Stratus ztC Edge Computing portfolio additions

Stratus Technologies, a manufacturer of autonomous edge computing solutions, announced the availability of Stratus Redundant Linux 2.0, the virtualization and availability software layer that powers ztC Edge, as well as a new hardware model, the 110i. These updates to Stratus’ ztC Edge computing portfolio, developed with input from end users, system integrator and reseller partners, addresses customers’ most pressing needs for enhanced security, monitoring and performance at the edge of corporate networks, while continuing to offer the simplicity and unmatched reliability of the original platform.

Spotlight

Anjuna Security

Our breakthrough platform transforms your hybrid cloud into a high-trust environment where data is always encrypted and code is verified for authenticity. With Anjuna, you maintain data confidentiality anywhere you run your apps and protect against a wide range of security risks, such as insider threats, secret zero exposure and zero day exploits.

OTHER ARTICLES
Server Hypervisors

Managing Multi-Cloud Complexities for a Seamless Experience

Article | May 18, 2023

Introduction The early 2000s were milestone moments for the cloud. Amazon Web Services (AWS) entered the market in 2006, while Google revealed its first cloud service in 2007. Fast forward to 2020, when the pandemic boosted digital transformation efforts by around seven years (according to McKinsey), and the cloud has become a commercial necessity today. It not only facilitated the swift transition to remote work, but it also remains critical in maintaining company sustainability and creativity. Many can argue that the large-scale transition to the cloud in the 2010s was necessary to enable the digital-first experiences that remote workers and decentralized businesses need today. Multi-cloud and hybrid cloud setups are now the norm. According to Gartner, most businesses today use a multi-cloud approach to reduce vendor lock-in or to take advantage of more flexible, best-of-breed solutions. However, managing multi-cloud systems increases cloud complexity, and IT concerns, frequently slowing rather than accelerating innovation. According to 2022 research done by IntelligentCIO, the average multi-cloud system includes five platforms, including AWS, Microsoft Azure, Google Cloud, and IBM Red Hat, among others. Managing Multi-Cloud Complexities Like a Pro Your multi-cloud strategy should satisfy your company's requirements while also laying the groundwork for managing various cloud deployments. Creating a proactive plan for managing multi-cloud setups is one of the finest features that can distinguish your company. The five strategies for handling multi-cloud complexity are outlined below. Managing Data with AI and ML AI and machine learning can help manage enormous quantities of data in multi-cloud environments. AI simulates human decision-making and performs tasks as well as humans or even better at times. Machine learning is a type of artificial intelligence that learns from data, recognizes patterns, and makes decisions with minimum human interaction. AI and ML to help discover the most important data, reducing big data and multi-cloud complexity. AI and machine learning enable more simplicity and better data control. Integrated Management Structure Keeping up with the growing number of cloud services from several providers requires a unified management structure. Multiple cloud management requires IT time, resources, and technology to juggle and correlate infrastructure alternatives. Routinely monitor your cloud resources and service settings. It's important to manage apps, clouds, and people globally. Ensure you have the technology and infrastructure to handle several clouds. Developing Security Strategy Operating multiple clouds requires a security strategy and seamless integration of security capabilities. There's no single right answer since vendors have varied policies and cybersecurity methods. Storing data on many cloud deployments prevents data loss. Handling backups and safety copies of your data are crucial. Regularly examine your multi-cloud network's security. The cyber threat environment will vary as infrastructure and software do. Multi-cloud strategies must safeguard data and applications. Skillset Management Multi-cloud complexity requires skilled operators. Do you have the appropriate IT personnel to handle multi-cloud? If not, can you use managed or cloud services? These individuals or people are in charge of teaching the organization about how each cloud deployment helps the company accomplish its goals. This specialist ensures all cloud entities work properly by utilizing cloud technologies. Closing Lines Traditional cloud monitoring solutions are incapable of dealing with dynamic multi-cloud setups, but automated intelligence is the best at getting to the heart of cloud performance and security concerns. To begin with, businesses require end-to-end observability in order to see the overall picture. Add automation and causal AI to this capacity, and teams can obtain the accurate answers they require to better optimize their environments, freeing them up to concentrate on increasing innovation and generating better business results.

Read More
Virtual Desktop Tools

Virtualizing Broadband Networks: Q&A with Tom Cloonan and David Grubb

Article | August 12, 2022

The future of broadband networks is fast, pervasive, reliable, and increasingly, virtual. Dell’Oro predicts that virtual CMTS/CCAP revenue will grow from $90 million in 2019 to $418 million worldwide in 2024. While network virtualization is still in its earliest stages of deployment, many operators have begun building their strategy for virtualizing one or more components of their broadband networks.

Read More
Server Hypervisors

How virtualization helped Dell make a pandemic pivot

Article | September 9, 2022

Danny Cobb, fellow and vice president of engineering for Dell Technologies’ telco systems business, remembers his company cruising into early 2020: Kicking off a new fiscal year with its operating plan in place, supply chain nailed down and factories humming; people coming into the office each day to the usual routine of looking for parking spots and taking laptops down to the cafeteria. Then came March, and the first wave of the Covid-19 pandemic hit U.S. shores. In the course of one weekend, Dell pivoted to having more than 90% of its workforce working from home. That meant a dramatic shift in its network needs and operations – one that was only able to be accomplished so quickly because of virtualized infrastructure.

Read More
Virtual Desktop Tools, Server Hypervisors

Virtual Machine Security Risks and Mitigation in Cloud Computing

Article | April 28, 2023

Analyzing risks and implementing advanced mitigation strategies: Safeguard critical data, fortify defenses, and stay ahead of emerging threats in the dynamic realm of virtual machines in cloud. Contents 1. Introduction 2. 10 Security Risks Associated with Virtual Machines in Cloud Computing 3. Best Practices to Avoid Security Compromise 4. Conclusion 1. Introduction Cloud computing has revolutionized the way businesses operate by providing flexible, scalable, and cost-effective infrastructure for running applications and services. Virtual machines (VMs) are a key component of cloud computing, allowing multiple virtual machines to run on a single physical machine. However, the use of virtual machines in cloud computing introduces new security risks that need to be addressed to ensure the confidentiality, integrity, and availability of data and services. Effective VM security in the cloud requires a comprehensive approach that involves cloud providers and users working together to identify and address potential virtual machine security threats. By implementing these best practices and maintaining a focus on security, cloud computing can provide a secure and reliable platform for businesses to run their applications and services. 2. 10 Security Risks Associated with Virtual Machines in Cloud Computing Denial of Service (DoS) attacks: These are attacks that aim to disrupt the availability of a VM or the entire cloud infrastructure by overwhelming the system with traffic or resource requests. Insecure APIs: Cloud providers often expose APIs that allow users to manage their VMs. If these APIs are not properly secured, attackers can exploit them to gain unauthorized access to VMs or manipulate their configurations. Data leakage: Virtual machines can store sensitive data such as customer information or intellectual property. If not secured, this data can be exposed to unauthorized access or leakage. Shared resources: VMs in cloud environments often share physical resources such as memory, CPU, and network interfaces. If these resources are not isolated, a compromised VM can potentially affect the security and performance of other VMs running on the same physical host. Lack of visibility: Virtual machines in cloud environments can be more difficult to monitor than physical machines. This can make it harder to detect security incidents or anomalous behavior. Insufficient logging and auditing: If cloud providers do not implement appropriate logging and auditing mechanisms, it can be difficult to determine the cause and scope of a security incident. VM escape: This is when an attacker gains access to the hypervisor layer and then escapes into the host operating system or other VMs running on the same physical host. Side-channel attacks: This is when an attacker exploits the physical characteristics of the hardware to gain unauthorized access to a VM. Examples of side-channel attacks include timing attacks, power analysis attacks, and electromagnetic attacks. Malware attacks: VMs can be infected with malware, just like physical machines. Malware can be used to steal data, launch attacks on other VMs or systems, or disrupt the functioning of the VM. Insider threats: Malicious insiders can exploit their access to VMs to steal data, modify configurations, or launch attacks. 3. Best Practices to Avoid Security Compromise To mitigate these risks, there are several virtual machine security guidelines that cloud service providers and users can follow: Keep software up-to-date: Regularly updating software and security patches for virtual machines is crucial in preventing known vulnerabilities from being exploited by hackers. Software updates fix bugs and security flaws that could allow unauthorized access, data breaches, or malware attacks. According to a study, 60% of data breaches are caused by vulnerabilities that were not patched or updated in a timely manner.(Source: Ponemon Institute) Use secure hypervisors: A hypervisor is a software layer that enables multiple virtual machines to run on a single physical server. Secure hypervisors are designed to prevent unauthorized access to virtual machines and protect them from potential security threats. When choosing a hypervisor, it is important to select one that has undergone rigorous testing and meets industry standards for security. In 2018, a group of researchers discovered a new type of attack called "Foreshadow" (also known as L1 Terminal Fault). The attack exploits vulnerabilities in Intel processors and can be used to steal sensitive data from virtual machines running on the same physical host. Secure hypervisors that have implemented hardware-based security features can provide protection against Foreshadow and similar attacks. (Source: Foreshadow) Implement strong access controls: Access control is the practice of restricting access to virtual machines to authorized users. Multi-factor authentication adds an extra layer of security by requiring users to provide more than one type of authentication method before accessing VMs. Strong access controls limit the risk of unauthorized access and can help prevent data breaches. According to a survey, organizations that implemented multi-factor authentication saw a 98% reduction in the risk of phishing-related account breaches. (Source: Duo Security) Monitor VMs for anomalous behavior: Monitoring virtual machines for unusual or unexpected behavior is an essential security practice. This includes monitoring network traffic, processes running on the VM, and other metrics that can help detect potential security incidents. By monitoring VMs, security teams can detect and respond to security threats before they can cause damage. A study found that 90% of organizations that implemented a virtualized environment experienced security benefits, such as improved visibility into security threats and faster incident response times. (Source: VMware) Use Encryption: Encryption is the process of encoding information in such a way that only authorized parties can access it. Encrypting data both in transit and at rest protects it from interception or theft by hackers. This can be achieved using industry-standard encryption protocols and technologies. According to a report by, the average cost of a data breach in 2020 was $3.86 million. The report also found that organizations that implemented encryption had a lower average cost of a data breach compared to those that did not (Source: IBM) Segregate VMs: Segregating virtual machines is the practice of keeping sensitive VMs separate from less sensitive ones. This reduces the risk of lateral movement, which is when a hacker gains access to one VM and uses it as a stepping stone to gain access to other VMs in the same environment. Segregating VMs helps to minimize the risk of data breaches and limit the potential impact of a security incident. A study found that organizations that implemented a virtualized environment without adequate segregation and access controls were more vulnerable to VM security breaches and data loss. (Source: Ponemon Institute) Regularly Back-up VMs: Regularly backing up virtual machines is a critical security practice that can help mitigate the impact of malware attacks, system failures, or other security incidents. Backups should be stored securely and tested regularly to ensure that they can be restored quickly in the event of a security incident. A survey conducted found that 42% of organizations experienced a data loss event in 2020 with the most common cause being accidental deletion by an employee (29%). (Source: Veeam) 4. Conclusion The complexity of cloud environments and the shared responsibility model for security require organizations to adopt a comprehensive security approach that spans multiple infrastructure layers, from the physical to the application layer. The future of virtual machine security concern in cloud computing will require continued innovation and adaptation to new threats and vulnerabilities. As a result, organizations must remain vigilant and proactive in their security efforts, leveraging the latest technologies and best practices to protect their virtual machines, the sensitive data and resources they contain.

Read More

Spotlight

Anjuna Security

Our breakthrough platform transforms your hybrid cloud into a high-trust environment where data is always encrypted and code is verified for authenticity. With Anjuna, you maintain data confidentiality anywhere you run your apps and protect against a wide range of security risks, such as insider threats, secret zero exposure and zero day exploits.

Related News

GDPR and beyond The past, present and future of data privacy

siliconangle.com | July 08, 2019

There is a GDPR framework,Venkatraman explained. You start by classifying data. Then you apply specific policies to ensure you protect and back up the personal data. And then you go about meeting the specific requirements.GDPR has changed the data game, putting security and privacy on the front page, as well as on the boardroom agenda. IDC research has shown that data protection is a key influencer in IT investment decisions, with companies asking, How do I become data driven without compromising on security and sovereignty and data locality? Venkatraman stated. Actifios copy data virtualization can help companies achieve that goal, giving them the potential for a successful future, according to Venkatraman. Companies are moving from protecting data centers to protecting centers of data,Venkatraman predicted. If Actifio can help organizations protect multiple centers of data through a unified pane of glass and have that platform approach to data management, then they can help organizations become data thrivers, which gives them the competitive advantage.

Read More

IP Multimedia Subsystem (IMS) Services Market 2019 Dynamics, Comprehensive Analysis, Business Growth

worldanalytics24.com | July 08, 2019

The report provides an overview of the IP Multimedia Subsystem (IMS) Services Market industry including definitions, division, key vendors, key Development and market challenges. The IP Multimedia Subsystem (IMS) Services Market analysis is provided the international markets including development trends, competitive landscape analysis, and key regions development statusThrough the statistical analysis, the report depicts the global IP Multimedia Subsystem (IMS) Services Market including capacity, production, production value, cost/profit, supply/demand and import/export. The entire market is further distributed by company, by country, and by application/type for the competitive landscape analysis. However, security concerns in virtualization, lack of availability of a skilled workforce, may hamper the growth of the market, but for a specific period.

Read More

Datacentre Network Architecture Sales Forecasts Reveal Positive Growth Through 2026

gemnewz | July 08, 2019

This detailed presentation on Datacentre Network Architecture market accumulated by Persistence Market Research features an exhaustive study conveying influential trends prevailing in the global business sphere. The report also presents significant details concerning market size, market share and profit estimations to offer an ensemble prediction about this business. Moreover, this report undertakes an accurate competitive analysis emphasizing growth strategies espoused by market leaders.The increase in data volume, need of storage, backup, archive and also the requirement data management create complexity in datacentres. These complexities are resolved through appropriate network architecture across the datacentres. The datacentre network architecture minimize the impact of disaster scenarios and it also provides tools for data recovery. Most of the enterprises consider the datacentre network architecture is an important element of organization strategy for regulatory compliance and protection and management of company and customer data.Emergence of software defined networking (SDN), network overlay technologies, network virtualization (NV), and efficient systems have been forcing many companies to move towards next generation datacentre networks. These emerging technologies will support software-defined data centre (SDDC) and also help to virtualize the network across all the datacentre It has been observed that most of the VMware customers are moving towards network virtualization to transform their datacentre from the client/server era to the mobile/cloud era.

Read More

GDPR and beyond The past, present and future of data privacy

siliconangle.com | July 08, 2019

There is a GDPR framework,Venkatraman explained. You start by classifying data. Then you apply specific policies to ensure you protect and back up the personal data. And then you go about meeting the specific requirements.GDPR has changed the data game, putting security and privacy on the front page, as well as on the boardroom agenda. IDC research has shown that data protection is a key influencer in IT investment decisions, with companies asking, How do I become data driven without compromising on security and sovereignty and data locality? Venkatraman stated. Actifios copy data virtualization can help companies achieve that goal, giving them the potential for a successful future, according to Venkatraman. Companies are moving from protecting data centers to protecting centers of data,Venkatraman predicted. If Actifio can help organizations protect multiple centers of data through a unified pane of glass and have that platform approach to data management, then they can help organizations become data thrivers, which gives them the competitive advantage.

Read More

IP Multimedia Subsystem (IMS) Services Market 2019 Dynamics, Comprehensive Analysis, Business Growth

worldanalytics24.com | July 08, 2019

The report provides an overview of the IP Multimedia Subsystem (IMS) Services Market industry including definitions, division, key vendors, key Development and market challenges. The IP Multimedia Subsystem (IMS) Services Market analysis is provided the international markets including development trends, competitive landscape analysis, and key regions development statusThrough the statistical analysis, the report depicts the global IP Multimedia Subsystem (IMS) Services Market including capacity, production, production value, cost/profit, supply/demand and import/export. The entire market is further distributed by company, by country, and by application/type for the competitive landscape analysis. However, security concerns in virtualization, lack of availability of a skilled workforce, may hamper the growth of the market, but for a specific period.

Read More

Datacentre Network Architecture Sales Forecasts Reveal Positive Growth Through 2026

gemnewz | July 08, 2019

This detailed presentation on Datacentre Network Architecture market accumulated by Persistence Market Research features an exhaustive study conveying influential trends prevailing in the global business sphere. The report also presents significant details concerning market size, market share and profit estimations to offer an ensemble prediction about this business. Moreover, this report undertakes an accurate competitive analysis emphasizing growth strategies espoused by market leaders.The increase in data volume, need of storage, backup, archive and also the requirement data management create complexity in datacentres. These complexities are resolved through appropriate network architecture across the datacentres. The datacentre network architecture minimize the impact of disaster scenarios and it also provides tools for data recovery. Most of the enterprises consider the datacentre network architecture is an important element of organization strategy for regulatory compliance and protection and management of company and customer data.Emergence of software defined networking (SDN), network overlay technologies, network virtualization (NV), and efficient systems have been forcing many companies to move towards next generation datacentre networks. These emerging technologies will support software-defined data centre (SDDC) and also help to virtualize the network across all the datacentre It has been observed that most of the VMware customers are moving towards network virtualization to transform their datacentre from the client/server era to the mobile/cloud era.

Read More

Events

ICVARS 2024

Conference

ICVARS 2024

Conference