VIRTUAL DESKTOP STRATEGIES
Sangfor Technologies | September 17, 2021
Sangfor Technologies announced the release of their long-awaited extended protection solution, XDDR Application Containment. Based on Sangfor's XDDR security framework, Application Containment allows the network and endpoints (both on-premise or in-cloud) to work together to identify, control, and report on all applications running on endpoints, or using the network to communicate. Sangfor's XDDR provides an integrated solution that protects against ransomware, malware, APTs, phishing websites and email, and potentially malicious applications.
Controlling and enforcing internet access policies in the workplace has not been easy. Employees want access to the internet for personal use as well as their work, making overly restrictive security solutions difficult to implement and maintain. Organizations deploy proxy servers to control access to the internet and external applications. This access control is necessary to maintain productivity, ensure users do not access malicious sites and unknowingly download malware, and to maximize bandwidth utilization for critical business applications. Many users employ VPN (virtual private network) technology, anonymous browsers, and other proxy avoidance applications to bypass organizational security and content filtering policies enforced by the proxy servers. Sangfor XDDR Application Containment solutions enable the organization to quickly create Proxy Avoidance Protection policies for blocking usage of proxy avoidance tools and applications on the endpoint.
Sangfor's NGAF (Next Generation Application Firewall), IAG (Internet Access Gateway) and Endpoint Secure products work cohesively to provide real-time visualization of all application communication throughout the entire network, quickly identifying proxy avoidance traffic. Proxy Avoidance Protection policies can quickly be built on the NGAF or IAG from Sangfor's extensive library of anti-proxy and proxy avoidance applications. These policies are then deployed by Endpoint Secure to block or monitor anti-proxy applications.
Organizations can also create whitelists and blacklists of applications in Application Containment. This gives administrators granular control of applications running on PCs, laptops, and servers to prevent installation of malware and ransomware, especially with users working from home, to prevent infection of corporate, enterprise, or organizational networks, resources, and critical assets. Peripheral Control manages access to connected USB devices to prevent data leakage.
Traditional extended detection and response (XDR) is network security technology designed to provide increased visibility, analysis functions and response to cyber-threats in the network, cloud, applications, and endpoints. XDR is positioned as the most sophisticated technology available but tends to be more marketing hype than reality, having been developed as the progression of EDR, or endpoint detection and response, to work with non-integrated network security products. Unlike XDR products, Sangfor XDDR Application Containment is the only true solution where network and endpoint work together to identify, control, and report on both allowed and malicious applications running on endpoints and communicating across the network. Sangfor NGAF, IAG and Endpoint Secure coordinate responses so Application Containment can provide real-time blocking and monitoring of unapproved or malicious applications.
Control can be regained from rogue applications delivered by ransomware, malware and APTs that users bring into networks. Sangfor Application Containment blocks the bypassing of internet access controls and prevents users from bringing them in again.
About Sangfor Technologies
Sangfor Technologies is a leading global vendor of IT infrastructure and security solutions, specializing in Cloud Computing & Network Security with a wide range of products & services including Hyper-Converged Infrastructure, Virtual Desktop Infrastructure, Next-Generation Firewall, Internet Access Gateway, Endpoint Protection, Ransomware Protection, Managed Detection and Response, WAN Optimization, SD-WAN, and many others.
Telco Systems | July 15, 2021
Telco Systems, a leading provider of innovative Network Edge solutions for communications infrastructure and service management, and Stem Connect, a leading supplier of ultra-reliable business connectivity solutions, announced today a joint offering for a service virtualization solution in the United Kingdom, France, and South Africa. The new service will be built on Telco Systems' fast edge technology and Stem Connect's expertise in providing enterprise-grade networking solutions in these regions.
This strategic collaboration was formed after successful testing of the integrated solution in accordance with particular market needs, which included Virtual Network Functions (VNFs) such as SD-WAN and Firewall. Customers will get access to the latest Edge Computing technology as well as a localized, field-proven deployment capability. With enterprises looking for quick and efficient solutions that reduce time to market, the focus of this collaboration is on pre-packaged technology and a streamlined delivery and service approach. The solution goes beyond connection and security because Telco Systems' edge device allows other applications to be installed on the device at a low cost, allowing Stem Connect to deploy additional applications required by the enterprise customer.
Third-party VNFs and new white box devices can be set up and fully operational in minutes thanks to Telco Systems' virtualization technology. This technology allows telcos, managed service providers, and governments to rapidly deploy new VNF-based business services with centralized administration and ongoing orchestration. Telco Systems' Edge computing solution also enables MSPs to operate on Intel or Arm-based devices while using native Cloud environments for network management and operations.
About Telco Systems
Telco Systems is a leader in innovative Cloud Computing and Network Edge solutions for managing communications infrastructure and services. Carrier Ethernet, MPLS-based demarcation and aggregation, NFV, uCPE, 5G, and IoT solutions are among the company's industry-leading Cloud Edge Computing product portfolio. Worldwide, managed service providers and enterprises depend on Telco Systems for networking technologies and innovations to increase the capacity of their network infrastructures and generate revenue from new connectivity offerings. BATM Advanced Communications' fully owned subsidiary is Telco Systems.
About Stem Connect
Stem Connect, a leading and preferred Network Provider in the United Kingdom, France, and South Africa, takes a unique approach to provide connectivity solutions to our customers. Our main goal is to provide affordable and practical solutions that are supported by highly skilled and professional support staff. Stem Connect is well known in the enterprise for managed connectivity solutions, voice, data, or fail-safe service level agreements. The Stem Connect network has a strong presence, with numerous International Fibre routes and Global peering POPS. Our fiber, POPS (Point of Presence), and datacenter peering points allow us to create a resilient network with multiple fail-overs and shortest path routing, allowing Stem Connect to offer a highly resilient network with minimal latency. As a result, our clients can run real-time applications that surpass their expectations. In addition, we provide one of the most extensive service level agreements in the UK.
VIRTUAL DESKTOP TOOLS
MemVerge | September 22, 2021
MemVerge, the pioneers of Big Memory software, announced Memory Machine™ Big Memory virtualization software has been selected by Penn State Huck Institutes of the Life Sciences to speed the genomic analytic processing for plant DNA research to develop more sustainable plant products.
At the forefront of research and development, Penn State Huck Institutes of the Life Sciences seeks to find solutions to pressing health and agriculture issues and their interaction with the environment. To achieve this, Penn State has become a go-to place for analyzing and accessing dispersed and large data in an effort to facilitate transformative life sciences discoveries by enabling path-breaking research, simulating innovation, and inspiring work in a collaborative environment.
Among its flagship research projects is the analysis of plant DNA sequencing to identify opportunities to develop plants - from cocoa to apples - that can better sustain droughts, diseases and achieve longer transportation and shelf life, which is important to improve food supplies for third world nations. To achieve this research, the bioscientists at Penn State must analyze genome sequences that are even more complex than human genomes. Using traditional analytic methods, it could take weeks to process specific workloads and running jobs can often fail as data is much larger than the available compute memory.
Using MemVerge Memory Machine memory virtualization software, Penn State has been able to accelerate discovery for its plant DNA research. By deploying a pool of software-defined DRAM and persistent memory (PMem), the life sciences institute has been able to speed the completion of their analytic pipeline and run jobs that it hasn't been able to process before.
"MemVerge Memory Machine has been a game-changing technology for our plant DNA research," said Claude dePamphilis, Director of the Center for Parasitic and Carnivorous Plants at Penn State Huck Institutes of the Life Sciences. "The innovative technology helps us achieve DRAM-like performance from a mixed memory configuration. This has not only dramatically increased our time to research findings but has also saved us considerable budget in the process."
Memory Machine software provided scientists at Penn State with transparent access to virtualized DRAM and PMem memory and ZeroIO™ Snapshot technology. The in-memory snapshot technology allows researchers to roll back workloads quickly to specific points in time for adaptive analyses and ensure resilience with lightning-fast crash recovery. This allows new genomic testing to continue without downtime.
"The genomic sequencing use case at Penn State is an exceptional example of how Big Memory technology can overcome the barriers presented by the 'data bigger than memory' problem," said Charles Fan, CEO of MemVerge. "By eliminating the boundaries of traditional compute infrastructure and creating a memory fabric that can cost-effectively support the memory-intensive processes applications such as genomics analytics require, we are changing the landscape of what is possible. Memory is no longer a limitation for applications such as genomics sequencing, in-memory databases and other data-intensive usages such as animation and VFX. We're opening the door for increased innovation, landmark research findings and better health outcomes."
MemVerge Memory Machine makes 100% use of available memory capacity while providing new operational capabilities to memory-centric workloads. Memory Machine answers the need for a modern in-memory computing model to support emerging applications that require real-time analytics, true in-memory computing, and fault-tolerant memory persistence to speed massive processing workloads.
Memory is too small. Storage is too slow. In response, MemVerge is pioneering the new category of Big Memory Computing that simultaneously delivers the nanosecond performance of memory with the massive capacity of storage. MemVerge® Memory Machine™ Software transparently virtualizes different types of memory hardware into a pool of software-defined memory with the same performance of DRAM, but with many times the capacity. On top of the transparent memory service, Memory Machine provides the industry's first suite of data services that can provision petabytes of capacity, performance, availability, and mobility at the speed of memory and across the clouds.