart glasses and augmented reality (AR) technology and products, today announced the unveiling of Vuzix Z100 smart glasses, which will initially be offered as a developer's edition. Built using the Vuzix Ultralite OEM PlatformSM, these safety glasses-certified smart glasses are sleek and made for all day wear. Using them, workers get a human-centered connection to AI and work process applications, receiving critical updates, convenient workflow and task confirmations, and notifications in real time, all while wearing a pair of glasses that workers will enjoy having on. Vuzix Z100 smart glasses pair seamlessly via Bluetooth with Android or iOS IOT devices. They represent the first attractive, functional bridge between AI platform tools, where situational guidance can streamline workflows, and human workers can reap the benefits of a truly connected workplace. In addition to a lightweight AI interface, Vuzix Z100 glasses can augment the data feed from finger scanners, sensors, controllers, and other equipment with minimal native UI, making that data available in a new and highly accessible format. Tasks with sub-standard user feedback due to device or process limitations can now have their workflows displayed in the user's heads up display, providing human-centered outputs and real-time updates. Running up to 48 hours on a single charge, Vuzix Z100 smart glasses pack industry-defining heads-up waveguide technology into a sleek, fashionable form factor that weighs in at just 35 grams – the weight of a standard pair of glasses. Advanced monocular waveguide optics, combined with Vuzix' custom micro display engine, create a crisp, transparent, monochrome image that can deliver all the important information on a user's Android or iOS device, hands-free right before their eyes. Wearers get heads-up access to important task information, from language translation and closed captioning, to directions, to health and workout status, to messaging, workflow outputs and much more. Best of all, Vuzix Z100 smart glasses provide a sleek, attractive form factor that frontline employees will want to wear. "The Z100 takes enterprise use of AR smart glasses to the next level, providing workers with a hands-free wearable that is indistinguishable from a pair a standard glasses," said Paul Travers, President and Chief Executive Officer at Vuzix. "This rollout is in overwhelming response to interest expressed by enterprise customers in an attractive and light weight pair of smart glasses that can augment current workflows with AI optimization software. There are customers across numerous market verticals and use cases that we believe will embrace this product as fashionable and affordable productivity device that workers will enjoy wearing all day every day." About Vuzix Corporation Vuzix is a leading designer, manufacturer and marketer of Smart Glasses and Augmented Reality (AR) technologies and products for the enterprise, medical, defense and consumer markets. The Company's products include head-mounted smart personal display and wearable computing devices that offer users a portable high-quality viewing experience, provide solutions for mobility, wearable displays and augmented reality, as well OEM waveguide optical components and display engines. Vuzix holds more than 350 patents and patents pending and numerous IP licenses in the fields of optics, head-mounted displays, and augmented reality Video Eyewear field. Moviynt, an SAP Certified ERP SaaS logistics solution provider, is a Vuzix wholly owned subsidiary. The Company has won Consumer Electronics Show (or CES) awards for innovation for the years 2005 to 2024 and several wireless technology innovation awards among others. Founded in 1997, Vuzix is a public company with offices in: Rochester, NY; Munich, Germany; and Kyoto and Tokyo, Japan.

Read More

Virtualized Environments

ARound and Immersal Team Up to Revolutionize Augmented Reality in Sports and Live Entertainment

PR Newswire | January 05, 2024

ARound, the pioneering shared augmented reality (AR) platform, part of Stagwell, is excited to announce a groundbreaking partnership with Immersal, leaders in spatial computing and AR localization technology, and part of Hexagon. By creating a turn-key WebAR solution for stadium AR, this partnership facilitates easier integration of shared AR experiences for teams, venues, and events, broadening the scope of interactive fan engagement. ARound and Immersal are poised to announce their inaugural collaboration with a major sports league next month, marking a significant milestone in bringing this innovative vision to life. This partnership combines ARound's connected, shared AR technology that has transformed live fan experiences for professional sports teams across three professional leagues – MLB, NBA, NFL – including the Minnesota Twins, Los Angeles Rams, Kansas City Royals, and the Cleveland Cavaliers, with Immersal's visual positioning system (VPS) that creates centimeter-accurate, large-scale indoor and outdoor AR experiences. "This partnership is a game-changer in the world of sports and live entertainment as we collaborate to make stadium AR experiences more accessible and ubiquitous to all fans and types of events," said Josh Beatty, founder and CEO, ARound. "By integrating our fan engagement platform with Immersal's robust localization technology, we can seamlessly create dynamic digital experiences that put fans at the center of the action while scaling to new audiences around the world." The integration of ARound and Immersal technologies yields greater access and broader use cases of AR experiences through WebAR, enhancing the overall quality and ease of integration for in-stadium entertainment. Fans can interact with live events in real-time, participating in AR games, accessing real-time game content, and enjoying shared experiences with fellow attendees, all from their smartphones without the need for a standalone app. Brands and sponsors will also now be able to connect with audiences in innovative, meaningful ways, enhancing their marketing mix and creating new avenues for engagement. "We're committed to innovating and enhancing AR experiences at live events and our technology, combined with ARound's exciting platform, will set a new benchmark in how fans interact with live sports and entertainment, offering them an engaging and memorable experience like never before," Matias Koski, CEO, Immersal. This groundbreaking partnership heralds a new era in fan engagement, offering sports teams, venues, and brands an unparalleled platform to connect with audiences. Combining ARound's interactive fan experiences with Immersal's precision technology, the stage is now set for a revolution in live entertainment. About ARound ARound is a first-of-its-kind stadium-level shared augmented reality platform and is part of the Stagwell Marketing Cloud, a proprietary suite of SaaS solutions built for the modern marketer. ARound keeps audiences engaged by capturing their attention through immersive, interactive and shared experiences with fellow fans across the venue. Where other AR products offer isolating, singular experiences, ARound's massive multi-user AR – which uses 3D spatial computing to localize content – redefines what it means to be part of a connected fan experience. It was the winner of Stagwell's annual innovation competition which invests in new product ideas proposed by the network's 13,000+ employees. ARound and the Stagwell Marketing Cloud are a part of Stagwell, the challenger network built to transform marketing. About Immersal Immersal, part of Hexagon, is building world-leading spatial mapping and visual positioning tools — the foundation of the metaverse. Founded in 2015, Immersal's team is based in Helsinki, Finland, and working with partners, developers and creators across the globe to reimagine how we explore, interact and create. Immersal also has sales offices in Hong Kong and in Silicon Valley, California, and is expanding its presence and partner networks globally. The company was acquired by Hexagon in 2021 and continues to pursue the vision of a metaverse built and experienced by everyone on any device. Hexagon has approximately 24,000 employees in 50 countries and net sales of approximately 5.2bn EUR.

Read More

Virtual Desktop Tools, Virtual Desktop Strategies

Leostream Enhances Security and Management of vSphere Hybrid Cloud Deployments

Business Wire | January 29, 2024

Leostream Corporation, the world's leading Remote Desktop Access Platform provider, today announced features to enhance security, management, and end-user productivity in vSphere-based hybrid cloud environments. The Leostream platform strengthens end-user computing (EUC) capabilities for vSphere users, including secure access to both on-premises and cloud environments, heterogeneous support, and reduced cloud costs. With the Leostream platform as the single pane of glass managing EUC environments, any hosted desktop environment, including individual virtual desktops, multi-user sessions, hosted physical workstations or desktops, and hosted applications, becomes simpler to manage, more secure, more flexible, and more cost-effective. Significant ways the Leostream platform expands vSphere’s capabilities include: Security The Leostream platform ensures data remains locked in the corporate network, and works across on-premises and cloud environments, providing even disparate infrastructures with the same levels of security and command over authorization, control, and access tracking. The Leostream platform supports multi-factor authentication and allows organizations to enforce strict access control rules, creating an EUC environment modeled on a zero-trust architecture. Multivendor/protocol support The Leostream platform was developed from the ground up for heterogeneous infrastructures and as the connection management layer of the EUC environment, the Leostream platform allows organizations to leverage vSphere today and other hypervisors or hyperconvergence platforms in the future as their needs evolve. The Leostream platform supports the industry’s broadest array of remote display protocols, including specialized protocols for mission-critical tasks. Consistent EUC experience The Leostream platform enables IT to make changes to the underlying environment while ensuring the end user experience is constant, and to incorporate AWS, Azure, Google Cloud, or OpenStack private clouds into their environment without disruptions in end-user productivity. By integrating with corporate Identity Providers (IdPs) that employees are already familiar with, and providing employees with a single portal they use to sign in, the Leostream platform offers simplicity to users too. Connectivity The Leostream Gateway securely connects to on-prem and cloud resources without virtual private networks (VPNs), and eliminates the need to manage and maintain security groups. End users get the same seamless login and high-performance connection across hybrid environments including corporate resources located off the internet. Controlling cloud costs The Leostream Connection Broker implements automated rules that control capacity and power state in the cloud, allowing organizations to optimize their cloud usage and minimize costs, such as ensuring cloud instances aren’t left running when they are no longer needed. The Connection Broker also intelligently pools and shares resources across groups of users, so organizations can invest in fewer systems, reducing overall cost of ownership. “These features deliver a streamlined experience with vSphere and hybrid or multi-cloud resources so end users remain productive, and corporate data and applications remain secure,” said Leostream CEO Karen Gondoly. “At a time when there is uncertainty about the future of support for VMware’s end-user computing, it’s important to bring these options to the market to show that organizations can extend vSphere’s capabilities and simultaneously plan for the future without disruption to the workforce.” About Leostream Corporation Leostream Corporation, the global leader in Remote Desktop Access Platforms, offers comprehensive solutions that enable seamless work-from-anywhere environments for individuals across diverse industries, regardless of organization size or location. The core of the Leostream platform is its commitment to simplicity and insight. It is driven by a unified administrative console that streamlines the management of users, cloud desktops, and IT assets while providing real-time dashboards for informed decision-making. The company continually monitors the evolving remote desktop landscape, anticipating future trends and challenges. This purposeful, proactive approach keeps clients well-prepared for the dynamic changes in remote desktop technology.

Read More

Virtualized Environments

Vuzix Introduces Z100 Smart Glasses to Seamlessly Connect Workers with AI Optimization Tools

PR Newswire | January 10, 2024

Vuzix Corporation, a leading supplier of smart glasses and augmented reality (AR) technology and products, today announced the unveiling of Vuzix Z100 smart glasses, which will initially be offered as a developer's edition. Built using the Vuzix Ultralite OEM PlatformSM, these safety glasses-certified smart glasses are sleek and made for all day wear. Using them, workers get a human-centered connection to AI and work process applications, receiving critical updates, convenient workflow and task confirmations, and notifications in real time, all while wearing a pair of glasses that workers will enjoy having on. Vuzix Z100 smart glasses pair seamlessly via Bluetooth with Android or iOS IOT devices. They represent the first attractive, functional bridge between AI platform tools, where situational guidance can streamline workflows, and human workers can reap the benefits of a truly connected workplace. In addition to a lightweight AI interface, Vuzix Z100 glasses can augment the data feed from finger scanners, sensors, controllers, and other equipment with minimal native UI, making that data available in a new and highly accessible format. Tasks with sub-standard user feedback due to device or process limitations can now have their workflows displayed in the user's heads up display, providing human-centered outputs and real-time updates. Running up to 48 hours on a single charge, Vuzix Z100 smart glasses pack industry-defining heads-up waveguide technology into a sleek, fashionable form factor that weighs in at just 35 grams – the weight of a standard pair of glasses. Advanced monocular waveguide optics, combined with Vuzix' custom micro display engine, create a crisp, transparent, monochrome image that can deliver all the important information on a user's Android or iOS device, hands-free right before their eyes. Wearers get heads-up access to important task information, from language translation and closed captioning, to directions, to health and workout status, to messaging, workflow outputs and much more. Best of all, Vuzix Z100 smart glasses provide a sleek, attractive form factor that frontline employees will want to wear. "The Z100 takes enterprise use of AR smart glasses to the next level, providing workers with a hands-free wearable that is indistinguishable from a pair a standard glasses," said Paul Travers, President and Chief Executive Officer at Vuzix. "This rollout is in overwhelming response to interest expressed by enterprise customers in an attractive and light weight pair of smart glasses that can augment current workflows with AI optimization software. There are customers across numerous market verticals and use cases that we believe will embrace this product as fashionable and affordable productivity device that workers will enjoy wearing all day every day." About Vuzix Corporation Vuzix is a leading designer, manufacturer and marketer of Smart Glasses and Augmented Reality (AR) technologies and products for the enterprise, medical, defense and consumer markets. The Company's products include head-mounted smart personal display and wearable computing devices that offer users a portable high-quality viewing experience, provide solutions for mobility, wearable displays and augmented reality, as well OEM waveguide optical components and display engines. Vuzix holds more than 350 patents and patents pending and numerous IP licenses in the fields of optics, head-mounted displays, and augmented reality Video Eyewear field. Moviynt, an SAP Certified ERP SaaS logistics solution provider, is a Vuzix wholly owned subsidiary. The Company has won Consumer Electronics Show (or CES) awards for innovation for the years 2005 to 2024 and several wireless technology innovation awards among others. Founded in 1997, Vuzix is a public company with offices in: Rochester, NY; Munich, Germany; and Kyoto and Tokyo, Japan.

Read More

Virtualized Environments

ARound and Immersal Team Up to Revolutionize Augmented Reality in Sports and Live Entertainment

PR Newswire | January 05, 2024

ARound, the pioneering shared augmented reality (AR) platform, part of Stagwell, is excited to announce a groundbreaking partnership with Immersal, leaders in spatial computing and AR localization technology, and part of Hexagon. By creating a turn-key WebAR solution for stadium AR, this partnership facilitates easier integration of shared AR experiences for teams, venues, and events, broadening the scope of interactive fan engagement. ARound and Immersal are poised to announce their inaugural collaboration with a major sports league next month, marking a significant milestone in bringing this innovative vision to life. This partnership combines ARound's connected, shared AR technology that has transformed live fan experiences for professional sports teams across three professional leagues – MLB, NBA, NFL – including the Minnesota Twins, Los Angeles Rams, Kansas City Royals, and the Cleveland Cavaliers, with Immersal's visual positioning system (VPS) that creates centimeter-accurate, large-scale indoor and outdoor AR experiences. "This partnership is a game-changer in the world of sports and live entertainment as we collaborate to make stadium AR experiences more accessible and ubiquitous to all fans and types of events," said Josh Beatty, founder and CEO, ARound. "By integrating our fan engagement platform with Immersal's robust localization technology, we can seamlessly create dynamic digital experiences that put fans at the center of the action while scaling to new audiences around the world." The integration of ARound and Immersal technologies yields greater access and broader use cases of AR experiences through WebAR, enhancing the overall quality and ease of integration for in-stadium entertainment. Fans can interact with live events in real-time, participating in AR games, accessing real-time game content, and enjoying shared experiences with fellow attendees, all from their smartphones without the need for a standalone app. Brands and sponsors will also now be able to connect with audiences in innovative, meaningful ways, enhancing their marketing mix and creating new avenues for engagement. "We're committed to innovating and enhancing AR experiences at live events and our technology, combined with ARound's exciting platform, will set a new benchmark in how fans interact with live sports and entertainment, offering them an engaging and memorable experience like never before," Matias Koski, CEO, Immersal. This groundbreaking partnership heralds a new era in fan engagement, offering sports teams, venues, and brands an unparalleled platform to connect with audiences. Combining ARound's interactive fan experiences with Immersal's precision technology, the stage is now set for a revolution in live entertainment. About ARound ARound is a first-of-its-kind stadium-level shared augmented reality platform and is part of the Stagwell Marketing Cloud, a proprietary suite of SaaS solutions built for the modern marketer. ARound keeps audiences engaged by capturing their attention through immersive, interactive and shared experiences with fellow fans across the venue. Where other AR products offer isolating, singular experiences, ARound's massive multi-user AR – which uses 3D spatial computing to localize content – redefines what it means to be part of a connected fan experience. It was the winner of Stagwell's annual innovation competition which invests in new product ideas proposed by the network's 13,000+ employees. ARound and the Stagwell Marketing Cloud are a part of Stagwell, the challenger network built to transform marketing. About Immersal Immersal, part of Hexagon, is building world-leading spatial mapping and visual positioning tools — the foundation of the metaverse. Founded in 2015, Immersal's team is based in Helsinki, Finland, and working with partners, developers and creators across the globe to reimagine how we explore, interact and create. Immersal also has sales offices in Hong Kong and in Silicon Valley, California, and is expanding its presence and partner networks globally. The company was acquired by Hexagon in 2021 and continues to pursue the vision of a metaverse built and experienced by everyone on any device. Hexagon has approximately 24,000 employees in 50 countries and net sales of approximately 5.2bn EUR.

Read More

Events