VMware, Cisco Systems issue security warnings

itworldcanada.com | July 04, 2019

IT administrators have been warned by two of the biggest suppliers of enterprise products of security vulnerabilities.VMware issued an important alert this week for updates after finding 30 of its products are vulnerable to the recently discovered Linux kernel TCP Selective Acknowledgement (SACK) vulnerabilities. Those bugs could lead to a distributed denial of service attack against those products, the company said.Meanwhile Cisco Systems said it is updating the firmware on a number of its Small Business 250, 350, 350X, and 550X as well as the FindIT Network Probe after researchers at a security firm discovered that by using a third party software library security certificates from a Huawei Techonologies subsidiary had been included in the Cisco products.

Spotlight

Future 5G networks will support a wide range of services and use cases arising from different vertical industries (e.g., IoT, eHealth, Industry4.0, etc.). Each of these services / business cases impose their own set of requirements to the network infrastructure, in terms of security, latency, elasticity, resiliency, and bandwidth. To deal with these challenges, the NGMN proposed the concept of network slicing (NS). Briefly, a network slice instance is formed by a set of network functions, and the resources enabling the deployment of these functions, forming a complete instantiated logical network to meet certain network characteristics for a specific service.

Spotlight

Future 5G networks will support a wide range of services and use cases arising from different vertical industries (e.g., IoT, eHealth, Industry4.0, etc.). Each of these services / business cases impose their own set of requirements to the network infrastructure, in terms of security, latency, elasticity, resiliency, and bandwidth. To deal with these challenges, the NGMN proposed the concept of network slicing (NS). Briefly, a network slice instance is formed by a set of network functions, and the resources enabling the deployment of these functions, forming a complete instantiated logical network to meet certain network characteristics for a specific service.

Related News

VPN

Penguin Computing to Acquire Remote Access Software Assets from Colorado Code Craft

Penguin Solutions | November 17, 2022

Penguin Solutions, an SGH brand that provides HPC, AI, and IoT technologies for edge, core, and cloud, announced today that its Penguin Computing group has acquired all software and intellectual property assets of Colorado Code Craft and welcomed Colorado Code Craft employees to the Penguin Computing team. The company specializes in secure remote work and collaboration software solutions for high-performance and high-fidelity remote visualization, including remote 3D visualization for applications running in the cloud and virtual desktop infrastructure (VDI) for technical computing. Penguin and Colorado Code Craft have been working together since 2014, when they collaborated to deliver Penguin’s Scyld Cloud Workstation™ VDI platform as a remote visualization technology with the Penguin on Demand (POD) HPC cloud. The companies have continued the partnership since that time, expanding the product to include numerous follow-on software releases and capabilities. Recent enhancements include the addition of 60fps (frames per second) video refresh support and support for 4K video fidelity for demanding high-resolution workloads -- all delivered through a standard browser. “The data volumes and compute-intensive use cases for HPC and AI increasingly lead to situations where data scientists and researchers are operating from locations far from the data center or cloud, With the acquisition of Colorado Code Craft’s high-performance, browser-based remote display capabilities, we’re able to provide our customers with a secure way to deliver remote desktops and application streaming from any cloud or data center to any device, regardless of the network conditions. This agentless solution accelerates users’ work processes by enabling rapid access to in-place data on the HPC/AI cluster and operates without the need for application or user workstation modifications.” Thierry Pellegrino, president of Penguin Solutions Penguin’s Scyld Cloud Workstation software is based on Colorado Code Craft technology and continues to play a key role in Penguin on Demand (POD) offerings. The current user base is comprised of data scientists, researchers, and engineers across diverse markets such as: energy, engineering, infrastructure, manufacturing, monitoring and evaluation, oil & gas, and research. In addition, the software is also integrated with Penguin’s new Scyld Cloud Central™ platform – and will also be available for use on the Google Cloud Platform, POD, and by Penguin customers leveraging dedicated HPC/AI cluster environments within their data center or co-location facilities. “After a decade of developing remote visualization platforms and expanding innovative solutions for customers, we are very excited to become a part of Penguin Solutions,” said Thomas Ruge, founder of Colorado Code Craft. “Together we will expand our customer base with both enterprise customers and technology partners into industries such as media/entertainment and distributed design/engineering that rely on the seamless remote application experience that we can provide.” The definitive agreement was signed on November 7, 2022 and the financial terms of the transaction were not disclosed. Visit our website or Penguin Solutions’ booth #2400 at SC22 this week to learn more. Penguin Solutions, Penguin Computing, Colorado Code Craft, Scyld Cloud Central, and Scyld Cloud Workstation are trademarks or registered trademarks of Penguin Computing, Inc. All other trademarks and registered trademarks are the property of their respective owners. About Penguin Solutions The Penguin Solutions™ portfolio, which includes Penguin Computing™ and Penguin Edge™, accelerates customers’ digital transformation with the power of emerging technologies in HPC, AI, and IoT with solutions and services that span the continuum of edge, core, and cloud. By designing highly-advanced infrastructure, machines, and networked systems we enable the world’s most innovative enterprises and government institutions to build the autonomous future, drive discovery and amplify human potential. Penguin Solutions is an SGH Brand.

Read More

SERVER VIRTUALIZATION

VMware SASE and SD-WAN Helps Organizations Take a Holistic Approach to Networking and Security

Frost & Sullivan | November 01, 2022

The last two years accelerated Information Technology (IT) trends that were already underway: rapid increase in the adoption of cloud, multi-cloud, and internet of things (IoT); a smarter edge for use cases such as modern retail, healthcare, and manufacturing; and a distributed workforce, where employees can be anywhere. Software-defined (SD) WAN technology eliminates the traditional WAN connectivity challenges associated with distributed enterprise applications and IoT devices that held back this acceleration. The need to more securely connect distributed users to cloud-based applications is driving the adoption for software-defined, cloud-delivered security. Secure Access Service Edge (SASE) combines the flexibility of SD-WAN technology with a full suite of security services it delivers from the cloud. SASE points of presence (PoPs) provide networking and security functions closer to the user, enabling fast and more secure access Frost & Sullivan's latest white paper, As Edge Computing Gains Traction, the Business Case for SASE is Stronger than Ever, explores how market trends highlight the demand for the cloud-delivered networking, compute, and security architecture that SASE delivers. As public cloud adoption levels continue to increase post-pandemic due to hybrid and multi-cloud configurations, businesses should: Integrate edge computing as part of hybrid cloud architecture to optimize and more securely connect edge locations back to data centers and cloud-hosted applications. Implement hybrid and multi-cloud configurations to become more distributed and easily build, deploy, and continually optimize app delivery, for a more competitive edge. Support hybrid work trends and optimize user connectivity to cloud-based applications. Auto apply security conditions to users accessing enterprise applications based on the user identity and the context to mitigate risks and protect digital assets. VMware SASE is an example of the right way to secure and speed access in this distributed landscape through cloud-delivered SD-WAN Edge devices, Gateways, SASE Orchestrator, Edge Network Intelligence™, and Edge Compute Stack. The global network of scalable VMware SASE PoPs delivers apps to users reliably, quickly, and more securely over a single management interface. The VMware SASE product family delivers enterprise agility through a cloud-first open architecture, superior digital experience with rock-solid SD-WAN connectivity, security based on zero-trust principles, and operational simplicity with vendor-agnostic Artificial Intelligence for Operations that can help predict and prevent problems before they occur. About Frost & Sullivan For six decades, Frost & Sullivan has been world-renowned for its role in helping investors, corporate leaders and governments navigate economic changes and identify disruptive technologies, Mega Trends, new business models and companies to action, resulting in a continuous flow of growth opportunities to drive future success.

Read More

SERVER VIRTUALIZATION

The End-User Experience Must Be the Top Consideration When Implementing Virtual Desktop Infrastructure, Says Info-Tech Research Group

Info-Tech Research Group | November 04, 2022

Global IT research and advisory firm Info-Tech Research Group has released a new blueprint titled Considerations for a Move to Virtual Desktops. The industry resource was created to assist IT professionals in considering virtual desktop infrastructure (VDI) or desktop as a service (DaaS). These solutions can increase user satisfaction, reduce IT complexity, decrease management and storage costs, and maintain a secure and effective environment for both the end user and the business. Info-Tech's new research analyzes the user experience data that the IT industry tracks but often doesn't use or even consider. VDI or DaaS users expect the user experience to be at least equal to that provided by a physical desktop and typically do not concern themselves with the underlying infrastructure. If the experience is less, it means IT has failed in the considerations for VDI/DaaS. "If employees are the competitive edge and key differentiators for a business, Infrastructure & Operations (I&O) has a duty of care to ensure that the employees' digital experience enables and does not impede the value of that asset," John Annand, principal director at Info-Tech Research Group Hybrid work environments and the security concerns that come with them have accelerated the move to VDI and DaaS solutions, but implementation comes with its own unique set of challenges to consider when deciding which solution is best suited for the business. In addition to considering the user experience, IT must also ensure productivity standards throughout the process, both strategically and tactically. Common obstacles IT departments may encounter include complicated shared infrastructure, inadequate in-house training, or insufficient staff to execute migration or manage post-migration activities such as governance and retention policies and other security, compliance, legal, and data classification concerns. Info-Tech Research Group recommends that organizations define their end goals, frame solutions based on end-user workloads, and understand the pros and cons to decide which solutions will best meet business needs. The new data-backed blueprint offers self-evaluation tools and questions IT leaders can ask themselves in order to accomplish these steps: Define and build your value hypothesis/proposition\ What is the business case? Who is championing the investment? Identify the project management team and stakeholders. Set goals to be achieved based on value. Identify KPIs and metrics to measure success. Identify use cases and personas Identify possible user friction (e.g., emotional, cognitive, interaction). Understand current infrastructure shortcomings and capabilities (e.g., network, security posture and tolerance, staffing needs, qualified technicians, end-user devices, etc.). Articulate use cases into functional and non-functional requirements Separate must-haves and nice-to-haves. Categorize requirements into identifiable functionality capabilities. Review your outputs and identify "gotchas" using the MECE (mutually exclusive, collectively exhaustive) principle. Conducting a self-evaluation of the business and understanding the strengths and weaknesses of in-house technical skills and business requirements will assist IT leaders in making the right decision when it comes to VDI or DaaS solutions. About Info-Tech Research Group Info-Tech Research Group is one of the world's leading information technology research and advisory firms, proudly serving over 30,000 IT professionals. The company produces unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. For 25 years, Info-Tech has partnered closely with IT teams to provide them with everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations. Media professionals can register for unrestricted access to research across IT, HR, and software and over 200 IT and Industry analysts through the ITRG Media Insiders Program.

Read More