Cloud Computing: A Long-Term Strategy Rather Than Short-Term Tactical One

The cloud is the number one technology that IT professionals say will impact their companies, according to a recent study by Pluribus. The cloud is rated higher than other technologies like desktop virtualization and converged infrastructures.

Spotlight

Sony Mobile Communications

As part of the Sony Corporation family, Sony Mobile draws upon leading international innovation in engineering and designing audio, video, gaming, and communications to bring more to the everyday experience of life.

OTHER ARTICLES
Server Hypervisors

Boosting Productivity with Kubernetes and Docker

Article | September 9, 2022

Learn setting up a Docker and Kubernetes environment with the right considerations and choose the best-suited software from ten leading tools, softwares and platforms for your business needs. Contents The blog discusses how Kubernetes and Docker can boost software development and deployment productivity. In addition, it covers the benefits of the role of Kubernetes in orchestrating containerized applications and best practices for implementing these technologies to improve efficiency and streamline workflows. Docker and Kubernetes are both essential containerization ecosystem utilities. Kubernetes, an excellent DevOps solution, manages and automates containers' deployment and scaling, along with operating across clusters of hosts, whereas Docker is used for creating and operating containers. The blog covers tips to consider while choosing tools/platforms. It further enlists ten platforms providing Kubernetes and Docker, featuring their offerings. 1. Considerations While Setting Up a Development Environment with Kubernetes and Docker 1.1 Fluid app delivery A platform for application development must provide development teams with high velocity. Two factors contribute to high velocity: rapid application delivery and brief development cycles. Application platforms must support build processes that start with source code. The platforms must also facilitate the repetitive deployment of applications on any remote staging instance. 1.2 Polyglot support Consistency is the defining characteristic of an application platform. On-demand, repetitive, and reproducible builds must be supported by the platform. Extending a consistent experience across all languages and frameworks elevates the platform experience. The platform must support a native build process and the ability to develop and customize this build process. 1.3 Baked-in security Containerized environments are secured in a significantly different manner than conventional applications. A fundamental best practice is to utilize binaries compiled with all necessary dependencies. The build procedure should also include a directive to eliminate unnecessary components for the application's operation. Setting up a zero-trust architecture between platform components that orchestrate deployments significantly improves the workloads' security posture. 1.4 Adjustable abstractions A platform with paved paths and the flexibility to accommodate the requirements of software engineering teams has a greater chance of success. Open-source platforms score highly in this regard, particularly those with modular architectures that allow the team to swap out parts as they adjust. 2.Top Tips to Consider While Choosing Tools and Platforms for Kubernetes and Docker 2.1 Production-Readiness Configuring Kubernetes or Docker can be complex and resource-intensive. A production-ready platform will ensure having the necessary fully automated features without the need for configuration. Security is an essential aspect of production readiness. Additionally, automation is critical, as production readiness requires that the solution manage all cluster management duties. Automated backup, recovery, and restore capabilities must be considered. Also, ensure the high availability, scalability, and self-healing of the cluster's platform. 2.2 Future-Readiness As the cloud and software evolve, a system's hosting location may affect its efficacy. The current trend is a multi-cloud strategy. Ensure that the platform can support abstracting from cloud or data center providers and building a shared infrastructure across clouds, cloud regions, and data centers, as well as assist in configuring them if required. According to a recent study, nearly one-third of organizations are already collaborating with four or more cloud service providers. (Source: Microsoft and 451 Research) 2.3 Ease of Administration Managing a Docker or Kubernetes cluster is complex and requires various skill sets. Kubernetes generates a lot of unprocessed data, which must be interpreted to comprehend what's happening with the cluster. Early detection and intervention are crucial to disaster prevention. Identifying a platform that eliminates the issue of analyzing raw data is essential. By incorporating automated intelligent monitoring and alerts, such solutions can provide critical status, error, event, and warning data to take appropriate action. 2.4 Assistance and Training As the organization begins to acquire Kubernetesor Docker skills, it is essential to have a vendor that can provide 24/7 support and training to ensure a seamless transition. Incorrect implementation will add a layer of complexity to infrastructure management. Leverage automation tools that offer the support needed to use Kubernetes and Docker without the management burden. 3. 10 Tools and Platforms Providing Kubernetes and Docker 3.1 Aqua Cloud Native Security Platform: Aqua Security provides the Aqua Cloud Native Security Platform, a comprehensive security solution designed to protect cloud-native applications and microservices. Aqua offers end-to-end security for applications operating on Docker Enterprise Edition (Community Edition), protecting the DevOps pipeline and production workloads with complete visibility and control. It provides end-to-end security across the entire application lifecycle, from development to production, for both containerized and serverless workloads. In addition, it automates prevention, detection, and response across the whole application lifecycle to secure the build, cloud infrastructure, and operating workloads, regardless of where they are deployed. 3.2 Weave Gitops Enterprise Weave GitOps Enterprise, a full-stack, developer-centric operating model for Kubernetes, creates and contributes to several open-source projects. Its products and services enable teams to design, build, and operate their Kubernetes platform at scale. Built by the creators of Flux and Flagger, Weave GitOps allows users to deploy and manage Kubernetes clusters and applications in the public or private cloud or their own data center. Weave GitOps Enterprise helps simplify Kubernetes with fully automated continuous delivery pipelines that roll out changes from development to staging and production. Weaveworks has used Kubernetes in production for over eight years and has developed that expertise into Weave GitOps Enterprise. 3.3 Mirantis Kubernetes Engine Mirantis provides the Mirantis Kubernetes Engine, a platform designed to help organizations deploy, manage, and scale their Kubernetes clusters. It includes features such as container orchestration, automated deployment, monitoring, and high availability, all designed to help organizations build and run their applications at scale. Mirantis Kubernetes Engine also includes a set of tools for managing the lifecycle of Kubernetes clusters, including cluster deployment, upgrades, and patching. It also has security scanning and policy enforcement features, as well as integration with other enterprise IT systems such as Active Directory and LDAP. 3.4 Portworx by Pure Storage Portworx's deep integration into Docker gives Portworx container data services benefits directly through the Docker Swarm scheduler. Swarm service creation brings the management capability of Portworx to the Docker persistent storage layer to avoid complex tasks such as increasing the storage pool without container downtime and problems like stuck EBS drives. Portworx is also a multi-cloud-ready Kubernetes storage and administration platform designed to simplify and streamline data management in Kubernetes. The platform abstracts the complexity of data storage in Kubernetes. Additionally, it serves as a software-defined layer that aggregates Kubernetes nodes' data storage into a virtual reservoir. 3.5 Platform9 Platform9 provides a powerful IDE for developers for simplified in-context views of pods, logs, events, and more. Both development and operations teams can access the information they need in an instant, secured through SSO and Kubernetes RBAC. The industry’s first SaaS-managed approach combined with a best-in-class support and customer success organization with a 99.9% consistent CSAT rating delivers production-ready K8s to organizations of any size. It provides services to deploy a cluster instantly, achieve GitOps faster, and take care of every aspect of cluster management, including remote monitoring, self-healing, automatic troubleshooting, and proactive issue resolution, around the clock. 3.6 Kubernetes Network Security Sysdig provides Kubernetes Network Security, a solution that offers cloud security from source to run. The product provides network security for Kubernetes environments by monitoring and blocking suspicious traffic in real time. It helps organizations protect their Kubernetes clusters against advanced threats and attacks. The product and Sysdig Secure offer Kubernetes Network Monitoring to investigate suspicious traffic and connection attempts, Kubernetes-Native Microsegmentation to enable microsegmentation without breaking the application, and Automated Network Policies to save time by automating Kubernetes network policies. 3.7 Kubernetes Operations Platform for Edge Rafay delivers a production-ready Kubernetes Operations Platform for Edge, streamlining ongoing operations for edge applications. It provides centralized multi-cluster management to deploy, manage, and upgrade all Kubernetes clusters from a single console across all edge nodes. In addition, it offers comprehensive lifecycle management, with which users can quickly and easily provision Kubernetes clusters at the edge, where cluster updates and upgrades are seamless with no downtime. Furthermore, the KMC for Edge quickly integrates with enterprise-class SSO solutions such as Okta, Ping One, and Azure AD, among others. Other features include standardized clusters and workflows, integration and automation, and centralized logging and monitoring. 3.8 Opcito Technologies Opcito provides simplified container management with efficient provisioning, deployment, scaling, and networking. Its application containerization expertise helps containerize existing and new applications and dependencies. Opcito is well-versed in leading container orchestration platforms like Docker Swarm and Kubernetes. While it helps choose the container platform that best suits specific application needs, it also helps with the end-to-end management of containers so clients can release applications faster and focus on innovation and business. The container management and orchestration services include: building secured microservices, Enterprise-scale Container Management and Orchestration, Orchestration, and Container Monitoring. 3.9 D2iQ Kubernetes Platform (DKP) D2iQ (DKP) enables enterprises to take advantage of all the benefits of cloud-native Kubernetes while laying the groundwork for intelligent cloud-native innovation by simplifying Kubernetes deployment and maintenance. It simplifies and automates the most difficult parts of an enterprise Kubernetes deployment across all infrastructures. DKP helps enterprises easily overcome operational barriers and set them up in minutes and hours rather than weeks and months. In addition, DKP simplifies Kubernetes management through automation using GitOps workflow, observability, application catalog, real-time cost management, and more. 3.10 Spektra Spektra, by Diamanti, a multi-cluster management solution for DevOps and production teams, provides centralized multi-cluster management, a single control plane to deliver everything needed to provision and manage the lifecycle of multiple clusters. Spektra is built to cater to business needs, from air-gapped on-prem deployments to hybrid and multi-cloud infrastructures. It also enables stretching resources across different clusters within the tenant. Furthermore, it allows you to move workloads and their associated data from one cluster to another directly from its dashboard. Spektra integrates with lightweight directory access protocols (LDAP) and Active Directory (AD) to enable user authentication and streamline resource access. In addition, it offers application migration, data mobility, and reporting. 4. Conclusion It is evident that Kubernetes and Docker can significantly boost software development and deployment productivity. By adopting appropriate containerization platforms and leveraging Kubernetes for orchestration, organizations can streamline workflows, improve efficiency, and enhance the reliability of their applications. Furthermore, following the tips to choose the tools or platform carefully can further improve productivity.

Read More
Virtual Desktop Tools, Server Hypervisors

VM Applications for Software Development and Secure Testing

Article | April 28, 2023

Contents 1. Introduction 2. Software Development and Secure Testing 3. Using VMs in Software Development and Secure Testing 4. Conclusion 1. Introduction “Testing is an infinite process of comparing the invisible to the ambiguous in order to avoid the unthinkable happening to the anonymous.” —James Bach. Testing software is crucial for identifying and fixing security vulnerabilities. However, meeting quality standards for functionality and performance does not guarantee security. Thus, software testing nowadays is a must to identify and address application security vulnerabilities to maintain the following: Security of data history, databases, information, and servers Customers’ integrity and trust Web application protection from future attacks VMs provide a flexible and isolated environment for software development and security testing. They offer easy replication of complex configurations and testing scenarios, allowing efficient issue resolution. VMs also provide secure testing by isolating applications from the host system and enabling a reset to a previous state. In addition, they facilitate DevOps practices and streamline the development workflow. 2. Software Development and Secure Testing Software Secure Testing: The Approach The following approaches must be considered while preparing and planning for security tests: Architecture Study and Analysis: Understand whether the software meets the necessary requirements. Threat Classification: List all potential threats and risk factors that must be tested. Test Planning: Run the tests based on the identified threats, vulnerabilities, and security risks. Testing Tool Identification: For software security testing tools for web applications, the developer must identify the relevant security tools to test the software for specific use cases. Test-Case Execution: After performing a security test, the developer should fix it using any suitable open-source code or manually. Reports: Prepare a detailed test report of the security tests performed, containing a list of the vulnerabilities, threats, and issues resolved and the ones that are still pending. Ensuring the security of an application that handles essential functions is paramount. This may involve safeguarding databases against malicious attacks or implementing fraud detection mechanisms for incoming leads before integrating them into the platform. Maintaining security is crucial throughout the software development life cycle (SDLC) and must be at the forefront of developers' minds while executing the software's requirements. With consistent effort, the SDLC pipeline addresses security issues before deployment, reducing the risk of discovering application vulnerabilities while minimizing the damage they could cause. A secure SDLC makes developers responsible for critical security. Developers need to be aware of potential security concerns at each step of the process. This requires integrating security into the SDLC in ways that were not needed before. As anyone can potentially access source code, coding with potential vulnerabilities in mind is essential. As such, having a robust and secure SDLC process is critical to ensuring applications are not subject to attacks by hackers. 3. Using VMs in Software Development and Secure Testing: Snapshotting: Snapshotting allows developers to capture a VM's state at a specific point in time and restore it later. This feature is helpful for debugging and enables developers to roll back to a previous state when an error occurs. A virtual machine provides several operations for creating and managing snapshots and snapshot chains. These operations let users create snapshots, revert to any snapshots in the chain, and remove snapshots. In addition, extensive snapshot trees can be created to streamline the flow. Virtual Networking: It allows virtual machines to be connected to virtual networks that simulate complex network topologies, allowing developers to test their applications in different network environments. This allows expanding data centers to cover multiple physical locations, gaining access to a plethora of more efficient options. This empowers them to effortlessly modify the network as per changing requirements without any additional hardware. Moreover, providing the network for specific applications and needs offers greater flexibility. Additionally, it enables workloads to be moved seamlessly across the network infrastructure without compromising on service, security, or availability. Resource Allocation: VMs can be configured with specific resource allocations such as CPU, RAM, and storage, allowing developers to test their applications under different resource constraints. Maintaining a 1:1 ratio between the virtual machine processor and its host or core is highly recommended. It's crucial to refrain from over-subscribing virtual machine processors to a single core, as this could lead to stalled or delayed events, causing significant frustration and dissatisfaction among users. However, it is essential to acknowledge that IT administrators sometimes overallocate virtual machine processors. In such cases, a practical approach is to start with a 2:1 ratio and gradually move towards 4:1, 8:1, 12:1, and so on while bringing virtual allocation into IT infrastructure. This approach ensures a safe and seamless transition towards optimized virtual resource allocation. Containerization within VMs: Containerization within VMs provides an additional layer of isolation and security for applications. Enterprises are finding new use cases for VMs to utilize their in-house and cloud infrastructure to support heavy-duty application and networking workloads. This will also have a positive impact on the environment. DevOps teams use containerization with virtualization to improve software development flexibility. Containers allow multiple apps to run in one container with the necessary components, such as code, system tools, and libraries. For complex applications, both virtual machines and containers are used together. However, while containers are used for the front-end and middleware, VMs are used for the back-end. VM Templates: VM templates are pre-configured virtual machines that can be used as a base for creating new virtual machines, making it easier to set up development and testing environments. A VM template is an image of a virtual machine that serves as a master copy. It includes VM disks, virtual devices, and settings. By using a VM template, cloning a virtual machine multiple times can be achieved. When you clone a VM from a template, the clones are independent and not linked to the template. VM templates are handy when a large number of similar VMs need to be deployed. They preserve VM consistency. To edit a template, convert it to a VM, make the necessary changes, and then convert the edited VM back into a new template. Remote Access: VMs can be accessed remotely, allowing developers and testers to collaborate more effectively from anywhere worldwide. To manage a virtual machine, follow these steps: enable remote access, connect to the virtual machine, and then access the VNC or serial console. Once connected, full permission to manage the virtual machine is granted with the user's approval. Remote access provides a secure way to access VMs, as connections can be encrypted and authenticated to prevent unauthorized access. Additionally, remote access allows for easier management of VMs, as administrators can monitor and control virtual machines from a central location. DevOps Integration: DevOps is a collection of practices, principles, and tools that allow a team to release software quickly and efficiently. Virtualization is vital in DevOps when developing intricate cloud, API, and SOA systems. Virtual machines enable teams to simulate environments for creating, testing, and launching code, ultimately preserving computing resources. While commencing a bug search at the API layer, teams find that virtual machines are suitable for test-driven development (TDD). Virtualization providers handle updates, freeing up DevOps teams, to focus on other areas and increasing productivity by 50 –60%. In addition, VMs allow for simultaneous testing of multiple release and patch levels, improving product compatibility and interoperability. 4. Conclusion The outlook for virtual machine applications is highly promising in the development and testing fields. With the increasing complexity of development and testing processes, VMs can significantly simplify and streamline these operations. In the future, VMs are expected to become even more versatile and potent, providing developers and testers with a broader range of tools and capabilities to facilitate the development process. One potential future development is integrating machine learning and artificial intelligence into VMs. This would enable VMs to automate various tasks, optimize the allocation of resources, and generate recommendations based on performance data. Moreover, VMs may become more agile and lightweight, allowing developers and testers to spin up and spin down instances with greater efficiency. The future of VM applications for software development and security testing looks bright, with continued innovation and development expected to provide developers and testers with even more powerful and flexible tools to improve the software development process.

Read More
VMware, Vsphere, Hyper-V

Scaling Your Business the Easy Way—with SD-WAN as a Service

Article | May 2, 2023

SD-WANs are a critical component of digital transformation. Using software-defined networking (SDN) and virtual network functions (VNF) concepts to build and manage a wide area network (WAN) helps businesses successfully transition their infrastructure to the cloud by securely connecting hybrid multicloud architectures. But SD-WANs can do more than just facilitate a transition to the cloud —they make it faster and less expensive to expand your business.

Read More

Virtualizing Broadband Networks: Q&A with Tom Cloonan and David Grubb

Article | June 11, 2020

The future of broadband networks is fast, pervasive, reliable, and increasingly, virtual. Dell’Oro predicts that virtual CMTS/CCAP revenue will grow from $90 million in 2019 to $418 million worldwide in 2024. While network virtualization is still in its earliest stages of deployment, many operators have begun building their strategy for virtualizing one or more components of their broadband networks.

Read More

Spotlight

Sony Mobile Communications

As part of the Sony Corporation family, Sony Mobile draws upon leading international innovation in engineering and designing audio, video, gaming, and communications to bring more to the everyday experience of life.

Related News

Virtual Desktop Tools, Virtual Desktop Strategies

Leostream Enhances Security and Management of vSphere Hybrid Cloud Deployments

Business Wire | January 29, 2024

Leostream Corporation, the world's leading Remote Desktop Access Platform provider, today announced features to enhance security, management, and end-user productivity in vSphere-based hybrid cloud environments. The Leostream platform strengthens end-user computing (EUC) capabilities for vSphere users, including secure access to both on-premises and cloud environments, heterogeneous support, and reduced cloud costs. With the Leostream platform as the single pane of glass managing EUC environments, any hosted desktop environment, including individual virtual desktops, multi-user sessions, hosted physical workstations or desktops, and hosted applications, becomes simpler to manage, more secure, more flexible, and more cost-effective. Significant ways the Leostream platform expands vSphere’s capabilities include: Security The Leostream platform ensures data remains locked in the corporate network, and works across on-premises and cloud environments, providing even disparate infrastructures with the same levels of security and command over authorization, control, and access tracking. The Leostream platform supports multi-factor authentication and allows organizations to enforce strict access control rules, creating an EUC environment modeled on a zero-trust architecture. Multivendor/protocol support The Leostream platform was developed from the ground up for heterogeneous infrastructures and as the connection management layer of the EUC environment, the Leostream platform allows organizations to leverage vSphere today and other hypervisors or hyperconvergence platforms in the future as their needs evolve. The Leostream platform supports the industry’s broadest array of remote display protocols, including specialized protocols for mission-critical tasks. Consistent EUC experience The Leostream platform enables IT to make changes to the underlying environment while ensuring the end user experience is constant, and to incorporate AWS, Azure, Google Cloud, or OpenStack private clouds into their environment without disruptions in end-user productivity. By integrating with corporate Identity Providers (IdPs) that employees are already familiar with, and providing employees with a single portal they use to sign in, the Leostream platform offers simplicity to users too. Connectivity The Leostream Gateway securely connects to on-prem and cloud resources without virtual private networks (VPNs), and eliminates the need to manage and maintain security groups. End users get the same seamless login and high-performance connection across hybrid environments including corporate resources located off the internet. Controlling cloud costs The Leostream Connection Broker implements automated rules that control capacity and power state in the cloud, allowing organizations to optimize their cloud usage and minimize costs, such as ensuring cloud instances aren’t left running when they are no longer needed. The Connection Broker also intelligently pools and shares resources across groups of users, so organizations can invest in fewer systems, reducing overall cost of ownership. “These features deliver a streamlined experience with vSphere and hybrid or multi-cloud resources so end users remain productive, and corporate data and applications remain secure,” said Leostream CEO Karen Gondoly. “At a time when there is uncertainty about the future of support for VMware’s end-user computing, it’s important to bring these options to the market to show that organizations can extend vSphere’s capabilities and simultaneously plan for the future without disruption to the workforce.” About Leostream Corporation Leostream Corporation, the global leader in Remote Desktop Access Platforms, offers comprehensive solutions that enable seamless work-from-anywhere environments for individuals across diverse industries, regardless of organization size or location. The core of the Leostream platform is its commitment to simplicity and insight. It is driven by a unified administrative console that streamlines the management of users, cloud desktops, and IT assets while providing real-time dashboards for informed decision-making. The company continually monitors the evolving remote desktop landscape, anticipating future trends and challenges. This purposeful, proactive approach keeps clients well-prepared for the dynamic changes in remote desktop technology.

Read More

Virtual Desktop Tools, Desktop

Other World Computing Releases MacDrive 11 with Full APFS Support, Unleashes Most Complete Tool for Access of Mac Disks on Windows PCs

PR Newswire | July 05, 2023

Other World Computing® The leading end-to-end ecosystem solution provider of computer hardware, accessories, and software for both consumers and professionals – today announced the release of MacDrive 11 with full APFS support, making it the most complete single solution for seamlessly accessing Mac-formatted drives and media on a Windows PC. Along with complete access, MacDrive 11 performs more than 40% faster than other available solutions – all while protecting your data from failure. For over 25 years, MacDrive has been the industry standard for reading, writing and managing HFS+ Mac disks in Windows. MacDrive 11 builds on this strong tradition by adding unmatched support for APFS disks with full read and write access, and protections not available in any other solution. MacDrive is the most robust, most advanced utility enabling users to share drives between Macs and PCs. MacDrive 11 comes in two variations; Standard to access almost any APFS or HFS+ formatted Mac drive, and Pro with advanced disk support for OWC's SoftRAID and Apple RAID 0/1 volumes. MacDrive 11 APFS Functionality Highlights: Read and write: MacDrive 11 is the only solution that provides full read-and-write support for APFS volumes–even if the volume has duplicated files or has been backed up by Time Machine. Crash Protection: Unlike other solutions, if an APFS disk is unexpectedly unplugged, existing files and data are safe, and won't be corrupted. Multi-volume disks: APFS allows users to create multiple volumes in a single partition and share free space between volumes. Only MacDrive lets user effortlessly switch between volumes to access all of their data. Formatting: Don't have a Mac, but want to share files with someone that does? MacDrive enables the creation APFS and HFS+ volumes right on a PC. Snapshots: When backed up with Time Machine, macOS creates "snapshots" on APFS volumes. MacDrive provides access to all snapshots, letting users restore deleted or edited files from previous states, even when a Time Machine backup isn't available. Duplicated files: In macOS, APFS files can be instantly duplicated, without consuming additional disk space. Only MacDrive provides full read-write access to duplicated files on APFS volumes. Make Windows Smarter Once installed, MacDrive 11 makes Windows "Mac aware" by enabling PCs to read and write Mac disks just like PC disks. There is nothing to launch or learn; simply connect a Mac disk and access almost any hard drives, SSDs (solid state drives), CDs, DVDs, floppies, and more. Additional MacDrive 11 Features: Full circle compatibility: Streamline editing and collaboration processes by sharing Mac disks with Windows users as well as formatting Mac disks direct from a PC for true cross-platform workflows. Repair Mac disks: MacDrive's Disk Repair feature will automatically detect issues with Mac disks and will fix common errors on disks (HFS+ only). Time Machine backups: Browse through Time Machine backups as well as copy those files and folders to a Windows PC. Native or virtual: Works with Apple's Boot Camp utility and virtualization software like VMware Fusion or Parallels. File defragmentation: Improve disk performance with automatic file defragmentation and optimization (HFS+ only). Read-only option: "Read Only" mode is perfect for forensic specialists and law enforcement to prevent changes to disks. About Other World Computing (OWC) Other World Computing (OWC), founded in 1988, provides Mac and PC enthusiasts with reliable solutions for computer hardware, accessories, and software at both the consumer and professional levels. In opposition to our disposable world, OWC's products are intended to serve as the life-extending foundation of personal and/or professional digital life, from capture to completion, enabling users to maximize their technology investments. The company has extended its quality, long-term solutions for creative professionals to serving enterprises, small businesses, and education administration. OWC's award-winning team of technologists, engineers, creatives, and professionals have a passion for improving technology and are dedicated to bringing the best solutions that last and true leadership in doing so sustainably for the benefit of all.

Read More

Virtual Desktop Tools, Cloud

Anjuna Adds Support for Microsoft Azure Confidential VMs

Globenewswire | July 04, 2023

Anjuna Security Inc., a confidential computing software company, today announced that its flagship product, the Anjuna Confidential Computing Platform, now supports Microsoft Azure confidential virtual machines (VMs) powered by AMD EPYC™ processors with Secure Encrypted Virtualization-Secure Nested Paging (SEV-SNP) security features. This added functionality represents a significant advancement in Anjuna’s support for Azure confidential computing (ACC) solutions and increases flexibility of choice for Microsoft customers. “As a leader in off-chain computation, where trust and security are non-negotiable, we are very excited by Anjuna’s expanded support for the latest AMD SEV-SNP confidential computing technology on Microsoft Azure that provides powerful isolation, risk reduction, and simplicity for sensitive data and code, taking confidential computing ease of use, trust, and simplicity to next level,” said Mitch Gildenberg, Switchboard CTO. Azure confidential VMs, powered by AMD SEV-SNP, provide a robust platform to securely migrate and run enterprise applications to the cloud with data-in-use protection. While running in confidential VMs, applications can be isolated from other VMs, the hypervisor, and cloud infrastructure operators. Additionally, Anjuna's solution provides further isolation and safeguards for threats originating from the guest OS, misconfigurations, and other applications running in the same VM and the VM administrator. With more organizations processing more sensitive data in the cloud for generative AI, financial systems, and high-value transactions processing, however, security must extend to cover all these additional threats. Anjuna Confidential Computing Platform enhances Azure confidential VMs, strengthening data protection and improving operational efficiency at scale. Anjuna automates the end-to-end deployment process and further protects applications in hardened Anjuna Confidential Containers that cannot be accessed by the other applications or the VM administrator. Moreover, Anjuna seamlessly and without code changes integrates attestation-aware key management capabilities via the Anjuna Policy Manager, ensuring that secrets are exclusively distributed to trusted applications. “At Anjuna, we believe Confidential Computing should be ubiquitous, easy to use, and above all, secure without trade-offs. For too long, enterprises have had to choose between ease of use and security. In today’s digital economy, this is no longer acceptable,” said Ayal Yogev, CEO and co-founder of Anjuna Security. “Microsoft Azure is a leading innovator in confidential computing and we are excited to be among the first Confidential Computing software providers to support both their Intel SGX and AMD SEV-SNP powered infrastructure. We are committed to keep working closely with Microsoft to unlock the full potential of Azure Confidential Computing services.” “We are committed to making Microsoft Azure a trusted cloud platform offering a broad portfolio of Confidential Computing solutions to customers,” said Vikas Bhatia, Head of Product, Azure confidential computing at Microsoft. “The combination of Azure confidential VMs powered by AMD SEV-SNP and the Anjuna Confidential Computing Platform unlocks value to customers, ensuring high levels of data protection and privacy with streamlined operations and ease of use.” About Anjuna Security Anjuna allows applications to run in any cloud with complete data security and privacy. Anjuna isolates workloads in a protected environment that intrinsically secures data in every state. Anjuna empowers enterprises to directly control application-level trust policies, ensuring that only trusted code can access sensitive data. Anjuna works with enterprises around the globe in industries such as financial services, government, and blockchain. To learn more about Anjuna’s platform and impact, visit Anjuna.io.

Read More

Virtual Desktop Tools, Virtual Desktop Strategies

Leostream Enhances Security and Management of vSphere Hybrid Cloud Deployments

Business Wire | January 29, 2024

Leostream Corporation, the world's leading Remote Desktop Access Platform provider, today announced features to enhance security, management, and end-user productivity in vSphere-based hybrid cloud environments. The Leostream platform strengthens end-user computing (EUC) capabilities for vSphere users, including secure access to both on-premises and cloud environments, heterogeneous support, and reduced cloud costs. With the Leostream platform as the single pane of glass managing EUC environments, any hosted desktop environment, including individual virtual desktops, multi-user sessions, hosted physical workstations or desktops, and hosted applications, becomes simpler to manage, more secure, more flexible, and more cost-effective. Significant ways the Leostream platform expands vSphere’s capabilities include: Security The Leostream platform ensures data remains locked in the corporate network, and works across on-premises and cloud environments, providing even disparate infrastructures with the same levels of security and command over authorization, control, and access tracking. The Leostream platform supports multi-factor authentication and allows organizations to enforce strict access control rules, creating an EUC environment modeled on a zero-trust architecture. Multivendor/protocol support The Leostream platform was developed from the ground up for heterogeneous infrastructures and as the connection management layer of the EUC environment, the Leostream platform allows organizations to leverage vSphere today and other hypervisors or hyperconvergence platforms in the future as their needs evolve. The Leostream platform supports the industry’s broadest array of remote display protocols, including specialized protocols for mission-critical tasks. Consistent EUC experience The Leostream platform enables IT to make changes to the underlying environment while ensuring the end user experience is constant, and to incorporate AWS, Azure, Google Cloud, or OpenStack private clouds into their environment without disruptions in end-user productivity. By integrating with corporate Identity Providers (IdPs) that employees are already familiar with, and providing employees with a single portal they use to sign in, the Leostream platform offers simplicity to users too. Connectivity The Leostream Gateway securely connects to on-prem and cloud resources without virtual private networks (VPNs), and eliminates the need to manage and maintain security groups. End users get the same seamless login and high-performance connection across hybrid environments including corporate resources located off the internet. Controlling cloud costs The Leostream Connection Broker implements automated rules that control capacity and power state in the cloud, allowing organizations to optimize their cloud usage and minimize costs, such as ensuring cloud instances aren’t left running when they are no longer needed. The Connection Broker also intelligently pools and shares resources across groups of users, so organizations can invest in fewer systems, reducing overall cost of ownership. “These features deliver a streamlined experience with vSphere and hybrid or multi-cloud resources so end users remain productive, and corporate data and applications remain secure,” said Leostream CEO Karen Gondoly. “At a time when there is uncertainty about the future of support for VMware’s end-user computing, it’s important to bring these options to the market to show that organizations can extend vSphere’s capabilities and simultaneously plan for the future without disruption to the workforce.” About Leostream Corporation Leostream Corporation, the global leader in Remote Desktop Access Platforms, offers comprehensive solutions that enable seamless work-from-anywhere environments for individuals across diverse industries, regardless of organization size or location. The core of the Leostream platform is its commitment to simplicity and insight. It is driven by a unified administrative console that streamlines the management of users, cloud desktops, and IT assets while providing real-time dashboards for informed decision-making. The company continually monitors the evolving remote desktop landscape, anticipating future trends and challenges. This purposeful, proactive approach keeps clients well-prepared for the dynamic changes in remote desktop technology.

Read More

Virtual Desktop Tools, Desktop

Other World Computing Releases MacDrive 11 with Full APFS Support, Unleashes Most Complete Tool for Access of Mac Disks on Windows PCs

PR Newswire | July 05, 2023

Other World Computing® The leading end-to-end ecosystem solution provider of computer hardware, accessories, and software for both consumers and professionals – today announced the release of MacDrive 11 with full APFS support, making it the most complete single solution for seamlessly accessing Mac-formatted drives and media on a Windows PC. Along with complete access, MacDrive 11 performs more than 40% faster than other available solutions – all while protecting your data from failure. For over 25 years, MacDrive has been the industry standard for reading, writing and managing HFS+ Mac disks in Windows. MacDrive 11 builds on this strong tradition by adding unmatched support for APFS disks with full read and write access, and protections not available in any other solution. MacDrive is the most robust, most advanced utility enabling users to share drives between Macs and PCs. MacDrive 11 comes in two variations; Standard to access almost any APFS or HFS+ formatted Mac drive, and Pro with advanced disk support for OWC's SoftRAID and Apple RAID 0/1 volumes. MacDrive 11 APFS Functionality Highlights: Read and write: MacDrive 11 is the only solution that provides full read-and-write support for APFS volumes–even if the volume has duplicated files or has been backed up by Time Machine. Crash Protection: Unlike other solutions, if an APFS disk is unexpectedly unplugged, existing files and data are safe, and won't be corrupted. Multi-volume disks: APFS allows users to create multiple volumes in a single partition and share free space between volumes. Only MacDrive lets user effortlessly switch between volumes to access all of their data. Formatting: Don't have a Mac, but want to share files with someone that does? MacDrive enables the creation APFS and HFS+ volumes right on a PC. Snapshots: When backed up with Time Machine, macOS creates "snapshots" on APFS volumes. MacDrive provides access to all snapshots, letting users restore deleted or edited files from previous states, even when a Time Machine backup isn't available. Duplicated files: In macOS, APFS files can be instantly duplicated, without consuming additional disk space. Only MacDrive provides full read-write access to duplicated files on APFS volumes. Make Windows Smarter Once installed, MacDrive 11 makes Windows "Mac aware" by enabling PCs to read and write Mac disks just like PC disks. There is nothing to launch or learn; simply connect a Mac disk and access almost any hard drives, SSDs (solid state drives), CDs, DVDs, floppies, and more. Additional MacDrive 11 Features: Full circle compatibility: Streamline editing and collaboration processes by sharing Mac disks with Windows users as well as formatting Mac disks direct from a PC for true cross-platform workflows. Repair Mac disks: MacDrive's Disk Repair feature will automatically detect issues with Mac disks and will fix common errors on disks (HFS+ only). Time Machine backups: Browse through Time Machine backups as well as copy those files and folders to a Windows PC. Native or virtual: Works with Apple's Boot Camp utility and virtualization software like VMware Fusion or Parallels. File defragmentation: Improve disk performance with automatic file defragmentation and optimization (HFS+ only). Read-only option: "Read Only" mode is perfect for forensic specialists and law enforcement to prevent changes to disks. About Other World Computing (OWC) Other World Computing (OWC), founded in 1988, provides Mac and PC enthusiasts with reliable solutions for computer hardware, accessories, and software at both the consumer and professional levels. In opposition to our disposable world, OWC's products are intended to serve as the life-extending foundation of personal and/or professional digital life, from capture to completion, enabling users to maximize their technology investments. The company has extended its quality, long-term solutions for creative professionals to serving enterprises, small businesses, and education administration. OWC's award-winning team of technologists, engineers, creatives, and professionals have a passion for improving technology and are dedicated to bringing the best solutions that last and true leadership in doing so sustainably for the benefit of all.

Read More

Virtual Desktop Tools, Cloud

Anjuna Adds Support for Microsoft Azure Confidential VMs

Globenewswire | July 04, 2023

Anjuna Security Inc., a confidential computing software company, today announced that its flagship product, the Anjuna Confidential Computing Platform, now supports Microsoft Azure confidential virtual machines (VMs) powered by AMD EPYC™ processors with Secure Encrypted Virtualization-Secure Nested Paging (SEV-SNP) security features. This added functionality represents a significant advancement in Anjuna’s support for Azure confidential computing (ACC) solutions and increases flexibility of choice for Microsoft customers. “As a leader in off-chain computation, where trust and security are non-negotiable, we are very excited by Anjuna’s expanded support for the latest AMD SEV-SNP confidential computing technology on Microsoft Azure that provides powerful isolation, risk reduction, and simplicity for sensitive data and code, taking confidential computing ease of use, trust, and simplicity to next level,” said Mitch Gildenberg, Switchboard CTO. Azure confidential VMs, powered by AMD SEV-SNP, provide a robust platform to securely migrate and run enterprise applications to the cloud with data-in-use protection. While running in confidential VMs, applications can be isolated from other VMs, the hypervisor, and cloud infrastructure operators. Additionally, Anjuna's solution provides further isolation and safeguards for threats originating from the guest OS, misconfigurations, and other applications running in the same VM and the VM administrator. With more organizations processing more sensitive data in the cloud for generative AI, financial systems, and high-value transactions processing, however, security must extend to cover all these additional threats. Anjuna Confidential Computing Platform enhances Azure confidential VMs, strengthening data protection and improving operational efficiency at scale. Anjuna automates the end-to-end deployment process and further protects applications in hardened Anjuna Confidential Containers that cannot be accessed by the other applications or the VM administrator. Moreover, Anjuna seamlessly and without code changes integrates attestation-aware key management capabilities via the Anjuna Policy Manager, ensuring that secrets are exclusively distributed to trusted applications. “At Anjuna, we believe Confidential Computing should be ubiquitous, easy to use, and above all, secure without trade-offs. For too long, enterprises have had to choose between ease of use and security. In today’s digital economy, this is no longer acceptable,” said Ayal Yogev, CEO and co-founder of Anjuna Security. “Microsoft Azure is a leading innovator in confidential computing and we are excited to be among the first Confidential Computing software providers to support both their Intel SGX and AMD SEV-SNP powered infrastructure. We are committed to keep working closely with Microsoft to unlock the full potential of Azure Confidential Computing services.” “We are committed to making Microsoft Azure a trusted cloud platform offering a broad portfolio of Confidential Computing solutions to customers,” said Vikas Bhatia, Head of Product, Azure confidential computing at Microsoft. “The combination of Azure confidential VMs powered by AMD SEV-SNP and the Anjuna Confidential Computing Platform unlocks value to customers, ensuring high levels of data protection and privacy with streamlined operations and ease of use.” About Anjuna Security Anjuna allows applications to run in any cloud with complete data security and privacy. Anjuna isolates workloads in a protected environment that intrinsically secures data in every state. Anjuna empowers enterprises to directly control application-level trust policies, ensuring that only trusted code can access sensitive data. Anjuna works with enterprises around the globe in industries such as financial services, government, and blockchain. To learn more about Anjuna’s platform and impact, visit Anjuna.io.

Read More

Events