UTS deploys virtual apps for 10,000 IT and engineering students

UTS | April 02, 2019

Engineering and IT students at the University of Technology Sydney can now access resource intensive software necessary for their coursework from a cloud-hosted virtual environment. The university has made the applications available through VMware Horizon Cloud on Azure, giving 10,0000 students access to tools and compute power they wouldn't ordinarily have from home. Deputy CIO Peter Gale said the processing power needed for research and coursework in the engineering faculty can be a stretch, even for the most powerful workstations.

Spotlight

Find out how KVM and container virtualization differs and how each can be used to create a flexible virtualization solution for any business environment.

Spotlight

Find out how KVM and container virtualization differs and how each can be used to create a flexible virtualization solution for any business environment.

Related News

VIRTUAL DESKTOP STRATEGIES, SERVER HYPERVISORS

Leostream Announces Seamless Hybrid Cloud Environments with VMware Hypervisor and AWS Workspaces

businesswire | April 03, 2023

Leostream™, the world's leading Remote Desktop Access Platform provider, has announced its new integration with Amazon WorkSpaces Core, providing organizations with a seamless and secure experience for deploying virtual desktops and applications in hybrid cloud environments, particularly when using VMware infrastructures. WorkSpaces Core enables customers and partners to create custom VDI solutions using purpose-built compute instances optimized for virtual desktops. By adding both Leostream and WorkSpaces Core, organizations that use on-premises VMware hypervisors can easily and quickly maximize the utility of desktops and applications hosted in the cloud, while benefiting from improved security and lower costs. The combination of using VMware hypervisors on-prem, Amazon WorkSpaces in the cloud, and the Leostream Connection Broker to manage the entire environment provides numerous benefits, including simplified management, better end-user experience, enhanced security and compliance features, greater workflow flexibility, and easier user on-boarding. "Organizations that rely on VMware for their digital workspace requirements often have users who would benefit from a cloud-based workspace," commented Leostream CEO Karen Gondoly. "However, IT needs a solution that can manage these hybrid environments from a single web-based administrator portal. Leostream is uniquely positioned to offer a seamless way to provide this hybrid experience with WorkSpaces Core and VMware environments. This latest solution is part of Leostream's ongoing efforts to enable enterprises to build a better way to manage hybrid work." Leostream's platform offers the world's most robust desktop connection management and remote access feature set, providing organizations with the flexibility to choose best-of-breed components to satisfy their complex security, cost, and flexibility needs. Furthermore, Leostream is renowned for being the go-to solution as the remote desktop access platform of choice—leveraging its unique ability to mix and manage on-premises and cloud-based hosting platforms. The platform's success stems from its ability to orchestrate disparate technologies from a single-pane-of-glass—allowing organizations to advance the state of their entire hosted desktop environment while integrating new technologies as they come to market. AboutLeostream Corporation At Leostream, we take great pride in knowing that we are the world's premier and most comprehensive Remote Desktop Access Platform. This is because we believe everyone deserves a seamless work-from-anywhere environment, regardless of industry, size, or location. With the Leostream platform, it all starts with insight paired with simplicity. Powered by a single-pane-of-glass admin console, our platform simplifies the management of users, cloud desktops, and IT assets—all with real-time dashboard access to view usage and environment details, helping to make informed decisions.

Read More

VIRTUAL DESKTOP TOOLS, SERVER VIRTUALIZATION

Delinea Platform Debuts in Secret Server for PAM Unification

Delinea | March 15, 2023

On March 14, 2023, Delinea Platform, a cloud-native platform for Delinea's well-known PAM solutions, enabled dynamic permission controls, end-to-end visibility, and adaptive security. Delinea Platform supports the latest version of Secret Server, its winning vault solution. It also supports a secure remote access service for suppliers and remote workers that doesn't require a VPN, as well as a rich environment for integration across the Delinea marketplace. According to the Identity Defined Security Alliance study, 84% of firms had an identity-related breach last year. Gartner predicts that enterprises that deploy cybersecurity mesh architectures will cut security incident costs by 90% by 2024. By implementing a privileged access management platform as part of their cybersecurity mesh strategy, enterprises are able to move away from multiple-point solutions. This results in improved visibility, security, and efficiency across the organization. Delinea Platform enables streamlined authorization for all identities, restricting access to an organization's critical hybrid cloud infrastructure and sensitive data. This simplified security approach helps minimize risk and ensure compliance with industry regulations. The growing number of siloed security products and the exponential expansion of human and machine identities with privileges make the management of privileged access difficult. As Delinea Platform adds more features, businesses will be able to manage authorization for all types of identities from a single location, which will improve efficiency and security. With analytics-based access controls and adaptive privilege automation in IT infrastructure, future updates to Delinea Platform will make sure that security stays consistent. This will ensure that identities get the right access at the right time with the authorized permissions. Phil Calvin, Chief Product Officer at Delinea, stated, "The Delinea Platform will revolutionize the market by unifying and extending Privileged Access Management, dramatically reducing risk from the most common thread across all cyberattacks – compromised identities." He added, "We are excited to take this first step by unifying the critical and core PAM capabilities on the Delinea Platform to provide world-class usability, seamless security, and simplified pricing that will accelerate adoption for our customers." (Source – CISION PR Newswire) About Delinea Delinea, an upcoming enterprise, is a significant provider of privileged access management (PAM) solutions for modern and hybrid organizations. Delinea Platform effortlessly extends PAM by authorizing all identities, limiting access to an organization's most crucial hybrid cloud infrastructure and sensitive data, reducing risk, ensuring compliance, and making security easier. The company simplifies and limits access for thousands of clients globally. Its customer base includes small enterprises as well as large-scale financial institutions, intelligence agencies, and companies involved in constructing and maintaining critical infrastructure.

Read More

SERVER VIRTUALIZATION, VIRTUAL SERVER INFRASTRUCTURE

With Holistic View of Layered Security Technologies, Infinitely Virtual Rolls Out Integrated, Multifaceted Lineup

prweb | April 11, 2023

Recognizing that no company is too small to be a target of cyberattacks, cloud pioneer Infinitely Virtual today introduced a series of layered security tools and technologies. Newly packaged from IV are three integrated components: IV Host, IV Manage, and the ostensible flagship in the lineup, IV Protect. IV Protect goes beyond the built-in security within E.V.E., IV’s Cloud Platform, to provide additional protection against established and emerging cyberthreats. These solutions help address various threat vectors — from weak passwords and phishing to malicious websites and uninformed users — to keep systems and data as safe as possible. IV Protect strengthens security with targeted solutions to meet any SMB’s specific cybersecurity requirements. “Where alien code is concerned, the science of acting, reacting, anticipating, eradicating and managing has evolved,” said Adam Stern, IV Founder and CEO. “The world that anti-virus/anti-malware products inhabit has morphed as well, transformed by nefarious external forces and broader, smarter responses -- digital signatures, heuristics, memory management, etc.” In concept, the products are organized like a Venn diagram, with overlapping ala carte offerings, pegged to an organization’s discrete needs. Collectively, the various elements combine technology and human experience to perform highly accurate threat hunting, monitoring, and response at scale, among other capabilities. The IV Protect suite helps rapidly identify threats -- and limit their impact -- without the need for additional staffing. Given the length of time traditional solutions have been available, bad actors have learned how to evade them, he said. With the number and intensity of high-value cyberattacks growing, technology is increasingly scrutinizing behaviors, sketching on a wider canvas and examining more variables. “IV Protect, which integrates MDR with capabilities like DNS filtering, is both an advance and a throwback: automated and high touch,” Stern said, noting that security awareness training and compliance are central to the offering. IV Protect: Drilling Down Among the capabilities integrated into IV Protect: Multifactor Authentication Technology (MFA) - Multi-factor authentication (MFA) is an access security solution used to verify a user's identity at login. It adds two or more identity-checking steps to user logins by use of secure authentication tools, providing a fast, simple, and non-disruptive authentication experience. Managed Detection and Response (MDR) - Traditional antivirus solutions are no longer sufficient to protect servers and endpoints. IV Managed Detection & Response (MDR) provides AI-powered prevention, detection, response, and threat hunting across IV- hosted servers and local user endpoints, to protect against potentially harmful threat attacks that can put data —and the business itself— at risk. DNS Filtering - IV’s DNS Filter is a cloud-based, AI-driven content filtering and threat protection service that blocks malicious websites and filters out harmful or inappropriate content. It prevents users from unknowingly accessing unsafe websites via links in an email, while giving the organization the ability to restrict access to specific websites within a local network. Email Security - IV Email Security is an integrated cloud email security solution that is fast to deploy, easy to use, and protects the organization against today’s most dangerous phishing threats. The capability delivers email security in the mailbox using anomaly detection to stop advanced phishing threats such as Business Email Compromise (BEC), ransomware, credential harvesting and more. Security Awareness Training - IV SAT helps ensure that employees serve as a strong line of defense against the latest methods of attack. A critical piece of a strong security program, this solution makes it easy to send and track training videos on a wide range of security-related topics to the people within the organization who need them most. According to ISACA expert Tan Soon Chew, “a comprehensive cybersecurity awareness program should be established and implemented to educate every person (including external vendors and their personnel) who uses, operates and manages the enterprise’s assets or data… the program’s effectiveness should be measured at regular intervals (e.g., annually).” “We at IV are taking a refreshingly honest step forward by acknowledging that AI can’t yet be trusted to protect organizations definitively,” Stern said. “IV Protect in particular argues in favor of including actual human beings to take a closer look and to parse a timeline of events. MDR includes a SOC where threat hunters -- folks in a digital war room who get these alerts -- seek to determine if they are harmless or nefarious.” About Infinitely Virtual The World's Most Advanced Hosting Environment. Infinitely Virtual is a leading provider of high-quality and affordable Cloud Server technology, capable of delivering services to any type of business, via terminal servers, SharePoint servers and SQL servers – all based on Cloud Servers. Infinitely Virtual has earned the highest rating of "Enterprise-Ready" in Skyhigh Networks’ CloudTrust™ Program for four of its offerings -- Cloud Server Hosting, InfiniteVault, InfiniteProtect and Virtual Terminal Server. Founder and CEO Adam Stern is a member of the Forbes Technology Council. Infinitely Virtual was established as a subsidiary of Altay Corporation, and through this partnership, the company provides customers with expert 24×7 technical support.

Read More