SERVER VIRTUALIZATION

Infortrend Powers Up Scale-Out Unified Storage EonStor GS U.2

Infortrend | May 31, 2022

Infortrend_Powers_Up
Infortrend Technology, Inc., a market-leading enterprise storage supplier, has enhanced EonStor GS U.2, an enterprise scale-out unified storage system with U.2 NVMe SSD. It provides block and file-level scale-out extensibility to boost capacity and performance as storage requirements rise.

The EonStor GS (GS) unified SAN/NAS storage is intended for a variety of corporate applications such as database, virtualization, video post-production, and file sharing. It provides excellent capacity and performance in a variety of ways. Users can begin with one GS and add other GS as required to establish a cluster with up to four appliances through scale-out. GS supports the common ultra-fast U.2 SSD and boosts performance up to 1000K IOPS and 22GB/s per appliance to improve data processing with high IOPS and low latency.

GS offers a single namespace for CIFS and NFS user access from Windows, Linux, and macOS. IT administration can be simplified even further with auto-balancing, which ensures that data is stored equitably on each GS in a cluster. IT personnel may save money by expanding all-flash U.2 GS with HDD JBOD and letting the auto-tiering technology move 'hot' and 'cold' data between high-performance SSD and cost-effective HDD.

For forward-looking enterprises seeking a competitive and cost-saving solution, we updated GS unified storage with support of scale-out expandability and U.2 SSD. Users can connect several GS into a cluster with optimized load balancing, increased I/Os, and tight data protection."

Frank Lee, Senior Director of Product Planning 

Infortrend has revamped its 2022 Reseller Partnership Program to assist partners in increasing expertise and profitability. Partners enjoy special benefits like deal registration with price protection, access to demo machines, and much more.

Spotlight

Our increasingly connected web of devices is exposed to extreme risk; hackers and insiders are just a few of the bad actors threatening to wreak havoc on our critical infrastructure. Along with various utilities and infrastructure, there’s a common thread within these systems, called the Internet of Things (IoT). Researchers predict that by the year 2020, the IoT, deployed to control and gather data, will consist of 50 billion connected devices.

Spotlight

Our increasingly connected web of devices is exposed to extreme risk; hackers and insiders are just a few of the bad actors threatening to wreak havoc on our critical infrastructure. Along with various utilities and infrastructure, there’s a common thread within these systems, called the Internet of Things (IoT). Researchers predict that by the year 2020, the IoT, deployed to control and gather data, will consist of 50 billion connected devices.

Related News

VIRTUAL DESKTOP TOOLS

guardDog.ai VMware Architect Russell Hamker to Present at 2022 VMware Explore

guardDog.ai | August 20, 2022

Guard Dog Solutions, Inc., dba guardDog.ai, and VMware have disclosed further details of the company’s participation at VMware Explore 2022 in the Moscone Center in San Francisco Aug. 29 – Sept. 1, in booth 1914. Attendees who would like to have private appointments can sign up and gather more information at guardDog.ai/vmware. guardDog.ai VMware Architect Russell Hamker will be speaking on how to create VMs (Virtual Machines) from 100 percent code on Thursday, Sept. 1, from 11:00 a.m. to 2:00 PM PDT at Moscone West, Level 2, Room 2005. In this session Hamker will join VMware Spring Developer Advocate DaShaun Carter in demonstrating how to build and deploy a Linux VM, how to patch the system, and how to install extra packages including Docker, Kubernetes and VMware Tanzu. At Booth 1914, guardDog.ai will be teaching organizations of all sizes how to increase their cybersecurity wellness by training and deploying existing IT staff members to become Attack Surface Monitors in less than one hour. As the award-winning leader in real-time cyber security protection for business and consumers, guardDog.ai is using VMware’s Tanzu containerization technology to support hardware-free and entirely remote deployment and management of cyber security protection for any size MSSP (Managed Security Service Providers) or organization. guardDog’s subscription-based FiDo technology uses patent-pending artificial intelligence from the company’s cloud-based Autonomous Incident Response (AiR) database to pre-emptively recognize all devices connected to a network including most especially the IoT (Internet of Things) and smart device connections device management solutions can’t see. The solution exposes and shuts down most cybersecurity threats before exploits can happen, protecting users and organizations from threats such as ransomware, man-in-the-middle attacks, denial of service, and emerging novel threats, protecting networks and the devices attached to them. “This year’s VMware conference is making its first return as a live event since the COVID pandemic began, We are pleased to play a role in making the 2022 event an extremely notable one as we announce our partnership with VMware as well as our use of the containerization architecture exemplified in VMware Tanzu as one of the key virtualizations models we are advancing to allow the remote deployment and management of thousands of FiDo implementations from a single location.” Peter Bookman, CEO and founder of guardDog.ai guardDog.ai uses AI-driven overlay technology in FiDo to find and protect users and networks from attempted cyberattacks in less than two milliseconds, by identifying the threats that device and network management solutions can’t see and proactively halting potential exploits before they begin. In both wired and Wi-Fi networks, FiDo protects network and the device users from threats across the entire Attack Surface, and most especially within the edge territory outside the perimeter of the network or on attached devices that other solutions cannot see. These include the myriad of IoT (Internet of Things) devices such as specialized health monitoring equipment, printers, doorbells, thermostats, smart refrigerators, smart pens, smart TVs, and game systems that are inherently vulnerable to the networks they join. Thanks to the VMware partnership and implementation, the ability to obtain and deploy virtualized FiDo technology also ends supply chain issues of availability delays, while allowing for instant and continual updates to the AiR database of known threats and suspicious network behavior. For all implementations, the virtualized alternatives for guardDog’s FiDo v3 technology are making it possible to cover all areas of the potential Attack Surface with far greater economy and ease than before. About guardDog.ai Guard Dog Solutions Inc., headquartered in Salt Lake City, Utah, (dba guardDog.ai) has developed a cloud-based Autonomous Incident Response (AiR) cyber security software service that works together with a companion FiDo unit to simplify network security. The solution provides protection and visibility as it exposes invisible threats on networks and the devices attached to them, with patented technology to address and prevent cybersecurity threats before they compromise network environments. Every business, government, healthcare institution, home consumer, or other organization, is grappling to find security solutions that are adapting to this changing world. guardDog.ai is pioneering new innovations designed to meet these challenges. In 2022, guardDog.ai is expanding its reach still further to address full Attack Surface Management (ASM) and ASM-as-a-Service (ASMaaS) as cyber security’s next horizon. Additional virtual deployments for guardDog.ai are now available through methods such as clusters of open development based on containers, via Kubernetes orchestration, and through other industry partnerships. This makes guardDog.ai hardware agnostic and will provide IT staff, IT organizations and MSSPs (Managed Security Service Providers) with the ability to achieve instantaneous and unlimited deployments. For more information, visit www.guardDog.ai. Safe Harbor Statement This press release contains forward-looking statements of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Exchange Act. Forward-looking statements are not a guarantee of future performance and results, and will not be accurate indications of the times by which such performance will be achieved.

Read More

VIRTUAL DESKTOP TOOLS

GoodAccess Partners with phoenixNAP, a Global IT Services Provider

GoodAccess | July 27, 2022

GoodAccess, the company reinventing secure cloud access for small and medium businesses, today announced its partnership with phoenixNAP®, a global IT services provider offering security-focused cloud infrastructure, dedicated servers, colocation, and specialized Infrastructure-as-a-Service (IaaS) technology solutions. Built to provide an encrypted connection between users and business systems, GoodAccess Cloud VPN improves network security and helps address increased cyber risks in work-from-home environments. By securing employees' access to a company's network, GoodAccess Cloud VPN helps protect business data and applications from intrusion or breach. The solution makes it impossible for malicious actors to detect business systems, helping organizations enable zero-trust network access and ensure advanced protection of their networks. As a phoenixNAP recommended Cloud VPN option, GoodAccess can be easily deployed on top of Bare Metal Cloud and other phoenixNAP's infrastructure solutions. Providing robust network protection through an intuitive interface, GoodAccess adds a critical security layer to a corporate infrastructure. "Enabling secure network access for employees is vital to maintaining a safe and healthy IT environment, In an effort to provide businesses with advanced security tools and solutions, we collaborated with GoodAccess to offer organizations an easy way to deploy Cloud VPN for network protection. This is particularly important for organizations with remote work policies as it enables their employees to securely access corporate data and systems regardless of where they are located. We are excited to work with GoodAccess and offer its advanced solutions to organizations leveraging phoenixNAP's infrastructure." Ron Cadwell, CEO of phoenixNAP "Our collaboration with phoenixNAP enables businesses to easily deploy advanced infrastructure and network security technologies to address emerging security concerns," said Artur Kane, VP of product, GoodAccess. "GoodAccess Cloud VPN helps organizations protect both their assets and their employees by ensuring zero-trust remote access to corporate data. In our effort to deliver secure and compliance-ready solutions at a flexible and affordable model, we are aligned with phoenixNAP and we are looking forward to helping businesses take their security to a new level." Through its diverse infrastructure-as-a-service portfolio, phoenixNAP enables organizations to build stable and secure IT environments at an opex-based model. They can leverage a wide variety of security and availability solutions to ensure advanced data protection, business continuity, and compliance-readiness. phoenixNAP's solutions are available from strategic locations in the U.S., Europe, and Asia-Pacific, providing global reach and consistent connectivity worldwide. As one of phoenixNAP's most agile infrastructure solutions, Bare Metal Cloud enables organizations to automatically deploy dedicated servers and manage them easily through API or IaC tools. Its flexible hourly and monthly billing models make it possible for organizations to optimize their budget and easily scale resources as their demands grow. GoodAccess Cloud VPN can be easily added to Bare Metal Cloud as a network protection option to ensure advanced environment security. About GoodAccess GoodAccess is the global company dedicated to simplifying "anytime, anywhere" secure connectivity and access for small and medium businesses around the world, beginning with its free GoodAccess Starter product for unlimited usage for up to 100 employees. For companies with the need for static IP addresses, Zero Trust access and other requirements, GoodAccess provides a competitively priced platform that maintains simplicity and ease of use. GoodAccess products are designed for set-up within 10 minutes and the flexibility to meet varying conditions. About phoenixNAP phoenixNAP® is a global IT services provider with a focus on cyber security and compliance-readiness, whose progressive Infrastructure-as-a-Service solutions are delivered from strategic edge locations worldwide. Its cloud, dedicated servers, hardware leasing, and colocation options are built to meet always evolving IT business requirements. Providing comprehensive disaster recovery solutions, a DDoS-protected global network, and hybrid IT deployments with software and hardware-based security, phoenixNAP fully supports its clients' business continuity planning.

Read More

CLOUD

HBC Taps Veeam for Multi-cloud Data Protection and Ransomware Resilience

Veeam | September 27, 2022

Veeam Software, the leader in backup, recovery and data management solutions that deliver Modern Data Protection, today announced that HBC, a holding company of investments and businesses that operates at the intersection of technology, retail operations and real estate, has chosen Veeam Availability Suite™ to centralize data protection on premises and across clouds. Veeam helps HBC ensure business continuity, meet internal governance compliance requirements and protect against ransomware. Additionally, HBC saved more than $1 million in a one-time capital expenditure and saves $600,000 in recurring operational expenses annually. From the fur trade to Fifth Avenue, HBC has been in business for more than 350 years. North America’s longest continually operating company began in 1670 with a royal charter from England to seek a northwest passage to the Pacific Ocean, occupy the lands adjacent to Hudson Bay and set up commerce. Today, HBC is a legend in the retail world. It’s the majority owner of iconic e-commerce companies such as Saks, a leading online destination for luxury fashion, Saks OFF 5TH, a premier luxury off-price e-commerce company and The Bay, a Canadian e-commerce marketplace. HBC’s legacy is providing an unrivaled customer experience. “To improve upon the customer experience, we began a digital transformation to accelerate our e-commerce business, Operating multiple data centers didn’t make sense in our customer-centric world, so we adopted a multi-cloud strategy.” Ope Bakare, Chief Technical Officer, HBC As HBC moved IT systems and data to Amazon Web Services (AWS) and Azure, Bakare said he and his colleagues discovered something unfortunate about the legacy backup solution. It began to show signs of failing. “Failing backups can lead to downtime, and downtime can lead to big problems in retail,” he explained. “Downtime can drastically impact a company’s logistics ecosystem, leading to a domino effect that can break the business. We have a complex logistics ecosystem, so keeping it healthy and functioning is an absolute priority. An hour of downtime could cost our company millions of dollars in logistics and shipping.” Matthew Pick, Senior Director of Cloud Architecture at HBC, said there was another challenge with the legacy backup solution. “It was inflexible and didn’t integrate with our multi-cloud workloads. We began using backup tools provided by AWS and Azure, but they came with constraints like operational overhead, which is time consuming. We needed one flexible, powerful and scalable solution to protect every workload everywhere.” Veeam backs up 80 TB of data across more than 2,000 instances in AWS and Azure to Amazon Simple Storage Service (Amazon S3) and Azure Blob Storage. Veeam also back up 40 TB of data across 14 physical machines on premises to Dell EMC Data Domain. “One of the things I love most about Veeam is operational consistency,” Bakare explained. “We can protect every asset wherever it resides in a consistent way. Veeam takes the complication and noise out of data protection, allowing our engineers to focus on innovating for the business rather than worrying about backups.” Pick said operational consistency also allows for data retention to be a shared responsibility across teams. “Operational consistency places the onus on each business unit that wants to protect data,” he continued. “If they tag their VMs correctly, Veeam will back them up, without question.” Pick is referring to Veeam’s fully customizable policies that automate backup and data lifecycle management. He said policy-based automation also provides an easy way for the IT team to show each business unit how much data protection will cost. “Veeam enables us to have more productive conversations with each unit so we can set expectations appropriately. We also have visibility into our overall spend, and this is where the Veeam Universal License comes in handy. We can move licenses across business units and workloads to maximize our spend.” Bakare added that policy-based automation also ensures business continuity, supports internal governance compliance requirements and protects against ransomware. “We had been going through a process to validate and close gaps in our business continuity strategy, so Veeam’s ability to use tagging for cloud backup was a massive step forward for us. Tagging also ensures internal governance compliance and helps us fight ransomware. Veeam lets us separate our backups from our IT systems with a barrier, so if ransomware strikes our IT systems, our backups are safe.” Bakare said Veeam saves money, too. “Before we began the cloud migration we were closing in on a hardware and software refresh. Since Veeam is hardware, software and cloud agnostic, we avoided the refresh, saving more than $1 million in a one-time capital expenditure and $600,000 in recurring operating expenses annually. That’s a significant savings.” About Veeam Software Veeam is the leader in backup, recovery and data management solutions that deliver Modern Data Protection. The company provides a single platform for Cloud, Virtual, Physical, SaaS and Kubernetes environments. Veeam customers are confident their apps and data are protected from ransomware, disaster and harmful actors and always available with the most simple, flexible, reliable and powerful platform in the industry. Veeam protects 450,000 customers worldwide, including 81% of the Fortune 500 and 70% of the Global 2,000. Headquartered in Columbus, Ohio, with offices in more than 30 countries, Veeam’s global ecosystem includes 35,000+ technology partners, resellers and service providers and alliance partners.

Read More