NetApp Updates Virt and Cloud Products with VMware Integrations

Virtualization Review | September 09, 2019

NetApp is offering new hybrid and private cloud solutions for VMware platforms.Sunnyvale, Calif.-based company unveiled four new products and a service in connection with the VMworld 2019 conference held late last month. The solutions span hybrid cloud, virtual desktop infrastructure (VDI) and hyperconverged infrastructure (HCI) requirements. As a result of our ongoing partnership with VMware, we offer breakthrough management solutions for virtual infrastructure, private cloud, public cloud and desktop virtualization -- in any cloud, in one experience -- that offer superb simplicity for high-performance, complex environments," Brett Roscoe, vice president, Product Management, NetApp Cloud Infrastructure Business Unit, said in a statement.

Spotlight

A hosting environment priced for the small business community. Navigating today’s ever-changing small business market can be challenging, especially when it comes to choosing a technology provider. Let the experts at the Small business Authority help you manage your IT infrastructure in our high-performance cloud – a solution guaranteed to save you money. loud computing is a general term for anything that involves delivering hosted services over the Internet. A cloud service has three distinct characteristics that differentiate it from traditional hosting. It is sold on demand, typically by the minute or the hour; it is elastic a user can have as much or as little of a service as they want at any given time; and the service is fully managed by the provider.

Spotlight

A hosting environment priced for the small business community. Navigating today’s ever-changing small business market can be challenging, especially when it comes to choosing a technology provider. Let the experts at the Small business Authority help you manage your IT infrastructure in our high-performance cloud – a solution guaranteed to save you money. loud computing is a general term for anything that involves delivering hosted services over the Internet. A cloud service has three distinct characteristics that differentiate it from traditional hosting. It is sold on demand, typically by the minute or the hour; it is elastic a user can have as much or as little of a service as they want at any given time; and the service is fully managed by the provider.

Related News

VIRTUAL DESKTOP STRATEGIES

Red Hat Helps Enterprises Modernize at Scale with New Migration Toolkit

Red Hat | November 23, 2022

Red Hat, Inc., the world's leading provider of open source solutions, today announced the general availability of Migration Toolkit for Applications 6, based on the open source project Konveyor, aimed at helping customers accelerate large-scale application modernization efforts. The toolkit enables customers to better assess, prioritize and modernize their applications across hybrid cloud environments on Red Hat OpenShift, the industry’s leading Kubernetes platform. Few would disagree that the technology landscape has shifted dramatically in recent years. According to Red Hat’s 2022 State of Application Modernization Report, organizations plan to modernize 54% of their custom applications during the next year, and over a quarter of these workloads during the next six months. In the medium term, respondents also reported that 80% of applications will be modernized in the next two years. It’s clear that the reliance on virtualization, as we currently understand it, has shifted. Organizations are embracing cloud-native technologies to meet heightened user expectations and market competition, but this doesn’t happen overnight. With Migration Toolkit for Applications and related services and offerings, Red Hat is helping customers modernize applications at their speed and on their timelines. Migration Toolkit for Applications is an integrated assembly of tools that support Java application modernization and migration projects at scale across a broad range of use cases. Now designed to help migration leads and developers find the best and most reliable modernization path forward, Migration Toolkit for Applications 6 includes: New application inventory and assessment modules that assist organizations in managing, classifying and tagging their applications while assessing application suitability for deployment in containers, including flagging potential risks for migration strategies. Full integration with source code and binary repositories to automate the retrieval of applications for analysis along with proxy integration including HTTP and HTTPS proxy configuration managed in the user interface. Improved analysis capabilities with new analysis modes, including source and dependency modes that parse repositories to gather dependencies and add them to the overall scope of the analysis. There is also a simplified user experience to configure the analysis scope, including open source libraries. Enhanced RBAC powered by Red Hat Single Sign-On, defining three new differentiated personas with different permissions to suit the needs of each user—administrator, architect and migrator—including credentials management for multiple credential types. Administrator perspective to provide tool-wide configuration management for administrators. Open source community drives containerization leap Kubernetes is fueled by a vibrant open source community and to further drive adoption, Red Hat and IBM Research created Konveyor. Konveyor is an open source project aimed at helping modernize and migrate applications for open hybrid cloud deployments by building tools, identifying patterns and providing advice on bringing cloud-native transformation across IT. The Cloud Native Computing Foundation (CNCF) project forms the foundation for Migration Toolkit for Applications and with this set of tools, organizations can have deeper insight throughout their adoption process—whether they’re making decisions at the portfolio or application level. To learn more about the latest version of Migration Toolkit for Applications, visit the webpage here. “Hybrid cloud isn’t just the future of computing—it’s here now, and Red Hat is determined to give our customers the tools, direction and intelligence to help them bring their applications to this new world. We know that transformation doesn’t happen overnight, which is why Red Hat Modernization Toolkit for Applications is designed to accelerate modernization, not stifle it, by easing the process of bringing traditional applications to a hybrid cloud-ready platform with analysis and automation.” James Labocki, senior director, product management, Red Hat About Red Hat, Inc. Red Hat is the world’s leading provider of enterprise open source software solutions, using a community-powered approach to deliver reliable and high-performing Linux, hybrid cloud, container, and Kubernetes technologies. Red Hat helps customers integrate new and existing IT applications, develop cloud-native applications, standardize on our industry-leading operating system, and automate, secure, and manage complex environments. Award-winning support, training, and consulting services make Red Hat a trusted adviser to the Fortune 500. As a strategic partner to cloud providers, system integrators, application vendors, customers, and open source communities, Red Hat can help organizations prepare for the digital future.

Read More

SERVER VIRTUALIZATION

New Hedge Fund Managed IT Trends Report Shows Industry Shift in IT Outsourcing and AI-Driven Services

Agio | September 16, 2022

Agio, a leading cybersecurity and managed IT provider for financial services firms, published its inaugural 2022 Hedge Fund Managed IT Trends Report today. The survey, conducted earlier this year, captures the opinions and perceptions of recent, current, and future technology management and information security programs, initiatives, and readiness from 100 hedge fund practitioners across the technology, operations, cybersecurity, and compliance fields. Survey respondents revealed that, coming out of the pandemic, firms are reevaluating their options with respect to in-sourcing versus outsourcing IT management. Looking ahead to the next two years, 89 percent of firms that currently in-source IT management said they are likely to allocate more spend to outsourced services. The driver behind this shift is a need for heightened security (54%), increased access to public cloud management and support expertise (46%), and more responsive end-user support (44%). 89% of firms that in-source IT management today said they plan to allocate more spend to outsourced services. Of those firms already outsourcing IT management, 91 percent said they are likely to switch providers. Among the largest hedge funds that currently outsource (funds with +$5 billion AUM), nearly two-thirds (64%) reported they were likely to change service providers in the next 24 months because their current vendor is unable to support a public cloud environment. In discussing how the managed service provider (MSP) model will change in the coming years, respondents predicted providers will employ artificial intelligence to remove service friction and increase service uptime (47%), as well as to enable support agents to be more responsive when issues do arise (47%). Most firms (51%) also predicted that MSPs will soon be measured and compensated by how well they limit break-fix issues versus how many issues they resolve. "Viewing IT management and security operations through a single lens is essential to our vision of delivering secure, reliable, and resilient information systems, We also agree with survey respondents that MSPs must evolve now or perish. We've made meaningful investments in AI-driven tools that empower our support agents to deliver better client service and improved system availability. That combination of human brilliance and predictive analytics is the future of managed services." Bart McDonough, CEO and Founder of Agio Other topics explored in this year's report include how firms are adjusting to the impact of new regulations; what steps firms are taking to ensure system uptime and information security while supporting a distributed workforce; and how the industry is shifting with respect to managing systems on-prem, in the cloud, and across multiple cloud environments. About Agio Agio is a hybrid cybersecurity and managed IT organization equipping the financial services and healthcare industries with next-generation cyber protection and technology support. Agio has extensive experience building, maintaining, optimizing, and securing IT infrastructure for the world's most prestigious client organizations. With more than 300 employees, our culture prioritizes frequent and timely communication to provide unrivaled, highly personalized service across all our solutions, including managed detection and response, 360° cybersecurity programs, virtual CISO (vCISO) support, technology hosting, monitoring, management, global service desk, desktop as a service, disaster prevention, and recovery. Agio is headquartered in New York, NY, with additional offices around the world.

Read More

VIRTUAL DESKTOP STRATEGIES

Castle Shield Holdings, LLC Updates the Post-Quantum Cryptography (PQC) Algorithms for Its Data-in-Motion Aeolus VPN Solution

Castle Shield Holdings, | October 14, 2022

Castle Shield Holdings, LLC., a leader in Zero Trust and cybersecurity solutions, today announced that its Aeolus VPN solution now supports additional post-quantum cryptography (PQC) algorithms selected by the National Institute of Standards and Technology (NIST). Last year, prior to the conclusion of the third round of the NIST PQC Standardization, we announced the successful integration of the Saber algorithm into Aeolus VPN. Reference our October 11, 2021, press release. NIST has now selected two primary PQC algorithms for most use cases: CRYSTALS-KYBER and CRYSTALS-Dilithium. In addition, the signature schemes FALCON and SPHINCS+ were standardized as well. Kyber and Dilithium were both selected for their strong security and excellent performance, and NIST expects them to work well in most applications. Therefore, we have integrated Kyber (i.e., Kyber1024) and Dilithium (i.e., Dilithium5) algorithms into Aeolus VPN as well. Aeolus VPN protects data between two or more network points. It offers a streamlined approach to privacy which results in more stability and lower latency that is a perfect addition to enterprise data-in-motion security for both classic and post-quantum computing environments. Aeolus VPN offers point-to-point asymmetric PQC and symmetric encryption for UDP and TCP on Windows, Linux and macOS platforms. “At Castle Shield, we are encryption agnostic. As NIST selects new PQC standards, we will add them to our suite of solutions that further demonstrates the cryptographic agility of our products. Our primary focus is to seamlessly integrate the best encryption algorithms available with our solutions to protect our customer’s data for today and tomorrow,” Dr. Milton Mattox, Chief Technology Officer at Castle Shield, Holdings, LLC Aeolus VPN with PQC continues to be available today for testing, proofs of concept, and production installations. About Castle Shield Holdings, LLC Founded in 2019, Castle Shield offers a complete range of enterprise-grade cybersecurity solutions that protects enterprises and consumers against all internal and external cyber threats. Our quantum-resistant solutions (Fides) stand strong as the last line of defense for enterprise and consumer data in the emerging quantum computing threat landscape. Legion, our Security Information Event Management or (SIEM) product portfolio and Fides work together to strengthen your overall data security. We monitor and address threat vectors through our scalable, multi-tenant SIEM platform, protecting enterprise systems and data in an efficient, cost-effective manner. In addition, we utilize an advanced compliance platform (Senate) and expert analysis with an in-depth understanding of dynamic compliance standards and industry best practices to highlight cyber risk factors. Our Senate system provides comprehensive ratings for third party vendors based on technical risk scores, compliance, and financial impact in the event of a breach. Our 360° proactive security solutions are what sets Castle Shield apart independent of your IT backbone whether cloud, hybrid or premise based.

Read More