Essential Requirements for Cloud-Based Endpoint Security

| September 11, 2018

article image
Endpoint protection began in the late 1980s with the introduction of the traditional antivirus (AV) that continues today as the first line of defense against known malware. But with the growth of cloud computing and mobile devices, the network perimeter has truly moved to the endpoint, and with that move comes the need for new techniques and tools that can counter threats before they take root. Traditional AV relies on malware signatures and simplistic behavioral rules to uncover threats to critical information endpoints: servers, applications, workstations and mobile computing devices. It also has a built-in time delay between when a threat is identified and a solution is published.

Spotlight

Technology Partners

Technology Partners Trading Establishment (TP) founded in 2007. We (Technology Partners) set out as a Systems integrator and IT solutions providers and reseller in the kingdom of Saudi Arabia and Egypt Countries, focusing on IT infrastructure solutions, Web Design & Development , Application Development & Integration , HW& Storage solutions , Networking solutions , IT Consultancy services , IT Outsourcing , Service Management and IT Asset Management.

OTHER ARTICLES

T-Mobile to Slash $30M in Cloud Costs With Kubernetes

Article | April 3, 2020

T-Mobile US has found success with Kubernetes and currently operates 20,000 containers across its virtualized cloud infrastructure. In fact, over the next year the carrier claims the combination of centralized management of Kubernetes containers and a normalized approach to clusters will help it to slash $30 million in cloud costs. Thom McCann, senior manager and software engineer at T-Mobile, shared the carrier’s seven-year cloud journey progress this week as as part of D2iQ’s “Cloud Native Virtual Summit featuring Kubernetes.” From building applications manually, progressing to automation, and then implementing container-based workloads at scale, T-Mobile’s centralized cloud team has laid “bedrock foundations in place to deliver consistent cloud consumption in a large organization,” McCann said.

Read More

8 reasons to consider hyperconverged infrastructure for your data center

Article | March 1, 2020

Demand for on-premises data center equipment is shrinking as organizations move workloads to the cloud. But on-prem is far from dead, and one segment that’s thriving is hyperconverged infrastructure (HCI). HCI is a form of scale-out, software-integrated infrastructure that applies a modular approach to compute, network and storage capacity. Rather than silos with specialized hardware, HCI leverages distributed, horizontal blocks of commodity hardware and delivers a single-pane dashboard for reporting and management. Form factors vary: Enterprises can choose to deploy hardware-agnostic hyperconvergence software from vendors such as Nutanix and VMware, or an integrated HCI appliance from vendors such as HP Enterprise, Dell, Cisco, and Lenovo.

Read More

Security that’s Designed for the Modern Data Center

Article | February 26, 2020

The last 12 months have been incredibly exciting for the security business at VMware. Last year at RSA Conference 2019, VMware CEO Pat Gelsinger outlined our Intrinsic Security strategy in his keynote presentation, “3 Things the Security Industry Isn’t Talking About”. We also announced the VMware Service-defined Firewall, a stateful Layer 7 data center firewall. As pioneers of micro-segmentation, the Service-defined Firewall extended our leadership in protecting east-west traffic in the data center. Later in the year, we announced two major acquisitions –Avi Networks and Carbon Black. The acquisition of Carbon Black brought to VMware an industry-leading endpoint security platform, and made the entire industry take notice of VMware’s intentions to transform security. With Avi Networks, we acquired a software-defined, elastic, and high-performance load balancer that comes equipped with a full-featured web application firewall (WAF). Maintaining the momentum in building out our security portfolio for the digital enterprise, we announced the VMware NSX Distributed Intrusion Detection and Prevention System which will bring advanced threat controls to the Service-defined Firewall.

Read More

Essential things to know about container networking

Article | March 8, 2020

Containers have emerged over the past several years to provide an efficient method of storing and delivering applications reliably across different computing environments. By containerizing an application platform and its dependencies, differences in OS distributions and underlying infrastructures are abstracted away. Networking has emerged as a critical element within the container ecosystem, providing connectivity between containers running on the same host as well as on different hosts, says Michael Letourneau, an IT architect at Liberty Mutual Insurance. "Putting an application into a container automatically drives the need for network connectivity for that container," says Letourneau, whose primary focus is on building and operating Liberty Mutual's container platform.

Read More

Spotlight

Technology Partners

Technology Partners Trading Establishment (TP) founded in 2007. We (Technology Partners) set out as a Systems integrator and IT solutions providers and reseller in the kingdom of Saudi Arabia and Egypt Countries, focusing on IT infrastructure solutions, Web Design & Development , Application Development & Integration , HW& Storage solutions , Networking solutions , IT Consultancy services , IT Outsourcing , Service Management and IT Asset Management.

Events