Cisco TelePresence Conductor on Virtual Machine

| January 16, 2018

article image
Cisco TelePresence Conductor (TelePresence Conductor) software supports flexible deployment options and is available as a virtualized application for VMware or similar virtual environments. This enables enterprises to run TelePresence Conductor on the ‘company standard’ Virtual Machine (VM) hardware platform for ease of management and deployment within an existing data center.

Spotlight

Center for Internet Security

CIS is a forward-thinking nonprofit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats. Our CIS Controls and CIS Benchmarks are the global standard and recognized best practices for securing IT systems and data against the most pervasive attacks. These proven guidelines are continually refined and verified by a volunteer global community of experienced IT professionals. CIS is home to the Multi-State Information Sharing & Analysis Center (MS-ISAC®), the go-to resource for cyber threat prevention, protection, response, and recovery for state, local, tribal, and territorial government entities.

OTHER ARTICLES

vSphere 7 – Announcing General Availability of the New Generation of vSphere

Article | April 3, 2020

VMware vSphere 7, the new generation of vSphere, is now generally available. This major new release brings a massive improvement in the work experience of vSphere administrators, folks who are responsible for the security, performance, and resiliency of the infrastructure and applications that provide all the key services to their organizations. The purpose of this major release from vSphere is two-fold. The first is to embed containers and Kubernetes into vSphere, unifying them with virtual machines as first class citizens. This enables all vSphere administrators to become Kubernetes administrators and easily deliver new services to their developers. More on this in part two of this blog post, when vSphere 7 with Kubernetes becomes available as part of VMware Cloud Foundation 4. If you’re interested in vSphere 7 with Kubernetes, please visit the VMware Cloud Foundation blog site to learn more.

Read More

Why America Must win the Race to 5G

Article | March 15, 2020

The United States has entered another technology duel on par with the space race—the race for the 5G network. It will revolutionize digital interconnectivity through enhanced data processing and storage capacity. The Chinese technology giant Huawei is capturing the 5G telecommunications equipment industry worldwide. Huawei promotes contracts covering every aspect of the 5G network from financing to installation. The United States is concerned that the company’s growth amplifies China’s political sway and brings security vulnerabilities. Huawei is subservient to the communist government under Chinese law. Multiple governments have indicted Huawei for espionage, theft, bribery, and corruption. The United States has added to these charges obstruction of justice, fraud, and illicit sales to the rogue regimes of Iran and North Korea. As the West and China haggle over the 5G market, several nations face a telling choice. To meet the 5G challenge, the United States should negotiate trade agreements on end-to-end 5G services, create supply chains for upcoming virtualized 5G networks, support alternate suppliers, and invest in domestic research to dampen Huawei’s expansion.

Read More

Security that’s Designed for the Modern Data Center

Article | February 26, 2020

The last 12 months have been incredibly exciting for the security business at VMware. Last year at RSA Conference 2019, VMware CEO Pat Gelsinger outlined our Intrinsic Security strategy in his keynote presentation, “3 Things the Security Industry Isn’t Talking About”. We also announced the VMware Service-defined Firewall, a stateful Layer 7 data center firewall. As pioneers of micro-segmentation, the Service-defined Firewall extended our leadership in protecting east-west traffic in the data center. Later in the year, we announced two major acquisitions –Avi Networks and Carbon Black. The acquisition of Carbon Black brought to VMware an industry-leading endpoint security platform, and made the entire industry take notice of VMware’s intentions to transform security. With Avi Networks, we acquired a software-defined, elastic, and high-performance load balancer that comes equipped with a full-featured web application firewall (WAF). Maintaining the momentum in building out our security portfolio for the digital enterprise, we announced the VMware NSX Distributed Intrusion Detection and Prevention System which will bring advanced threat controls to the Service-defined Firewall.

Read More

Go beyond Docker with WebAssembly on the server-side

Article | March 30, 2020

Docker changed the way services and applications are designed, implemented and deployed. Before Docker, applications and services had to work cooperatively on the same machine. Sometimes they did, sometimes they didn’t. If something went wrong an entire machine, virtual or real, needed to be re-provisioned. It was an expensive and time-consuming way to go about application deployment. Nowadays, a Docker container thinks it’s the only process that runs on a machine. The result is that companies can run thousands of isolated containers on a single machine. Containers can also be created and destroyed at a moment’s notice to meet load demands. Docker opened a whole new movement in enterprise computing that’s both efficient and cost-effective.

Read More

Spotlight

Center for Internet Security

CIS is a forward-thinking nonprofit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats. Our CIS Controls and CIS Benchmarks are the global standard and recognized best practices for securing IT systems and data against the most pervasive attacks. These proven guidelines are continually refined and verified by a volunteer global community of experienced IT professionals. CIS is home to the Multi-State Information Sharing & Analysis Center (MS-ISAC®), the go-to resource for cyber threat prevention, protection, response, and recovery for state, local, tribal, and territorial government entities.

Events