VMware fortifies data-center software with Avi Networks buy

itworld | June 14, 2019

VMware punched up its data-center network virtualization capabilities by announcing it would buy Avi Networks load balancing, analytics and application-delivery technology for an undisclosed amount.Founded in 2012 by a group of Cisco engineers and executives, Avi offers a variety of software-defined products and services including a software-based application delivery controller (ADC) and intelligent web-application firewall. The software already integrates with VMware vCenter and NSX, OpenStack, third party SDN controllers, as well as Amazon AWS and Google Cloud Platform, Red Hat OpenShift and container orchestration platforms such as Kubernetes and Docker.

Spotlight

A common understanding of “cloud computing” is continuously evolving, and the terminology and concepts used to define it often need clarifying. Press coverage can be vague or may not fully capture the extent of what cloud computing entails or represents, sometimes reporting how companies are making their solutions available in the “cloud” or how “cloud computing” is the way forward, but not examining the characteristics, models, and services involved in understanding what cloud computing is and what it can become.

Spotlight

A common understanding of “cloud computing” is continuously evolving, and the terminology and concepts used to define it often need clarifying. Press coverage can be vague or may not fully capture the extent of what cloud computing entails or represents, sometimes reporting how companies are making their solutions available in the “cloud” or how “cloud computing” is the way forward, but not examining the characteristics, models, and services involved in understanding what cloud computing is and what it can become.

Related News

SERVER VIRTUALIZATION

Infortrend Powers Up Scale-Out Unified Storage EonStor GS U.2

Infortrend | May 31, 2022

Infortrend Technology, Inc., a market-leading enterprise storage supplier, has enhanced EonStor GS U.2, an enterprise scale-out unified storage system with U.2 NVMe SSD. It provides block and file-level scale-out extensibility to boost capacity and performance as storage requirements rise. The EonStor GS (GS) unified SAN/NAS storage is intended for a variety of corporate applications such as database, virtualization, video post-production, and file sharing. It provides excellent capacity and performance in a variety of ways. Users can begin with one GS and add other GS as required to establish a cluster with up to four appliances through scale-out. GS supports the common ultra-fast U.2 SSD and boosts performance up to 1000K IOPS and 22GB/s per appliance to improve data processing with high IOPS and low latency. GS offers a single namespace for CIFS and NFS user access from Windows, Linux, and macOS. IT administration can be simplified even further with auto-balancing, which ensures that data is stored equitably on each GS in a cluster. IT personnel may save money by expanding all-flash U.2 GS with HDD JBOD and letting the auto-tiering technology move 'hot' and 'cold' data between high-performance SSD and cost-effective HDD. For forward-looking enterprises seeking a competitive and cost-saving solution, we updated GS unified storage with support of scale-out expandability and U.2 SSD. Users can connect several GS into a cluster with optimized load balancing, increased I/Os, and tight data protection." Frank Lee, Senior Director of Product Planning Infortrend has revamped its 2022 Reseller Partnership Program to assist partners in increasing expertise and profitability. Partners enjoy special benefits like deal registration with price protection, access to demo machines, and much more.

Read More

VIRTUAL DESKTOP TOOLS

Trellix Finds Business Services Top Target of Ransomware Attacks

Trellix | July 19, 2022

Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), today released The Threat Report: Summer 2022, analyzing cybersecurity trends and attack methods from the first quarter of 2022. The report features research from Trellix Threat Labs into connected healthcare and access control systems. It also includes analysis of email security trends and details the evolution of Russian cybercrime related to the conflict in Ukraine where new malware or methods have yet to be observed. Key findings: Increased Threats to Business Services: Companies providing IT, finance and other types of consulting and contract services were targeted by adversarial actors more often, demonstrating cybercriminals desire to disrupt multiple companies with one attack. Business services accounted for 64% of total U.S. ransomware detections and was the second most targeted sector behind telecom across global ransomware detections, malware detections, and nation-state backed attacks in Q1 2022. Ransomware Evolution: Following the January arrests of members of the REvil ransomware gang, payouts to attackers declined. Trellix also observed ransomware groups building lockers targeting virtualization services with varied success. Leaked chats from the quarter’s second most active ransomware gang, Conti, which publicly expressed allegiance to the Russian administration, seem to confirm the government is directing cybercriminal enterprises. Email Security Trends: Telemetry analysis revealed phishing URLs and malicious document trends in email security. Most malicious emails detected contained a phishing URL used to steal credentials or lure victims to download malware. Trellix also identified emails with malicious documents and executables like infostealers and trojans attached. “With the merging of our digital and physical worlds, cyberattacks cause more chaos in our daily lives, Adversaries know they are being watched closely; the absence of new tactics observed in the wild during the war in Ukraine tells us tools are being held back. Global threat actors have novel cyber artillery ready to deploy in case of escalation and organizations need to remain vigilant.” -Christiaan Beek, Lead Scientist and Senior Principal Engineer, Trellix. The Threat Report: Summer 2022 leverages proprietary data from Trellix’s network of over one billion sensors, open-source intelligence and Trellix Threat Labs investigations into prevalent threats like ransomware and nation-state activity. Telemetry related to detection of threats is used for the purposes of this report. A detection is when a file, URL, IP-address, suspicious email, network behavior or other indicator is detected and reported via the Trellix XDR ecosystem. Additional Resources Trellix Threat Center Trellix Threat Labs Blog The Threat Report: Summer 2022 About Trellix- Trellix is a global company redefining the future of cybersecurity and soulful work. The company’s open and native extended detection and response (XDR) platform helps organizations confronted by today’s most advanced threats gain confidence in the protection and resilience of their operations. Trellix, along with an extensive partner ecosystem, accelerates technology innovation through machine learning and automation to empower over 40,000 business and government customers with living security.

Read More

VIRTUAL DESKTOP STRATEGIES

VMware Advances Its Anywhere Workspace Platform

VMware | June 06, 2022

VMware Inc., a leading business software pioneer, announced enhancements to its VMware Workplace ONE anytime workspace platform that will make it simpler for IT teams to manage and protect all employee devices. Workspace ONE Mobile Threat Defense for superior mobile device security is one of the new features. Improved update/patch management capabilities for Windows OS devices Shankar Iyer, senior vice president and general manager, End-User Computing, VMware said that “As the frequency and sophistication of threats continue to intensify, IT teams need a way to proactively detect threats across the entire device population and respond quickly. That is a tall order for taxed IT and Sec-Ops teams. VMware Workspace ONE is ideally suited for the new security realities of enabling a hybrid workforce. Leveraging intelligence and injecting automation in every step of the process, it simplifies IT operations, improves security against modern threats, and empowers the best employee experience across any device, anywhere.” Best-in-Class Mobile Device Security The mobile threat environment is broad nowadays, and mobile workstyles need specific security against phishing and application, device, and rogue network-based attacks. VMware Workspace ONE Mobile Threat Defense, a new add-on to the market-leading Workspace ONE UEM platform, raises the bar for mobile security. It includes mobile security technology from Lookout, a market leader. Application-based risks, such as mobile malware, app vulnerabilities, and unsafe application behaviors and setups, are addressed by the solution. Phishing using email, SMS, and messaging applications exposes web and content vulnerabilities. Malicious URLs, malicious online pages, videos, and images, as well as site and content behaviors and setups, are all included. Device vulnerabilities and zero-day threats, including jailbreak and root access detection Device risk includes operating system version and update uptake. Machine-in-the-middle attacks include dangerous activities such as SSL certificate stripping, forcing weaker algorithm negotiation, abnormal application network connection activity, and vulnerabilities linked with rogue Wi-Fi. Workspace ONE Intelligent Hub can be used to enable application, device, and network security through Workspace ONE Mobile Threat Defense. This means that there are no separate applications or agents to download or install for IT, and essential information – such as alarms and proposed remedies – is communicated through a resource that workers utilize on a regular basis.

Read More