Server Virtualization, Virtual Server Infrastructure

With Holistic View of Layered Security Technologies, Infinitely Virtual Rolls Out Integrated, Multifaceted Lineup

prweb | April 11, 2023 | Read time : 01:32 min

with-holistic-view-of-layered

Recognizing that no company is too small to be a target of cyberattacks, cloud pioneer Infinitely Virtual today introduced a series of layered security tools and technologies. Newly packaged from IV are three integrated components: IV Host, IV Manage, and the ostensible flagship in the lineup, IV Protect.

IV Protect goes beyond the built-in security within E.V.E., IV’s Cloud Platform, to provide additional protection against established and emerging cyberthreats. These solutions help address various threat vectors — from weak passwords and phishing to malicious websites and uninformed users — to keep systems and data as safe as possible. IV Protect strengthens security with targeted solutions to meet any SMB’s specific cybersecurity requirements.

“Where alien code is concerned, the science of acting, reacting, anticipating, eradicating and managing has evolved,” said Adam Stern, IV Founder and CEO. “The world that anti-virus/anti-malware products inhabit has morphed as well, transformed by nefarious external forces and broader, smarter responses -- digital signatures, heuristics, memory management, etc.”

In concept, the products are organized like a Venn diagram, with overlapping ala carte offerings, pegged to an organization’s discrete needs. Collectively, the various elements combine technology and human experience to perform highly accurate threat hunting, monitoring, and response at scale, among other capabilities. The IV Protect suite helps rapidly identify threats -- and limit their impact -- without the need for additional staffing.

Given the length of time traditional solutions have been available, bad actors have learned how to evade them, he said. With the number and intensity of high-value cyberattacks growing, technology is increasingly scrutinizing behaviors, sketching on a wider canvas and examining more variables. “IV Protect, which integrates MDR with capabilities like DNS filtering, is both an advance and a throwback: automated and high touch,” Stern said, noting that security awareness training and compliance are central to the offering.

IV Protect: Drilling Down

Among the capabilities integrated into IV Protect:

Multifactor Authentication Technology (MFA) - Multi-factor authentication (MFA) is an access security solution used to verify a user's identity at login. It adds two or more identity-checking steps to user logins by use of secure authentication tools, providing a fast, simple, and non-disruptive authentication experience.

Managed Detection and Response (MDR) - Traditional antivirus solutions are no longer sufficient to protect servers and endpoints. IV Managed Detection & Response (MDR) provides AI-powered prevention, detection, response, and threat hunting across IV- hosted servers and local user endpoints, to protect against potentially harmful threat attacks that can put data —and the business itself— at risk.

DNS Filtering - IV’s DNS Filter is a cloud-based, AI-driven content filtering and threat protection service that blocks malicious websites and filters out harmful or inappropriate content. It prevents users from unknowingly accessing unsafe websites via links in an email, while giving the organization the ability to restrict access to specific websites within a local network.

Email Security - IV Email Security is an integrated cloud email security solution that is fast to deploy, easy to use, and protects the organization against today’s most dangerous phishing threats. The capability delivers email security in the mailbox using anomaly detection to stop advanced phishing threats such as Business Email Compromise (BEC), ransomware, credential harvesting and more.

Security Awareness Training - IV SAT helps ensure that employees serve as a strong line of defense against the latest methods of attack. A critical piece of a strong security program, this solution makes it easy to send and track training videos on a wide range of security-related topics to the people within the organization who need them most.

According to ISACA expert Tan Soon Chew, “a comprehensive cybersecurity awareness program should be established and implemented to educate every person (including external vendors and their personnel) who uses, operates and manages the enterprise’s assets or data… the program’s effectiveness should be measured at regular intervals (e.g., annually).”

“We at IV are taking a refreshingly honest step forward by acknowledging that AI can’t yet be trusted to protect organizations definitively,” Stern said. “IV Protect in particular argues in favor of including actual human beings to take a closer look and to parse a timeline of events. MDR includes a SOC where threat hunters -- folks in a digital war room who get these alerts -- seek to determine if they are harmless or nefarious.”

About Infinitely Virtual

The World's Most Advanced Hosting Environment.

Infinitely Virtual is a leading provider of high-quality and affordable Cloud Server technology, capable of delivering services to any type of business, via terminal servers, SharePoint servers and SQL servers – all based on Cloud Servers. Infinitely Virtual has earned the highest rating of "Enterprise-Ready" in Skyhigh Networks’ CloudTrust™ Program for four of its offerings -- Cloud Server Hosting, InfiniteVault, InfiniteProtect and Virtual Terminal Server. Founder and CEO Adam Stern is a member of the Forbes Technology Council. Infinitely Virtual was established as a subsidiary of Altay Corporation, and through this partnership, the company provides customers with expert 24×7 technical support.

Spotlight

VMware and Google Cloud make it easier than ever to move mission critical workloads to the public cloud and obtain business insights. Discover how this powerful partnership helps accelerate your cloud-first business strategy and multiplies your potential.

Spotlight

VMware and Google Cloud make it easier than ever to move mission critical workloads to the public cloud and obtain business insights. Discover how this powerful partnership helps accelerate your cloud-first business strategy and multiplies your potential.

Related News

Server Hypervisors, Security

Discover the Gigamon Deep Observability Pipeline at VMware Explore 2023

businesswire | August 08, 2023

Gigamon, the leading deep observability company, today announced its participation at VMware Explore, VMware’s flagship multi-cloud event being held Aug. 21-24 in Las Vegas. More than 10,000 attendees are expected to attend the conference and can visit Gigamon at booth #319 to learn how GigaVUE Cloud Suite™, a VMware-certified deep observability pipeline, acquires, optimizes, and distributes traffic and network-derived intelligence from any virtual machine or container across leading cloud platforms to monitoring and security tools. As the complexity of hybrid cloud infrastructure continues to grow and organizations look to get the most out of their cloud investments, the deep observability market is forecasted to grow at a 52 percent CAGR and reach $1.9B by 2027. This growth is supported by the recentGigamon 2023 Hybrid Cloud Security Survey, in which nearly all respondents agree that today cloud security is dependent on gaining visibility across all data-in-motion (96%) and believe that deep observability is an important element of their cloud security (97%). By visiting Gigamon at booth #319, attendees will gain access to: Expertswho can highlight how theGigamon Deep Observability Pipelineworks within the VMware environment to harness actionable network-level intelligence to amplify the power of security and observability tools. Gigamon is scheduling live onsite demos in advance, and attendees can book a meeting using thislink. Daily rafflesfor a chance to win an Apple Watch or a Meta Data Quest 2 Virtual Reality Headset. Drawings will take place one hour before the Expo closes each day (Monday, Aug. 21 - Wednesday, Aug. 23). “As network blind spots continue to grow with increasing lateral and container communications, deep observability has emerged as the foundation for today’s effective security posture,” said Bassam Khan, vice president of product and technical marketing at Gigamon. “Working with VMware, we’ve certified our Gigamon Deep Observability Pipeline so mutual customers can gain visibility into all hybrid cloud traffic, regardless whether virtual, container, or multi-cloud, and better leverage their current tooling to secure their hybrid cloud infrastructure.” About Gigamon Gigamon®offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination helps enable IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructure. The result: modern enterprises realize the full transformational promise of the cloud. Gigamon serves more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, 9 of the 10 largest mobile network providers, and hundreds of governments and educational organizations worldwide.

Read More

Virtual Desktop Tools, Server Hypervisors

ZEDEDA Launches Industry-First Application Services Suite, Revolutionizing Edge Computing

businesswire | July 28, 2023

ZEDEDA, the leader in edge infrastructure orchestration, today introduced ZEDEDA Edge Application Services, making it easier for customers to instantly gain granular control across all of their edge applications, including their modern AI-based applications. The number of edge devices, along with the data they produce, is growing exponentially. Gartner® predicts that “by 2025, 75% of data will be generated outside these centralized [data centers or cloud regions] facilities.”1 Edge computing is required to manage and process that data, but the complexity of distributed environments can make it difficult for customers to get started quickly. Enabling access to core services can provide an on-ramp for organizations to benefit from an initial edge use case while also establishing a foundation for future growth, just as was seen previously with cloud adoption. “Just as we saw occur with the cloud providers in the early days, it is time for the edge market to evolve beyond just infrastructure and begin to offer value-added services in addition,” said Said Ouissal, founder and CEO of ZEDEDA. “Now, with ZEDEDA Edge Application Services, we are able to offer our customers the ability to manage, configure and control their edge applications simply by leveraging the ZEDEDA ecosystem.” ZEDEDA Edge Application Services are delivered using ZEDEDA’s market-leading edge orchestration solution, which reduces cost while increasing visibility, security and control. The new industry-leading suite of services provides remote access, inventory and configuration management, and Kubernetes management services tailored to the individual needs of each deployment and customer. ZEDEDA Edge Access: A Simple and Secure Remote Access Solution The first service in the suite, ZEDEDA Edge Access, enables IT administrators and platform operations teams to instantly access any remote device from any location at any time. It is a simple solution that provides secure access, control and audit tracing for edge deployments. ZEDEDA Edge Access is secure out of the box, with built-in access controls that provide full encryption of user sessions, and requires no backend configuration or specialized skills. ZEDEDA Edge Access Service eliminates the overhead associated with conventional methods of remote access, providing a streamlined and efficient alternative. ZEDEDA Edge Access Service also provides granular user control and access, enabling customers to provide third parties secure access to their edge infrastructure. For example, if there is a problem with a specific application, the software vendor or developer can securely access, audit and troubleshoot if needed. This service, and others like it, will ultimately enable ZEDEDA partners and OEMs to generate new revenue streams. ZEDEDA’s open, distributed, cloud-native edge management and orchestration solution has attracted strategic OEM and customer relationships with Global 500 companies, including Emerson, Rockwell Automation, and VMware. The company continues to quadruple the number of edge nodes it has under management annually, scaling toward a hundred thousand edge nodes and has raised more than $55 million in capital from investors, including Coast Range Capital, Lux Capital, Energize Ventures, Porsche Ventures, Chevron Technology Ventures, Emerson Ventures, Juniper Networks, Rockwell Automation, Samsung Next and EDF North America Ventures. About ZEDEDA ZEDEDA makes edge computing effortless, open, and intrinsically secure — extending the cloud experience to the edge. ZEDEDA reduces the cost of managing and orchestrating distributed edge infrastructure and applications while increasing visibility, security and control. ZEDEDA delivers a distributed, cloud-native edge management and orchestration solution, simplifying the security and remote management of edge infrastructure and applications at scale.

Read More

Virtual Desktop Tools, Virtual Server Infrastructure

Estes Express Lines Improves Freight Shipping and Increases Margins with Denodo’s Data Virtualization-enabled Data Fabric

businesswire | July 24, 2023

Denodo, the leader in data management, today announced that Estes Express Lines, the largest privately held freight transportation company in North America, has successfully deployed the Denodo Platform to create a data fabric-enabled Logistics Digital Twin to meet their goals of streamlining freight shipping, boosting profits, and creating a simpler and more pleasant experience for its customers, drivers, and internal business users. Margins in the shipping industry are small and pricing is often based on historical and fairly static pricing models. Due to the significant amounts of data duplication, Estes needed to access all of its internal and cloud-based data sources to deliver real time data consistency, establish a single source of truth, and modernize their data integration efforts to empower business users and improve operational processes. Utilizing the Denodo Platform, Estes Express Lines created a Logistics Digital Twin--a virtual duplicate of every piece of freight passing through their network. This enables the shipping giant to optimize operations and plan pickups, assign deliveries and driver assignments most efficiently, and provide greater visibility to customers. “In support of modernizing Estes’ existing technology, we were able to create an end-to-end replica of every shipment we bring into our network and make that data available in real time. This allows us to provide our customers with best-in-class access to shipment data and to model changes in how we move freight, which has significantly increased the effectiveness of our internal stakeholders, drivers, and equipment,” said Todd Florence, CIO, Estes Express Lines. “Denodo’s Data Fabric reduces manual data entry tasks and ensures everyone is on the same sheet of music, which has saved us 10% in infrastructure and labor costs by eliminating the need to duplicate and store the data into yet another system.” Operating a fleet of more than 8,500 tractors and 34,000 trailers, Estes generates roughly 900,000 quotes and 50,000 shipments a day. The Logistics Digital Twin allows the shipping giant to: Create a chain of custody: a process that tracks the movement of packages by documenting each person who handled it, the date/time it was collected and/or transferred, and when it was delivered, to provide unprecedented insights. Optimize efficiencies and improve margins: by looking at both costing and pricing models to create more efficient and effective quotes and by reducing claims. Integrate customer care with operations and sales: to analyze customer scores and perform sentiment analysis to understand trends, adjust offerings, and create a better customer experience. Model their facilities and routes: to understand where they can add more shipments to improve profitably, find load imbalances, contract appropriately, and plan for spikes. Remove the need for cumbersome data entry: by tying telematics to IoT and data from third parties so information can be leveraged in real-time. “As this recent Wall Street Journal article points out, Estes is a great example of how organizations can break down data silos by logically integrating data across multiple collection points so all parties can benefit from real time information and reduce redundancies,” said Ravi Shankar, Senior Vice President and CMO at Denodo. “Truckers don’t sign up to be data-entry clerks and people need to know where their packages are at any given point. Logical data management solutions like the Denodo Platform are quickly solving cumbersome data management and integration issues and are becoming the backbone of how organizations modernize their technology so they can use data to the fullest.” About Denodo Denodo is a leader in data management. The award-winning Denodo Platform is the leading data integration, management, and delivery platform using a logical approach to enable self-service BI, data science, hybrid/multi-cloud data integration, and enterprise data services. Realizing more than 400% ROI and millions of dollars in benefits, Denodo’s customers across large enterprises and mid-market companies in 30+ industries have received payback in less than 6 months.

Read More