Scale Computing Announces Business Resilience Solution with Complete VDI, Remote-Work Infrastructure, and Strengthened Ransomware Protection

Scale Computing | July 15, 2020

Scale Computing Announces Business Resilience Solution with Complete VDI, Remote-Work Infrastructure, and Strengthened Ransomware Protection
Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, has today announced a business resilience solution combining preventative availability and reactive recovery technologies to ensure organizations can keep data, applications, and workers online in an increasingly digital world with ever-present threats that can disrupt ongoing business operations and current investments in digital transformation projects. Built around its highly available HC3 platform, Scale Computing’s Business Resilience Solution brings together server virtualization, end-user computing, data protection, and threat mitigation into a single package. This includes complete Virtual Desktop Infrastructure (VDI) and remote-work infrastructure with built-in disaster recovery services, enhanced by Scale Computing’s partnership with Acronis® to offer best-of-breed ransomware protection and data backup.

Spotlight

Due to more options and growing complexity, managing IT infrastructure in a data center is becoming increasingly difficult. Changing data center infrastructure that has evolved over time can significantly affect stability, performance, costs, and upgradability.Dell EMC Ready Stack solutions are proven, tested, and optimized to help organizationsmeet long-term data center needs for a variety of mixed workloads. This Ready Stacksolution provides the simplicity of a complete, yet flexible, validated convergedinfrastructure (CI) that is based on the following components:

Related News

VIRTUAL DESKTOP STRATEGIES

Sangfor Releases Extended Detection, Defense and Response (XDDR) Application Containment

Sangfor Technologies | September 17, 2021

Sangfor Technologies announced the release of their long-awaited extended protection solution, XDDR Application Containment. Based on Sangfor's XDDR security framework, Application Containment allows the network and endpoints (both on-premise or in-cloud) to work together to identify, control, and report on all applications running on endpoints, or using the network to communicate. Sangfor's XDDR provides an integrated solution that protects against ransomware, malware, APTs, phishing websites and email, and potentially malicious applications. Controlling and enforcing internet access policies in the workplace has not been easy. Employees want access to the internet for personal use as well as their work, making overly restrictive security solutions difficult to implement and maintain. Organizations deploy proxy servers to control access to the internet and external applications. This access control is necessary to maintain productivity, ensure users do not access malicious sites and unknowingly download malware, and to maximize bandwidth utilization for critical business applications. Many users employ VPN (virtual private network) technology, anonymous browsers, and other proxy avoidance applications to bypass organizational security and content filtering policies enforced by the proxy servers. Sangfor XDDR Application Containment solutions enable the organization to quickly create Proxy Avoidance Protection policies for blocking usage of proxy avoidance tools and applications on the endpoint. Sangfor's NGAF (Next Generation Application Firewall), IAG (Internet Access Gateway) and Endpoint Secure products work cohesively to provide real-time visualization of all application communication throughout the entire network, quickly identifying proxy avoidance traffic. Proxy Avoidance Protection policies can quickly be built on the NGAF or IAG from Sangfor's extensive library of anti-proxy and proxy avoidance applications. These policies are then deployed by Endpoint Secure to block or monitor anti-proxy applications. Organizations can also create whitelists and blacklists of applications in Application Containment. This gives administrators granular control of applications running on PCs, laptops, and servers to prevent installation of malware and ransomware, especially with users working from home, to prevent infection of corporate, enterprise, or organizational networks, resources, and critical assets. Peripheral Control manages access to connected USB devices to prevent data leakage. Traditional extended detection and response (XDR) is network security technology designed to provide increased visibility, analysis functions and response to cyber-threats in the network, cloud, applications, and endpoints. XDR is positioned as the most sophisticated technology available but tends to be more marketing hype than reality, having been developed as the progression of EDR, or endpoint detection and response, to work with non-integrated network security products. Unlike XDR products, Sangfor XDDR Application Containment is the only true solution where network and endpoint work together to identify, control, and report on both allowed and malicious applications running on endpoints and communicating across the network. Sangfor NGAF, IAG and Endpoint Secure coordinate responses so Application Containment can provide real-time blocking and monitoring of unapproved or malicious applications. Control can be regained from rogue applications delivered by ransomware, malware and APTs that users bring into networks. Sangfor Application Containment blocks the bypassing of internet access controls and prevents users from bringing them in again. About Sangfor Technologies Sangfor Technologies is a leading global vendor of IT infrastructure and security solutions, specializing in Cloud Computing & Network Security with a wide range of products & services including Hyper-Converged Infrastructure, Virtual Desktop Infrastructure, Next-Generation Firewall, Internet Access Gateway, Endpoint Protection, Ransomware Protection, Managed Detection and Response, WAN Optimization, SD-WAN, and many others.

Read More

VMWARE

ScaleMP™ Joins the VMware Technology Alliance Partner Program

ScaleMP | October 26, 2020

-ScaleMP, a leading provider of virtualization for high-end computing, today announced it has joined the VMware Technology Alliance Partner (TAP) program at the standard partnership level. Members of the TAP program collaborate with VMware to deliver innovative solutions for virtualization and cloud computing. The diversity and depth of the TAP ecosystem provides customers with the flexibility to choose a partner with the right expertise to satisfy their unique needs.

Read More

VPN

Hillstone Networks Sets New Standard in Intelligent, Reliable and Automated Security Solutions With StoneOS 5.5R9

Hillstone Networks | January 19, 2022

Hillstone Networks, a leading provider of infrastructure protection solutions, introduced the latest iteration of its flagship StoneOS solution. Organizations today demand a comprehensive, intelligent, high-performing and automated security solution that works. StoneOS delivers. This is a major upgrade resulting in unparalleled capabilities to help protect organizations, their critical assets and their workforces from the myriad of security threats they face every day.” Tim Liu, CTO & co-founder of Hillstone Networks 6 Key Updates to StoneOS 5.5R9 include: Machine learning technology leveraged to enhance intelligent detection and prevention -StoneOS leverages the latest ML-based data sets to help bolster DGA detection. The extended support of a cloud sandbox allows for improved unknown threat detection and enhanced intelligence sharing. Extended VPN capability delivers refined secure access for the remote workforce – The new additional VPN features support extended user scenarios, a configuration wizard, and a performance upgrade to help meet the growing demand of feature-rich VPN solutions at a lower TCO. Additional enhancements unleash the power of hardware acceleration for traffic decryption –The new StoneOS release optimizes the throughput performance of SSL proxy and introduces the whitelist capability to help exempt certain entities in particular scenarios. Automated, scalable and smarter policy management and operations – A new mini policy feature allows central orchestration systems to meet dynamically changing security requirements. Additionally, app-based policy rule recommendation and NAT policy redundancy checks help improve efficiency. Advanced integration capabilities for 3rd party and SDN solutions – In addition to RESTful APIs and SNMP, the new StoneOS supports configuration and management over Netconf. Beyond that, StoneOS improves its ability to leverage external resources. Comprehensive system robustness optimization from services to modules – Beyond extending high availability solutions to IPv6, the new StoneOS release brings service level robustness by redesigning the software architecture and module level optimization for the data center firewalls. About Hillstone Networks Hillstone Networks’ proven Infrastructure Protection solutions provide enterprises and service providers with the visibility and intelligence to comprehensively see, thoroughly understand, and rapidly act against multilayer, multistage cyberthreats. Favorably rated by leading analysts and trusted by global companies, Hillstone protects from the edge to cloud with improved total-cost-of-ownership.

Read More

Spotlight

Due to more options and growing complexity, managing IT infrastructure in a data center is becoming increasingly difficult. Changing data center infrastructure that has evolved over time can significantly affect stability, performance, costs, and upgradability.Dell EMC Ready Stack solutions are proven, tested, and optimized to help organizationsmeet long-term data center needs for a variety of mixed workloads. This Ready Stacksolution provides the simplicity of a complete, yet flexible, validated convergedinfrastructure (CI) that is based on the following components: