Prometheus Data in Azure Monitor for Containers Previewed by Microsoft

virtualizationreview | July 19, 2019

On Thursday, Microsoft announced the preview stage availability of Prometheus integration with Azure Monitor for Containers.With this integration users can obtain both the "deeper telemetry" metrics Prometheus provides and the "out of the box" information obtained using Azure Monitor for Containers on Azure Kubernetes Service (AKS)-managed clusters. AKS is Microsoft's Kubernetes-based container orchestration service. Azure Monitor for Containers provides access to inventory, health, events, logs and performance information in AKS environments, as well as Azure Container Instances environments.

Spotlight

Avid NEXIS is the world’s first software-defined storage platform that enables true storage virtualization.

Spotlight

Avid NEXIS is the world’s first software-defined storage platform that enables true storage virtualization.

Related News

CLOUD

HBC Taps Veeam for Multi-cloud Data Protection and Ransomware Resilience

Veeam | September 27, 2022

Veeam Software, the leader in backup, recovery and data management solutions that deliver Modern Data Protection, today announced that HBC, a holding company of investments and businesses that operates at the intersection of technology, retail operations and real estate, has chosen Veeam Availability Suite™ to centralize data protection on premises and across clouds. Veeam helps HBC ensure business continuity, meet internal governance compliance requirements and protect against ransomware. Additionally, HBC saved more than $1 million in a one-time capital expenditure and saves $600,000 in recurring operational expenses annually. From the fur trade to Fifth Avenue, HBC has been in business for more than 350 years. North America’s longest continually operating company began in 1670 with a royal charter from England to seek a northwest passage to the Pacific Ocean, occupy the lands adjacent to Hudson Bay and set up commerce. Today, HBC is a legend in the retail world. It’s the majority owner of iconic e-commerce companies such as Saks, a leading online destination for luxury fashion, Saks OFF 5TH, a premier luxury off-price e-commerce company and The Bay, a Canadian e-commerce marketplace. HBC’s legacy is providing an unrivaled customer experience. “To improve upon the customer experience, we began a digital transformation to accelerate our e-commerce business, Operating multiple data centers didn’t make sense in our customer-centric world, so we adopted a multi-cloud strategy.” Ope Bakare, Chief Technical Officer, HBC As HBC moved IT systems and data to Amazon Web Services (AWS) and Azure, Bakare said he and his colleagues discovered something unfortunate about the legacy backup solution. It began to show signs of failing. “Failing backups can lead to downtime, and downtime can lead to big problems in retail,” he explained. “Downtime can drastically impact a company’s logistics ecosystem, leading to a domino effect that can break the business. We have a complex logistics ecosystem, so keeping it healthy and functioning is an absolute priority. An hour of downtime could cost our company millions of dollars in logistics and shipping.” Matthew Pick, Senior Director of Cloud Architecture at HBC, said there was another challenge with the legacy backup solution. “It was inflexible and didn’t integrate with our multi-cloud workloads. We began using backup tools provided by AWS and Azure, but they came with constraints like operational overhead, which is time consuming. We needed one flexible, powerful and scalable solution to protect every workload everywhere.” Veeam backs up 80 TB of data across more than 2,000 instances in AWS and Azure to Amazon Simple Storage Service (Amazon S3) and Azure Blob Storage. Veeam also back up 40 TB of data across 14 physical machines on premises to Dell EMC Data Domain. “One of the things I love most about Veeam is operational consistency,” Bakare explained. “We can protect every asset wherever it resides in a consistent way. Veeam takes the complication and noise out of data protection, allowing our engineers to focus on innovating for the business rather than worrying about backups.” Pick said operational consistency also allows for data retention to be a shared responsibility across teams. “Operational consistency places the onus on each business unit that wants to protect data,” he continued. “If they tag their VMs correctly, Veeam will back them up, without question.” Pick is referring to Veeam’s fully customizable policies that automate backup and data lifecycle management. He said policy-based automation also provides an easy way for the IT team to show each business unit how much data protection will cost. “Veeam enables us to have more productive conversations with each unit so we can set expectations appropriately. We also have visibility into our overall spend, and this is where the Veeam Universal License comes in handy. We can move licenses across business units and workloads to maximize our spend.” Bakare added that policy-based automation also ensures business continuity, supports internal governance compliance requirements and protects against ransomware. “We had been going through a process to validate and close gaps in our business continuity strategy, so Veeam’s ability to use tagging for cloud backup was a massive step forward for us. Tagging also ensures internal governance compliance and helps us fight ransomware. Veeam lets us separate our backups from our IT systems with a barrier, so if ransomware strikes our IT systems, our backups are safe.” Bakare said Veeam saves money, too. “Before we began the cloud migration we were closing in on a hardware and software refresh. Since Veeam is hardware, software and cloud agnostic, we avoided the refresh, saving more than $1 million in a one-time capital expenditure and $600,000 in recurring operating expenses annually. That’s a significant savings.” About Veeam Software Veeam is the leader in backup, recovery and data management solutions that deliver Modern Data Protection. The company provides a single platform for Cloud, Virtual, Physical, SaaS and Kubernetes environments. Veeam customers are confident their apps and data are protected from ransomware, disaster and harmful actors and always available with the most simple, flexible, reliable and powerful platform in the industry. Veeam protects 450,000 customers worldwide, including 81% of the Fortune 500 and 70% of the Global 2,000. Headquartered in Columbus, Ohio, with offices in more than 30 countries, Veeam’s global ecosystem includes 35,000+ technology partners, resellers and service providers and alliance partners.

Read More

VIRTUAL SERVER MANAGEMENT,SECURITY,VMWARE

Cloud Carib becomes first Caribbean Company to join VMware Sovereign Cloud Initiative

VMware | December 05, 2022

A leading provider of cloud services in the Caribbean and Latin America, Cloud Carib now joins the VMware Sovereign Cloud Initiative, helping clients better protect national sovereignty within its region of operation. The tech firm headquartered in Nassau, The Bahamas, made the formal announcement after recently attending VMware Explore 2022 Europe conference in Barcelona, formerly VMworld. Today, 100+ countries have their own laws governing how data should be managed and stored within their sovereign borders, and most of these regulations are constantly changing. Cloud Carib, as a VMware Sovereign Cloud provider, meets the significant capabilities in delivering more secure and compliant cloud services to government organizations, those in the public sector and any client with data residency requirements or concerns. “We’re extremely proud to be the first Caribbean company to join the Sovereign Cloud Initiative and are committed to helping Digital Transformation Initiatives realize sovereignty for the protection of the communities we serve. We’re dedicated to bringing sovereign cloud services to our clients, advancing the region’s data protection and sovereignty commitments, and supporting nations as they modernize and protect their data within their borders,” remarked Stelios Xeroudakis, Cloud Carib’s Founder and Chief Technology Officer. The VMware Sovereign Cloud initiative helps customers engage with trusted national cloud service providers to meet geo-specific requirements around data sovereignty and jurisdictional control; data access and integrity; data security and compliance; data independence and mobility; and data analytics and innovation. “There is no data sovereignty without cloud sovereignty. And sovereignty does not have to come at the expense of cloud innovation,” said Rajeev Bhardwaj, Vice President, Cloud Provider Platform Solutions, VMware. “VMware Sovereign Cloud providers such as Cloud Carib can help customers innovate and drive digital transformation while reducing the risk of unlocking the value of data.” New research conducted by Vanson Bourne[1] commissioned by VMware reveals that over the next two years, 96% of all companies surveyed believe data will be a source of revenue, and 50% believe it will be a significant revenue source. As economic uncertainty intensifies, it is not surprising that more business leaders are zeroing in on their data as an untapped revenue source. Yet the downside is just as big: respondents identified data sovereignty as one of the key challenges facing organizations, with 95% admitting it is a concern. Organizations that fail to comply with data sovereignty regulations often must pay fines in the hundreds of millions of dollars and suffer damage to brand reputation because of data compromise. The first jurisdiction to benefit from this rollout is our home base in The Bahamas. Joining the Sovereign Cloud initiative amplifies our decade-long commitment to this region. So, this really is just the beginning as we aim to further that commitment by offering Sovereign Cloud to each country in the region as regulations evolve and security demands increase." Cloud Carib CEO Scott MacKenzie. About Cloud Carib Cloud Carib is the region’s premier provider of managed cloud services founded upon the principles of delivering quality, agility, and value for every client. Solutions range from complex bespoke dedicated private cloud offerings to hybrid cloud services. Every solution provides clients with controlled costs, unrivalled levels of service, and unparalleled levels of data protection and privacy – when and where privacy matters. VMware VMware is a registered trademark of VMware, Inc. in the United States and other jurisdictions. This article may contain hyperlinks to non-VMware websites that are created and maintained by third parties who are solely responsible for the content on such websites.

Read More

VIRTUAL SERVER INFRASTRUCTURE

Code42 Incydr Supports Leading Desktop-as-a-Service Offerings and Virtual Desktop Infrastructure Solutions

Code42 | September 26, 2022

Code42 Software, Inc., the Insider Risk Management (IRM) leader, today announced its Incydr product fully supports all major Desktop-as-a-Service (DaaS) and Virtual Desktop Infrastructure (VDI) environments. The Code42® Incydr™ product detects when valuable and sensitive files are moved to untrusted locations, including personal email and cloud accounts, and removable media – and allows security teams to quickly respond in order to stop data leaks and theft. According to a recent survey of IT professionals published by Citrix, nearly 70% of organizations are planning to implement VDIs to accommodate hybrid or remote work strategies, with just under 60% accelerating the adoption of cloud tools. Though DaaS and VDI solutions help security teams better protect against vulnerabilities, malicious actors and other external threats, they do little to reduce the risk from insiders, as virtual environments inherently depend on cloud tools. “We’ve seen a notable uptick in the number of teams that have deployed DaaS and VDI solutions throughout their environments. Given the continued popularity of bring-your-own-device (BYOD) and remote work, coupled with an unstable hardware supply chain, we absolutely expect this trend to continue, In virtual-first organizations where there is pervasive use of cloud collaboration tools, such as Git, Salesforce, GDrive, OneDrive and iCloud, Incydr wraps a layer of protection around data put at risk by insiders, complementing solutions that focus on external threats and malicious actors.” Rob Juncker, CTO of Code42 Code42 Incydr: The Industry’s Leading Data Security Product for Exfiltration Detection and Response Incydr is an Insider Risk Management solution that provides the visibility, context and controls needed to stop data leak and IP theft. Organizations utilize Incydr to detect and respond to data exposure and exfiltration from corporate computer, cloud and email systems. It deploys in hours so security teams can address material risk to the business in a matter of days and drive the secure work habits needed to decrease how often employees put data at risk in the future. Code42 Instructor: Education-Led Insider Risk Response The Code42 Instructor™ micro-learning solution improves Insider Risk awareness by focusing on the creation of holistic, security-oriented cultures. The solution delivers actionable, hyper-targeted and bite-sized video lessons to end-users when they’re needed most, helping to change security behavior for the long term. The Instructor solution helps organizations rapidly mature their Insider Risk Management programs by incorporating data-driven Insider Risk behavioral guidance for end-users. Combining the Power of Incydr and Instructor Instructor works in tandem with Incydr, allowing security, compliance and education teams to immediately send corrective video lessons triggered by employee actions that create risk for the business. For example, when Incydr flags file movement to an untrusted location, like an unauthorized cloud application, an Instructor video specifically explaining the correct activity is sent to educate the employee in real-time through the Incydr solution. Code42 Services: Measure, Manage, Mitigate IRM technology is simpler and faster to deploy than other technologies, such as DLP and CASB, but it does require a strategy and mindset shift. Insider Risk Management isn’t only about data – it’s about a company’s employees and culture. Code42 IRM Services are designed to help organizations establish an efficient and effective IRM program rooted in transparency, training and technology. Code42’s services take a collaborative approach to helping organizations develop, operationalize, and mature an end-to-end IRM program. About Code42 Code42 is the leader in Insider Risk Management (IRM), offering end-to-end data loss detection and response solutions. The Code42 Incydr product is native to the cloud and rapidly detects data exposure, loss, leak and theft as well as speeds incident response – all without lengthy deployments, complex policy management or blocking employee productivity. Accelerating the effectiveness of Insider Risk programs are the Code42 Instructor microlearning solution, and Code42’s full suite of expert services. With Code42, security professionals can protect corporate data and reduce insider risk while fostering an open and collaborative culture for employees. Designed to meet regulatory control requirements, Code42’s IRM solution is FEDRAMP authorized and can be configured for GDPR, HIPAA, PCI and other compliance frameworks. Innovative organizations, including the fastest-growing security companies, rely on Code42 to safeguard their ideas. Founded in 2001, the company is headquartered in Minneapolis, Minnesota, and backed by Accel Partners, JMI Equity, NewView and Split Rock Partners. Code42 has played a defining role in developing a vision and requirements for the IRM category – now recognized by Gartner, IDC and Forrester – and is a founding member of the annual Insider Risk Summit and Insider Risk Community. The Company has several offices across the United States and its clients include large multinational organizations, such as Crowdstrike, Exabeam, BAYADA Home Health Care, Juniper Networks, Lending Club, MacDonald-Miller, MACOM, North Highland, Ping Identity, Shape Technologies, Snowflake, University of Georgia, User Testing, UTEX and Xactly.

Read More