Addressing Multi-Cloud Complexity with VMware Tanzu

Aashish Yadav | June 7, 2022 | 426 views

Multi-Cloud Complexity

Introduction

With cloud computing on the path to becoming the mother of all transformations, particularly in IT's ways of development and operations, we are once again confronted with the problem of conversion errors, this time a hundredfold higher than previous moves to dispersed computing and the web.

While the issue is evident, the remedies are not so obvious. Cloud complexity is the outcome of the fast acceleration of cloud migration and net-new innovation without consideration of the complexity this introduces in operations.

Almost all businesses are already working in a multi-cloud or hybrid-cloud environment. According to an IDC report, 93% of enterprises utilize multiple clouds. The decision could have stemmed from a desire to save money and avoid vendor lock-in, increase resilience, or businesses might have found themselves with several clouds as a result of the compounding activities of different teams. When it comes to strategic technology choices, relatively few businesses begin by asking, "How can we secure and control our technology?"


Must-Follow Methods for Multi-Cloud and Hybrid Cloud Success

  • Data Analysis at Any Size, from Any Source:
To proactively recognize, warn, and guide investigations, teams should be able to utilize all data throughout the cloud and on-premises.
  • Insights in Real-Time:
Considering the temporary nature of containerized operations and functions as a service, businesses cannot wait minutes to determine whether they are experiencing infrastructure difficulties. Only a scalable streaming architecture can ingest, analyze, and alert rapidly enough to discover and investigate problems before they have a major impact on consumers.
  • Analytics That Enables Teams to Act:
Because multi-cloud and hybrid-cloud strategies do not belong in a single team, businesses must be able to evaluate data inside and across teams in order to make decisions and take action swiftly.


How Can VMware Help in Solving Multi-Cloud and Hybrid-Cloud Complexity?

VMware made several announcements indicating a new strategy focused on modern applications. Their approach focuses on two VMware products: vSphere with Kubernetes and Tanzu.
Since then, much has been said about VMware's modern app approach, and several products have launched. Let's focus on VMware Tanzu.
  • VMware Tanzu
Tanzu is a product that enables organizations to upgrade both their apps and the infrastructure that supports them. In the same way that VMware wants vRealize to be known for cloud management and automation, Tanzu wants to be known for modern business applications.
  • Tanzu uses Kubernetes to build and manage modern applications.
  • In Tanzu, there is just one development environment and one deployment process.
  • VMware Tanzu is compatible with both private and public cloud infrastructures.


Closing Lines

The important point is that the Tanzu portfolio offers a great deal of flexibility in terms of where applications operate and how they are controlled. We observe an increase in demand for operating an application on any cloud, and how VMware Tanzu assists us in streamlining the multi-cloud operation for MLOps pipeline. Apart from multi-cloud operation, it is critical to monitor and alarm each component throughout the MLOps lifecycle, from Kubernetes pods and inference services to data and model performance.

Spotlight

WiSilica

WiSilica is a provider of a leading IOT platform that securely bridges objects, locations, people and cloud. WiSilica enables smart environments where IoT connected devices understand contextual elements, such as proximity and de-centralized control, putting the intelligence into the devices themselves, via local preconfigured networks.

OTHER ARTICLES
VIRTUAL DESKTOP STRATEGIES

Network Virtualization: The Future of Businesses and Networks

Article | July 26, 2022

Network virtualization has emerged as the widely recommended solution for the networking paradigm's future. Virtualization has the potential to revolutionize networks in addition to providing a cost-effective, flexible, and secure means of communication. Network virtualization isn't an all-or-nothing concept. It can help several organizations with differing requirements, or it can provide a bunch of new advantages for a single enterprise. It is the process of combining a network's physical hardware into a single, virtual network. This is often accomplished by running several virtual guest machines in software containers on a single physical host system. Network virtualization is indeed the new gold standard for networking, and it is being embraced by enterprises of all kinds globally. By integrating their current network gear into a single virtual network, businesses can reduce operating expenses, automate network and security processes, and lay the groundwork for future growth. Network virtualization also enables organizations to simulate traditional hardware like servers, storage devices, and network resources. The physical network performs basic tasks like packet forwarding, while virtual versions handle more complex activities like networking service management and deployment. Addressing Network Virtualization Challenges Surprisingly, IT teams might encounter network virtualization challenges that are both technical and non-technical in nature. Let's look at some common challenges and discuss how to overcome them. Change in Network Architecture Practically, the first big challenge is shifting from an architecture that depends heavily on routers, switches, and firewalls. Instead, these services are detached from conventional hardware and put on hypervisors that virtualize these operations. Virtualized network services are shared, scaled, and moved as required. Migrating current LANs and data centers to a virtualized platform require careful planning. This migration involves the following tasks: Determine how much CPU, computation, and storage resources will be required to run virtualized network services. Determine the optimal approach for integrating network resilience and security services. Determine how the virtualized network services will be implemented in stages to avoid disrupting business operations. The key to a successful migration is meticulous preparation by architects who understand the business's network requirements. This involves a thorough examination of existing apps and services, as well as a clear knowledge of how data should move across the company most effectively. Moreover, a progressive approach to relocation is often the best solution. In this instance, IT teams can make changes to the virtualization platform without disrupting the whole corporate network. Network Visibility Network virtualization has the potential to considerably expand the number of logical technology layers that must collaborate. As a result, traditional network and data center monitoring technologies no longer have insight into some of these abstracted levels. In other circumstances, visibility can be established, but the tools fail to show the information correctly so that network operators can understand it. In either case, deploying and managing modern network visibility technologies is typically the best choice. When an issue arises, NetOps personnel are notified of the specific service layer. Automation and AI The enhanced level of automation and self-service operations that can be built into a platform is a fundamental aspect of network virtualization. While these activities can considerably increase the pace of network upgrades while decreasing management overhead, they need the documentation and implementation of a new set of standards and practices. Understand that prior network architectures were planned and implemented utilizing actual hardware appliances on a hop-by-hop basis. A virtualized network, on the other hand, employs a centralized control plane to govern and push policies to all sections of the network. Changes may occur more quickly in this aspect, but various components must be coordinated to accomplish their roles in harmony. As a result, network teams should move their attention away from network operations that are already automated. Rather, their new responsibility is to guarantee that the core automation processes and AI are in sync in order to fulfill those automated tasks. Driving Competitive Edge with Network Virtualization Virtualization in networking or virtual machines within an organization is not a new trend. Even small and medium businesses have realized the benefits of network virtualization, especially when combined with a hosted cloud service provider. Because of this, the demand for enterprise network virtualization is rising, driving higher end-user demands and the proliferation of devices and business tools. These network virtualization benefits can help boost business growth and gain a competitive edge. Gaining a Competitive Edge: Network Virtualization Benefits Cost-Savings on Hardware Faster Desktop and Server Provisioning and Deployment Improved Data Security and Disaster Recovery Increasing IT Operational Efficiency Small Footprint and Energy Saving Network Virtualization: The Path to Digital Transformation Business is at the center of digital transformation, but technology is needed to make it happen. Integrated clouds, highly modern data centers, digital workplaces, and increased data center security are all puzzle pieces, and putting them all together requires a variety of various products and services that are deployed cohesively. The cloud revolution is still having an influence on IT, transforming how digital content is consumed and delivered. This should come as no surprise that such a shift has influenced how we feel about current networking. When it boils down to it, the purpose of digital transformation for every company, irrespective of industry, is the same: to boost the speed with which you can respond to market changes and evolving business needs; to enhance your ability to embrace and adapt to new technology, and to improve overall security. As businesses realize that the underlying benefit of cloud adoption and enhanced virtualization isn't simply about cost savings, digital strategies are evolving, becoming more intelligent and successful in the process. Network virtualization is also a path toward the smooth digital transformation of any business. How does virtualization help in accelerating digital transformation? Combining public and private clouds, involving hardware-based computing, storage, and networking software definition. A hyper-converged infrastructure that integrates unified management with virtualized computing, storage, and networking could be included. Creating a platform for greater productivity by providing the apps and services consumers require when and when they utilize them. This should include simplifying application access and administration as well as unifying endpoint management. Improving network security and enhancing security flexibility to guarantee that quicker speed to market is matched by tighter security. Virtualization will also help businesses to move more quickly and safely, bringing products—and profits—to market faster. Enhancing Security with Network Virtualization Security has evolved as an essential component of every network architecture. However, since various areas of the network are often segregated from one another, it might be challenging for network teams to design and enforce network virtualization security standards that apply to the whole network. Zero trust can integrate such network parts and their accompanying virtualization activities. Throughout the network, the zero-trust architecture depends on the user and device authentication. If LAN users wish to access data center resources, they must first be authenticated. The secure connection required for endpoints to interact safely is provided by a zero-trust environment paired with network virtualization. To facilitate these interactions, virtual networks can be ramped up and down while retaining the appropriate degree of traffic segmentation. Access policies, which govern which devices can connect with one another, are a key part of this process. If a device is allowed to access a data center resource, the policy should be understood at both the WAN and campus levels. Some of the core network virtualization security features are: Isolation and multitenancy are critical features of network virtualization. Segmentation is related to isolation; however it is utilized in a multitier virtual network. A network virtualization platform's foundation includes firewalling technologies that enable segmentation inside virtual networks. Network virtualization enables automatic provisioning and context-sharing across virtual and physical security systems. Investigating the Role of Virtualization in Cloud Computing Virtualization in the cloud computing domain refers to the development of virtual resources (such as a virtual server, virtual storage device, virtual network switch, or even a virtual operating system) from a single resource of its type that also shows up as several personal isolated resources or environments that users can use as a separate individual physical resource. Virtualization enables the benefits of cloud computing, such as ease of scaling up, security, fluid or flexible resources, and so on. If another server is necessary, a virtual server will be immediately created, and a new server will be deployed. When we need more memory, we increase the virtual server configurations we currently have, and we now have the extra RAM we need. As a result, virtualization is the underlying technology of the cloud computing business model. The Benefits of Virtualization in Cloud Computing: Efficient hardware utilization Virtualization improves availability Disaster recovery is quick and simple Energy is saved by virtualization Setup is quick and simple Cloud migration has become simple Motivating Factors for the Adoption of Network Virtualization Demand for enterprise networks continues to climb, owing to rising end-user demands and the proliferation of devices and business software. Thanks to network virtualization, IT companies are gaining the ability to respond to shifting demands and match their networking capabilities with their virtualized storage and computing resources. In fact, according to a recent SDxCentral report, 88% of respondents believe it is "important" or "mission critical" to implement a network virtualization software over the next two to five years. Virtualization is also an excellent alternative for businesses that employ outsourced IT services, are planning mergers or acquisitions or must segregate IT teams owing to regulatory compliance. Reasons to Adopt Network Virtualization: A Business Needs Speed Security Requirements Are Rising Apps can Move Around Micro-segmentation IT Automation and Orchestration Reduce Hardware Dependency and CapEx: Adopt Multi-Tenancy Cloud Disaster Recovery mproved Scalability Wrapping-Up Network virtualization and cloud computing are emerging technologies of the future. As CIOs get actively involved in organizational systems, these new concepts will be implemented in more businesses. As consumer demand for real-time services expands, businesses will be driven to explore network virtualization as the best way to take their networks to the next level. The networking future is here. FAQ Why is network virtualization important for business? By integrating their current network gear into a single virtual network, businesses can reduce operating expenses, automate network and security processes, and set the stage for future growth. Where is network virtualization used? Network virtualization can be utilized in application development and testing to simulate hardware and system software realistically. Network virtualization in application performance engineering allows for the modeling of connections among applications, services, dependencies, and end users for software testing. How does virtualization work in cloud computing? Virtualization, in short, enables cloud providers to provide users alongside existing physical computer infrastructure. As a simple and direct process, it allows cloud customers to buy only the computing resources they require when they want them and to maintain those resources cost-effectively as the demand grows.

Read More
VIRTUAL DESKTOP STRATEGIES

Virtualization can transform your company’s IT infrastructure

Article | July 12, 2022

For many companies in today’s highly competitive, rapidly digitizing world, data center transformation is not merely a one-time project – it’s a constant challenge. No corporate IT leader should be content merely to revamp their data infrastructure once, then call it a day. Instead, they should always be looking for ways to make their approach to data more dynamic and easier to scale. Ideally, they’d do so in a way that maximizes resource utilization while minimizing costs. Luckily, that’s exactly the idea behind virtualization, which involves creating a new infrastructure that’s capable of rapidly scaling and facilitating workload development. IT leaders are quickly coming to realize that with virtualization in their toolbox, they’re able to make their operations more agile than ever, and without increasing costs. This is why over 80% of enterprise server workloads today are running on virtual machines, and the market for data center virtualization is expected to reach a total value of $10 billion by 2023.

Read More
SERVER HYPERVISORS

Best Practices for vSphere 6.7 Tagging

Article | September 9, 2022

vSphere Tags were introduced in version 5.1 as a way to organize inventory objects such as VMs, Hosts, Datastores, etc., a much-needed feature for helping search for or group objects within vSphere. A Tag is basically a label that can be applied to vSphere inventory objects. When an administrator creates a tag, it is then assigned to a tag category. Categories allow the grouping of related tags. When a Category is created, you can specify associations of object types (such as; VM or Datastore) as well as whether more than one tag in a category can be applied to an object (ex; One Tag or Many Tags).

Read More

How to automate the creation multiple routable VLANs on single L2 network using VyOS

Article | February 12, 2020

My personal homelab has a very simple network topology, everything is connected to a single flat network. This has served me well over the years, but sometimes it can prevent me from deploying more complex scenarios. Most recently while working with NSX-T and Project Pacific, I had a need for additional VLANs which my home router does not support. There are a number of software solutions that can be used including the popular pfSense, which I have used before. Over the Winter break, a colleague introduced me to VyOS, which is another popular software firewall and router solution. I had not heard of VyOS before but later realized it was derived from Vyatta, which I had heard of, but development of that solution had stopped and VyOS is now the open source version of that software. Having never played with VyoS before, I thought this might be a good learning opopournity and started to dabble with VyOS over the holiday.

Read More

Spotlight

WiSilica

WiSilica is a provider of a leading IOT platform that securely bridges objects, locations, people and cloud. WiSilica enables smart environments where IoT connected devices understand contextual elements, such as proximity and de-centralized control, putting the intelligence into the devices themselves, via local preconfigured networks.

Related News

VPN

ExpressVPN confirms security of its desktop apps with three new independent audits

ExpressVPN | November 24, 2022

Leading consumer privacy and security company ExpressVPN has validated the security posture of all its desktop apps through three new independent audits by respected cybersecurity firms, Cure53 and F-Secure. The three new audits come just weeks after KPMG's audit of ExpressVPN's no-logs policy, underlining ExpressVPN's dedication to third-party privacy and security verifications. Cure53 tested both ExpressVPN's macOS and Linux desktop apps through white-box penetration tests and source code audits. The assessments confirm that the apps are secured against cyber security threats from malicious adversaries. This also validates the extensive work done by ExpressVPN's engineering and security experts in building a safer, more open internet for millions of people worldwide. F-Secure also reviewed ExpressVPN's Windows v12 app through penetration testing and source code auditing, and found no significant weaknesses. The audit verifies that ExpressVPN's latest Windows desktop app cannot be manipulated to leak information, such as a user's IP address, outside the VPN tunnel. It also confirms that the app is not susceptible to remote code execution attacks. Having all of ExpressVPN's desktop apps audited means that users can go online with the assurance that their privacy is protected, and do so confidently. The full audit report by Cure53 for macOS can be found here and Linux here. F-Secure's audit of ExpressVPN's Windows v12 app is available here. "As part of our continuous trust and transparency efforts, we're proud to announce that all of our desktop apps have now been audited, These audits are a testament to the efforts we put into improving and securing our product, and we're glad to receive the validation from Cure53 and F-Secure. We're committed to delivering audits on our mobile apps soon, and will continue to ensure privacy and security at every touchpoint of our product." Brian Schirmacher, penetration testing manager at ExpressVPN About ExpressVPN Since 2009, ExpressVPN has empowered millions of users to take control of their internet experience. The company's award-winning consumer VPN service is backed by its open-source VPN protocol Lightway, delivering user privacy in just a few clicks. ExpressVPN's Keys password manager and Aircove router make digital privacy and security easy and accessible for all. With a commitment to transparency, ExpressVPN products have been audited by PwC, Cure53, and others.

Read More

VIRTUAL DESKTOP STRATEGIES

Sophos Firewall Unleashes Xstream Power for Distributed and Enterprise Edge Computing

Sophos | November 22, 2022

Sophos, a global leader in innovating and delivering cybersecurity as a service, today introduced new Sophos Firewall capabilities to better meet the complex and demanding needs of distributed and enterprise edge computing. Sophos Firewall now delivers performance enhancements that accelerate encrypted traffic inspection, dynamic traffic routing for Internet Protocol version 6 (IPv6), added resiliency with software-defined wide area network (SD-WAN) load balancing and high-availability enhancements, and seamless integration with Microsoft Azure Active Directory. “One of the key benefits of the Xstream architecture and Flow Processors is that they are programmable. This means that while other firewalls get slower over time, we can increase performance, even when we add new features and capabilities, Our design ensures customers’ investment in Sophos Firewall is future-proofed and enables seamless transition to a cloud-enabled world. SD-WAN and Secure Access Service Edge (SASE) demand a more efficient platform, which is not only resilient but also makes day-to-day management easier and faster than ever.” Daniel Cole, vice president of network security product management at Sophos The effective and reliable assessment of network traffic is critical in protecting against threat actors, as evidenced in Sophos’ 2023 Threat Report that published today. Distributed offices, remote workforces, cloud workloads, custom-built legacy apps, and a growing reliance on global software-as-a-service providers create a configuration and risk management headache for network security managers. Sophos Firewall now provides the performance, protection and resiliency that distributed enterprises require, while simplifying the management of complex networks. Benefits include: Advanced performance and protection: A new high-performance dynamic routing engine and Xstream Transport Layer Security (TLS) FastPath acceleration improves encrypted traffic inspection while also adding headroom for traffic that requires deep-packet inspection; the asymmetric cryptographic capabilities within Xstream Flow Processors – included in every XGS Series appliance – enable TLS inspection on even the most demanding networks Added resiliency and peace of mind: New SD-WAN load balancing for performance and reliability in the event of an internet service providers’ (ISP) outage along with enhancements to high-availability clusters ensure maximum business continuity and uptime for mission critical networks Improved ease of management: Managing network security is easier than ever with new Microsoft Azure Active Directory integration for seamless administrator single sign-on and new host and service object search Sophos Firewall integrates with Sophos ZTNA (zero trust network access) under one unified management plane and is a key pillar of Sophos’ SASE strategy, providing a more simplified, scalable and secure solution over traditional remote-access virtual private networks (VPN). The network solution is also part of the Sophos Adaptive Cybersecurity Ecosystem, which integrates Sophos’ entire portfolio of products, services and Sophos X-Ops threat intelligence for faster and more contextual and synchronized detection, protection and response. Availability Sophos Firewall is available for immediate purchase exclusively through Sophos’ global channel of partners and Managed Service Providers (MSPs). It is easily managed in the cloud-native Sophos Central platform alongside other solutions, where users can oversee installations, respond to alerts and track licenses and upcoming renewal dates via a single, intuitive interface, or by Sophos Managed Detection and Response (MDR). What Analysts, Channel Partners and Customers Say “With their latest firewall release, Sophos has leveraged the flexibility of their Xstream architecture to deliver improvements in performance for VPN throughput and more efficient handling of TLS encrypted traffic, which is vitally important in today’s encrypted world,” said Christopher Rodriguez, research director of IDC’s Security & Trust practice. “They’ve also completed the build-out of their networking feature set to provide an integrated SD-WAN solution. Combined with other recent enhancements to their secure access portfolio like ZTNA as a Service, they’re positioning to provide the features and capabilities that larger distributed enterprise organizations demand, while also building out a SASE strategy that will appeal to organizations of all sizes.” “As a multinational technology consulting firm that’s relied on Sophos Firewall since it was first incepted, Seidor Networks intimately knows the offering is a must-have solution for protecting against malware and other unwanted network traffic,” said Sean Hancock, ISP manager at Seidor Networks. “Sophos is continuously innovating and adding new features that are industry best. This new version of Sophos Firewall raises the bar even higher with unrivaled network protection and performance; and when you pair Sophos Firewall with Sophos XDR, the results are truly next level as endpoints and firewalls share real-time threat intelligence for further improved network visibility and lateral movement control.” “The new Sophos Firewall software has multiple advantages for all of our customers,” said Marc Hurrelmann, chief executive officer at Midland IT. “Many of the features added have been designed to address the challenges that larger organizations are facing with implementing SD-WAN, optimizing performance, scaling their network, improving resiliency and up-time, and enhancing management efficiency. Smaller organizations will benefit from all the added value packed into Sophos Firewall with better performance, protection, networking, and management.” About Sophos Sophos is a worldwide leader and innovator of advanced cybersecurity solutions, including Managed Detection and Response (MDR) and incident response services and a broad portfolio of endpoint, network, email, and cloud security technologies that help organizations defeat cyberattacks. As one of the largest pure-play cybersecurity providers, Sophos defends more than 500,000 organizations and more than 100 million users globally from active adversaries, ransomware, phishing, malware, and more. Sophos’ services and products connect through its cloud-based Sophos Central management console and are powered by Sophos X-Ops, the company’s cross-domain threat intelligence unit. Sophos X-Ops intelligence optimizes the entire Sophos Adaptive Cybersecurity Ecosystem, which includes a centralized data lake that leverages a rich set of open APIs available to customers, partners, developers, and other cybersecurity and information technology vendors. Sophos provides cybersecurity-as-a-service to organizations needing fully-managed, turnkey security solutions. Customers can also manage their cybersecurity directly with Sophos’ security operations platform or use a hybrid approach by supplementing their in-house teams with Sophos’ services, including threat hunting and remediation. Sophos sells through reseller partners and managed service providers (MSPs) worldwide. Sophos is headquartered in Oxford, U.K.

Read More

DESKTOP

Alludo Global Survey: Leaders Say They Support Remote and Hybrid Work for Their Teams—the Data Tells a Different Story

Alludo | November 23, 2022

Alludo, a global technology company helping people work better and live better, released survey results that highlight a clear divide in the freedom and flexibility that global management teams have versus individual contributors. While the majority of respondents agree that remote and hybrid work is here to stay, only 40% of non-managers have the freedom to work remotely compared to 63% of people managers* who can work from anywhere. The Alludo survey data shows that leadership has been slow to adopt change across all levels of the organization. Making the shift to a remote and hybrid work model requires a fundamental shift in the way leaders lead. In this new world, the employee-manager relationship is built on trust, and outcomes are the true indicators of success. Employees are no longer constrained by bureaucratic processes and micromanaging––a bottoms-up, “people-first” approach is needed instead of the command and control of the past. This concept is called Work3, an idea championed by Alludo during the company’s recent rebrand. Work3 is a shift in work culture that supports the notion that all employees should have the freedom and flexibility to choose where, when, and how they do their best work. “True leadership isn’t about getting people in a room to do what you want, It’s about giving employees the room to deliver amazing results. The last few years have proven that knowledge workers can be productive at home. It’s time for leadership teams to leave the mandatory 9-to-5 office experience behind and recognize that freedom and flexibility are key to not only working better but living better." Christa Quarles, Chief Executive Officer at Alludo In addition to where they work, employees want flexibility in when they work. The survey data confirms that three-fourths (74%) of employees no longer want to work a standard 9-to-5 day. However, almost half (47%) of non-managers still work standard hours compared to nearly one-third of managers. Again, this highlights the gap in the freedom offered to individual contributors versus managers, with the former having less flexibility when it comes to determining when and where they work. To be successful in the remote and hybrid world, leadership needs to create a cohesive vision, outline clear expectations and outcomes, and give their employees the freedom and flexibility to decide when, where, and how they do their best work. The reality, however, is a far different picture. The survey data shows that C-level executives believe they have adapted to the new way of managing, but non-managers disagree. 58% of C-level executives believe their company has changed the way remote and hybrid employees are managed. But 57% of non-managers disagree and say leadership has not changed their management style and 28% indicate they are still micromanaged. If leaders do not evolve their management style to give their employees more freedom and flexibility to choose where, when, and how they work, data shows that 43% of individual contributors would consider quitting or even changing careers––that’s nearly half! About Alludo Alludo™ is a global technology company helping people work better and live better. We’re the people behind award-winning, globally recognizable brands including Parallels®, Corel®, MindManager®, and WinZip®. Our professional-caliber graphics, virtualization, and productivity solutions are finely tuned for the digital remote workforce delivering the freedom to work when, where, and how you want. With a 35+ year legacy of innovation, Alludo empowers all you do, helping more than 2.5 million paying customers to enable, ideate, create, and share on any device, anywhere.

Read More

VPN

ExpressVPN confirms security of its desktop apps with three new independent audits

ExpressVPN | November 24, 2022

Leading consumer privacy and security company ExpressVPN has validated the security posture of all its desktop apps through three new independent audits by respected cybersecurity firms, Cure53 and F-Secure. The three new audits come just weeks after KPMG's audit of ExpressVPN's no-logs policy, underlining ExpressVPN's dedication to third-party privacy and security verifications. Cure53 tested both ExpressVPN's macOS and Linux desktop apps through white-box penetration tests and source code audits. The assessments confirm that the apps are secured against cyber security threats from malicious adversaries. This also validates the extensive work done by ExpressVPN's engineering and security experts in building a safer, more open internet for millions of people worldwide. F-Secure also reviewed ExpressVPN's Windows v12 app through penetration testing and source code auditing, and found no significant weaknesses. The audit verifies that ExpressVPN's latest Windows desktop app cannot be manipulated to leak information, such as a user's IP address, outside the VPN tunnel. It also confirms that the app is not susceptible to remote code execution attacks. Having all of ExpressVPN's desktop apps audited means that users can go online with the assurance that their privacy is protected, and do so confidently. The full audit report by Cure53 for macOS can be found here and Linux here. F-Secure's audit of ExpressVPN's Windows v12 app is available here. "As part of our continuous trust and transparency efforts, we're proud to announce that all of our desktop apps have now been audited, These audits are a testament to the efforts we put into improving and securing our product, and we're glad to receive the validation from Cure53 and F-Secure. We're committed to delivering audits on our mobile apps soon, and will continue to ensure privacy and security at every touchpoint of our product." Brian Schirmacher, penetration testing manager at ExpressVPN About ExpressVPN Since 2009, ExpressVPN has empowered millions of users to take control of their internet experience. The company's award-winning consumer VPN service is backed by its open-source VPN protocol Lightway, delivering user privacy in just a few clicks. ExpressVPN's Keys password manager and Aircove router make digital privacy and security easy and accessible for all. With a commitment to transparency, ExpressVPN products have been audited by PwC, Cure53, and others.

Read More

VIRTUAL DESKTOP STRATEGIES

Sophos Firewall Unleashes Xstream Power for Distributed and Enterprise Edge Computing

Sophos | November 22, 2022

Sophos, a global leader in innovating and delivering cybersecurity as a service, today introduced new Sophos Firewall capabilities to better meet the complex and demanding needs of distributed and enterprise edge computing. Sophos Firewall now delivers performance enhancements that accelerate encrypted traffic inspection, dynamic traffic routing for Internet Protocol version 6 (IPv6), added resiliency with software-defined wide area network (SD-WAN) load balancing and high-availability enhancements, and seamless integration with Microsoft Azure Active Directory. “One of the key benefits of the Xstream architecture and Flow Processors is that they are programmable. This means that while other firewalls get slower over time, we can increase performance, even when we add new features and capabilities, Our design ensures customers’ investment in Sophos Firewall is future-proofed and enables seamless transition to a cloud-enabled world. SD-WAN and Secure Access Service Edge (SASE) demand a more efficient platform, which is not only resilient but also makes day-to-day management easier and faster than ever.” Daniel Cole, vice president of network security product management at Sophos The effective and reliable assessment of network traffic is critical in protecting against threat actors, as evidenced in Sophos’ 2023 Threat Report that published today. Distributed offices, remote workforces, cloud workloads, custom-built legacy apps, and a growing reliance on global software-as-a-service providers create a configuration and risk management headache for network security managers. Sophos Firewall now provides the performance, protection and resiliency that distributed enterprises require, while simplifying the management of complex networks. Benefits include: Advanced performance and protection: A new high-performance dynamic routing engine and Xstream Transport Layer Security (TLS) FastPath acceleration improves encrypted traffic inspection while also adding headroom for traffic that requires deep-packet inspection; the asymmetric cryptographic capabilities within Xstream Flow Processors – included in every XGS Series appliance – enable TLS inspection on even the most demanding networks Added resiliency and peace of mind: New SD-WAN load balancing for performance and reliability in the event of an internet service providers’ (ISP) outage along with enhancements to high-availability clusters ensure maximum business continuity and uptime for mission critical networks Improved ease of management: Managing network security is easier than ever with new Microsoft Azure Active Directory integration for seamless administrator single sign-on and new host and service object search Sophos Firewall integrates with Sophos ZTNA (zero trust network access) under one unified management plane and is a key pillar of Sophos’ SASE strategy, providing a more simplified, scalable and secure solution over traditional remote-access virtual private networks (VPN). The network solution is also part of the Sophos Adaptive Cybersecurity Ecosystem, which integrates Sophos’ entire portfolio of products, services and Sophos X-Ops threat intelligence for faster and more contextual and synchronized detection, protection and response. Availability Sophos Firewall is available for immediate purchase exclusively through Sophos’ global channel of partners and Managed Service Providers (MSPs). It is easily managed in the cloud-native Sophos Central platform alongside other solutions, where users can oversee installations, respond to alerts and track licenses and upcoming renewal dates via a single, intuitive interface, or by Sophos Managed Detection and Response (MDR). What Analysts, Channel Partners and Customers Say “With their latest firewall release, Sophos has leveraged the flexibility of their Xstream architecture to deliver improvements in performance for VPN throughput and more efficient handling of TLS encrypted traffic, which is vitally important in today’s encrypted world,” said Christopher Rodriguez, research director of IDC’s Security & Trust practice. “They’ve also completed the build-out of their networking feature set to provide an integrated SD-WAN solution. Combined with other recent enhancements to their secure access portfolio like ZTNA as a Service, they’re positioning to provide the features and capabilities that larger distributed enterprise organizations demand, while also building out a SASE strategy that will appeal to organizations of all sizes.” “As a multinational technology consulting firm that’s relied on Sophos Firewall since it was first incepted, Seidor Networks intimately knows the offering is a must-have solution for protecting against malware and other unwanted network traffic,” said Sean Hancock, ISP manager at Seidor Networks. “Sophos is continuously innovating and adding new features that are industry best. This new version of Sophos Firewall raises the bar even higher with unrivaled network protection and performance; and when you pair Sophos Firewall with Sophos XDR, the results are truly next level as endpoints and firewalls share real-time threat intelligence for further improved network visibility and lateral movement control.” “The new Sophos Firewall software has multiple advantages for all of our customers,” said Marc Hurrelmann, chief executive officer at Midland IT. “Many of the features added have been designed to address the challenges that larger organizations are facing with implementing SD-WAN, optimizing performance, scaling their network, improving resiliency and up-time, and enhancing management efficiency. Smaller organizations will benefit from all the added value packed into Sophos Firewall with better performance, protection, networking, and management.” About Sophos Sophos is a worldwide leader and innovator of advanced cybersecurity solutions, including Managed Detection and Response (MDR) and incident response services and a broad portfolio of endpoint, network, email, and cloud security technologies that help organizations defeat cyberattacks. As one of the largest pure-play cybersecurity providers, Sophos defends more than 500,000 organizations and more than 100 million users globally from active adversaries, ransomware, phishing, malware, and more. Sophos’ services and products connect through its cloud-based Sophos Central management console and are powered by Sophos X-Ops, the company’s cross-domain threat intelligence unit. Sophos X-Ops intelligence optimizes the entire Sophos Adaptive Cybersecurity Ecosystem, which includes a centralized data lake that leverages a rich set of open APIs available to customers, partners, developers, and other cybersecurity and information technology vendors. Sophos provides cybersecurity-as-a-service to organizations needing fully-managed, turnkey security solutions. Customers can also manage their cybersecurity directly with Sophos’ security operations platform or use a hybrid approach by supplementing their in-house teams with Sophos’ services, including threat hunting and remediation. Sophos sells through reseller partners and managed service providers (MSPs) worldwide. Sophos is headquartered in Oxford, U.K.

Read More

DESKTOP

Alludo Global Survey: Leaders Say They Support Remote and Hybrid Work for Their Teams—the Data Tells a Different Story

Alludo | November 23, 2022

Alludo, a global technology company helping people work better and live better, released survey results that highlight a clear divide in the freedom and flexibility that global management teams have versus individual contributors. While the majority of respondents agree that remote and hybrid work is here to stay, only 40% of non-managers have the freedom to work remotely compared to 63% of people managers* who can work from anywhere. The Alludo survey data shows that leadership has been slow to adopt change across all levels of the organization. Making the shift to a remote and hybrid work model requires a fundamental shift in the way leaders lead. In this new world, the employee-manager relationship is built on trust, and outcomes are the true indicators of success. Employees are no longer constrained by bureaucratic processes and micromanaging––a bottoms-up, “people-first” approach is needed instead of the command and control of the past. This concept is called Work3, an idea championed by Alludo during the company’s recent rebrand. Work3 is a shift in work culture that supports the notion that all employees should have the freedom and flexibility to choose where, when, and how they do their best work. “True leadership isn’t about getting people in a room to do what you want, It’s about giving employees the room to deliver amazing results. The last few years have proven that knowledge workers can be productive at home. It’s time for leadership teams to leave the mandatory 9-to-5 office experience behind and recognize that freedom and flexibility are key to not only working better but living better." Christa Quarles, Chief Executive Officer at Alludo In addition to where they work, employees want flexibility in when they work. The survey data confirms that three-fourths (74%) of employees no longer want to work a standard 9-to-5 day. However, almost half (47%) of non-managers still work standard hours compared to nearly one-third of managers. Again, this highlights the gap in the freedom offered to individual contributors versus managers, with the former having less flexibility when it comes to determining when and where they work. To be successful in the remote and hybrid world, leadership needs to create a cohesive vision, outline clear expectations and outcomes, and give their employees the freedom and flexibility to decide when, where, and how they do their best work. The reality, however, is a far different picture. The survey data shows that C-level executives believe they have adapted to the new way of managing, but non-managers disagree. 58% of C-level executives believe their company has changed the way remote and hybrid employees are managed. But 57% of non-managers disagree and say leadership has not changed their management style and 28% indicate they are still micromanaged. If leaders do not evolve their management style to give their employees more freedom and flexibility to choose where, when, and how they work, data shows that 43% of individual contributors would consider quitting or even changing careers––that’s nearly half! About Alludo Alludo™ is a global technology company helping people work better and live better. We’re the people behind award-winning, globally recognizable brands including Parallels®, Corel®, MindManager®, and WinZip®. Our professional-caliber graphics, virtualization, and productivity solutions are finely tuned for the digital remote workforce delivering the freedom to work when, where, and how you want. With a 35+ year legacy of innovation, Alludo empowers all you do, helping more than 2.5 million paying customers to enable, ideate, create, and share on any device, anywhere.

Read More

Events