How Virtualization Helps Feds Shrink Environmental Footprints

fedtechmagazine | July 24, 2019

Government agencies spend more than $5 billion per year on energy, and the cost of powering and cooling data centers is a large portion of that. As they work to lessen that demand, both to trim utility costs and minimize environmental impact, agencies are discovering the virtues of virtualization.The Center of Expertise for Energy Efficiency in Data Centers recommends data center virtualization as one of its “high-level best practices,” alongside more obvious measures such as turning off unused equipment and decommissioning unused servers.Buildings with data centers spend 25 percent to 35 percent more on electricity per square foot than those without, according to the U.S. Energy Information Administration.The Office of Management and Budget has been pushing federal agencies to close and consolidate data centers where possible, and to optimize remaining facilities through methods such as energy metering and virtualization.

Spotlight

Find out how KVM and container virtualization differs and how each can be used to create a flexible virtualization solution for any business environment.

Spotlight

Find out how KVM and container virtualization differs and how each can be used to create a flexible virtualization solution for any business environment.

Related News

VIRTUAL DESKTOP TOOLS, SERVER VIRTUALIZATION

Arista Modernizes Routing in the Wide Area Network

Arista Networks | March 23, 2023

Arista Networks today introduced the Arista WAN Routing System, which combines three new networking offerings: enterprise-class routing platforms, carrier/cloud-neutral internet transit capabilities, and the CloudVision® Pathfinder Service to simplify and improve customer wide area networks. Based on Arista’s EOS® routing capabilities, and CloudVision management, the Arista WAN Routing System delivers the architecture, features, and platforms to modernize federated and software-defined wide area networks. The introduction of the Arista WAN Routing System enables customers to deploy a consistent networking architecture across all enterprise network domains from the client to campus to the data center to multi-cloud with a single instance of EOS, a consistent management platform, and a modern operating model. Modern WAN Management, Provisioning, and Optimization A new Arista WAN Routing System component is the CloudVision Pathfinder Service, which modernizes WAN management and provisioning, aligning the operating model with visualization and orchestration across all network transport domains. This enables a profound shift from legacy CLI configuration to a model where configuration and traffic engineering are automatically generated, tested, and deployed, resulting in a self-healing network. Arista customers can therefore visualize the entire network, from the client to the campus, the cloud, and the data center. “As an Elite Partner and Arista Certified Services Provider (ACSP), we have been using Arista EOS and CloudVision for years and testing the Arista WAN Routing System in production environments for several quarters. The software quality and features within the system are ideal for enterprise network architectures embracing modern distributed application architectures across a blend of edge, campus, data center, cloud and SaaS environments,” stated Jason Gintert, chief technology officer at WAN Dynamics. Arista WAN Platform Portfolio An enterprise WAN also requires modern platforms to interconnect campus, data center, and edge networks, as well as a variety of upstream carriers and Internet-based services. In addition to CloudEOS for cloud connectivity, the new Arista 5000 Series of WAN Platforms, powered by Arista EOS, offer high-performance control and data-plane scaling fit-to-purpose for enterprise-class WAN edge and aggregation requirements. Supporting 1/10/100GbE interfaces and flexible network modules while delivering from 5Gb to over 50Gbps of bidirectional AES256 encrypted traffic with high VRF and tunnel scale, the Arista 5000 Series sets the standard for aggregation and critical site interconnect with multiple use cases such as: Aggregation and High-Performance Edge Routing – The Arista 5500 WAN System, supporting up to 50Gbps of encrypted traffic, is ideal for data center, campus, high-performance edge, and physical transit hub architectures. Flexible Edge Routing – The Arista 5300 WAN System is suited for high-volume edge connectivity and transitioning WAN locations to multi-carrier, 5G, and high-speed Internet connectivity with performance rates of up to 5Gbps of encrypted traffic. Scalable Virtual Routing – Arista CloudEOS is a binary-consistent virtual machine implementing identical features and capabilities of the other Arista WAN systems. It is often deployed in carrier-neutral transit hub facilities or to provide scale-out encryption termination capabilities. Public Cloud Edge Routing – Arista CloudEOS is also deployable through public cloud marketplaces and enables Cloud Transit routing and Cloud Edge routing capabilities as part of the end-to-end WAN Routing System. CloudEOS is available on AWS, Azure, Google Cloud, and through Platform Equinix. CPE Micro Edge – In addition to the fully integrated, dynamically configured, and adaptive Arista WAN Routing System platforms, the Arista Micro Edge is capable of small-site interoperability with the WAN Routing System to provide simple downstream connectivity options. About Arista Networks Arista Networks is an industry leader in data-driven client to cloud networking for large data center, campus, and routing environments. Arista’s award-winning platforms deliver availability, agility, automation, analytics, and security through an advanced network operating stack.

Read More

VIRTUAL DESKTOP TOOLS, SERVER VIRTUALIZATION

iboss Zero Trust SSE Proven to Block Malware with Superior Effectiveness

prweb | April 17, 2023

iboss, the leader in cloud-delivered cybersecurity, today announced the results of its third-party efficacy testing for its iboss Zero Trust SSE (Security Service Edge), which was rigorously tested for its malware blocking effectiveness by Miercom, a premier independent testing laboratory. The report concluded that iboss Zero Trust SSE delivered superior malware threat protection and is the only service that provides complete Zero Trust security from the cloud. The test evaluated iboss’s Zero Trust SSE technology. This cloud native Zero Trust cloud security platform provides organizations with protection and visibility for users and devices, regardless of where they are connected, by delivering security capabilities from the cloud. The test results proved that iboss exceeded the requirements set forth by Miercom, blocking 99.7% of malware, and performed 26% higher in malware blocking effectiveness than the industry average of all platforms tested by Miercom to date. “We are proud to announce that the efficacy of iboss Zero Trust SSE has been proven to be the most effective in the industry,” said Paul Martini, CEO and co-founder of iboss. “This result confirms our commitment to providing the most comprehensive security solution for organizations of all sizes.” These results demonstrate iboss’s commitment to providing organizations with the most comprehensive security solution that protects against the ever-evolving threats posed by malicious actors. The iboss Zero Trust SSE enables organizations to protect their valuable data and applications while keeping their networks secure and compliant with industry regulations. “Our mission is to help organizations secure their digital transformation journey through cloud security,” said Paul Martini. “We are continuing to invest in our cloud security platform to provide the most comprehensive security solution for organizations of all sizes.” About iboss iboss is a cloud security company that enables organizations to reduce cyber risk by delivering a Zero Trust Security Service Edge platform designed to protect resources and users in the modern distributed world. Applications, data, and services have moved to the cloud and are located everywhere, while users needing access to those resources are working from anywhere. The iboss platform replaces legacy VPN, Proxies, and VDI with a consolidated service that improves security, increases the end-user experience, consolidates technology, and substantially reduces costs. Built on a containerized cloud architecture, iboss delivers security capabilities such as SWG, malware defense, Browser Isolation, CASB, and Data Loss Prevention to protect all resources via the cloud instantaneously and at scale. The iboss platform includes ZTNA to replace legacy VPN, Security Service Edge to replace legacy Proxies, and Browser Isolation to replace legacy VDI. This shifts the focus from protecting buildings to protecting people and resources wherever they are located. Leveraging a purpose-built cloud architecture backed by 230+ issued and pending patents and more than 100 points of presence globally, iboss processes over 150 billion transactions daily, blocking 4 billion threats per day. More than 4,000 global enterprises trust the iboss platform to support their modern workforces, including a large number of Fortune 50 companies. iboss was named one of the Top 25 Cybersecurity Companies by The Software Report, one of the 25 highest-rated Private Cloud Computing Companies to work for by Battery Ventures, and CRN’s top 20 Coolest Cloud Security Companies of 2022.

Read More

VIRTUAL DESKTOP STRATEGIES, BACKUP AND DISASTER RECOVERY

BBT.live announces addition of Check Point Device Protection by default to BeBroadband solution at MSP Summit

BBT.live | May 03, 2023

BBT.Live, a next-gen SD-WAN SaaS company providing uncomplicated, secure, cloud-based virtualized connectivity solutions to service providers globally, announced at the Channel Partners MSP Summit this week, a significant update to its strategic collaboration with Check Point, a renowned international cybersecurity solutions provider. BBT.Live has successfully integrated Check Point Device Protection into its BeBroadband Edge solution, offering it as the default choice for all customers. Check Point's Device Protection provides business users with a layer of security to shield against cyber threats, ensuring their IT systems and Computers at remote sites are fully protected. The completed integration and offering of Device Protection as an integral part of BeBroadband follows the August 2022 announcement of cooperation between the two companies. Check Point has posted a blog and LinkedIn post detailing the advances in the cooperation. BBT.Live's innovative SD-WAN software is designed to be technology-agnostic, allowing it to function seamlessly with a range of edge hardware and cloud environments, without any limitations imposed by specific technologies. This approach emphasizes interoperability and cost-effectiveness for service providers and enables products to perform optimally across various platforms. By adopting this methodology, BBT.live creates products that offer unparalleled versatility and efficiency, allowing their clients to achieve their business objectives more effectively. Service providers can deliver excellent customer experience while significantly reducing IT, customer service and technical team costs. By embedding Check Point Device Protection within its software, BBT.Live's solution is also secure from cyber threats. Check Point's innovative Nano Agent technology is an embedded runtime protection solution that provides built-in security against attacks such as access control, memory corruption, shell injection, import table hijacking, control flow hijacking, and more. It provides coverage without compromising performance. It monitors the activity of a device, identifies anomalies indicative of complex cyberattacks and blocks them in real time. Moshe Levinson, Founder and CEO at BBT.Live, said, "The integration of Check Point Device Protection as the default option in our solution brings service providers the peace of mind that their networks and data are protected from ever increasing threats at the location the data is being accessed." Miri Ofir, R&D Director in Check Point Software technologies said: "Our mission is to deliver the best security for users and organization. Extending our partnership with BBT.Live to include the Nano agent in any SD-WAN edge device, is crucial to achieve our common goal. Together we will offer organizations a comprehensive solution with a reliable and secure connection to the internet." The cooperation between Check Point and BBT.live is an important step in enabling service providers with tools to achieve the goals of the US Biden-Harris Administration National Cybersecurity Strategy announced last month. That announcement included a call for service providers to make "reasonable attempts to secure their infrastructure against abuse and other criminal behavior." The partnership between Check Point and BBT.live highlights the importance of cybersecurity in today's world of digitization and remote work. With Check Point Device Protection embedded within BBT.Live's software, users can communicate with peace of mind, knowing that their communication components are fully secured against cyber threats. About BBT.live BBT.live provides an innovative and secure virtualized cloud-based connectivity solution known as BeBroadband. As a next-generation SD-WAN platform, BeBroadband is engineered to streamline the operations of service providers by integrating all essential features into a single, fully integrated suite, eliminating the need for additional integration. With its easy setup, deployment, and operation, BeBroadband is a comprehensive solution that incorporates industry-leading features from the best providers in the market. These features include security, in partnership with Check Point, and WAN optimization, powered by Rodhe & Schwarz. BBT.live is headquartered in Tel Aviv, with it's US hub in New Jersey, and is dedicated to delivering cutting-edge solutions that help service providers enhance their business outcomes.

Read More