Actifio Announces Actifio GO Backup-as-a-Service Offering on Google Cloud

Actifio | April 09, 2019

Actifio, a pioneer of copy data management software, announced today at Google Cloud Next '19 the availability of Actifio GO Backup-as-a-Service on the Google Cloud Platform (GCP) Marketplace, extending the software that enables organizations everywhere for faster and simpler backup and restore, the acceleration of DevOps and analytics initiatives, as well as compliance with regulatory requirements without the need for additional on-premises licensing or infrastructure. As a Google Cloud Technology Partner, Actifio has already helped numerous enterprises accelerate access to their mission-critical databases and other workloads on Google Cloud. Actifio GO on GCP addresses not only the need to contain copy data sprawl and reduce storage costs, but also enables enterprises to meet today's scale, speed and data transformation requirements while delivering the low-friction cloud experience. Actifio GO accelerates customers' time to go-live by up to 17x, by eliminating the need to deploy and manage copy data management software, by requiring no on-premises storage, and with a no-risk free trial, pay-per-use model and no lock-in not even to Actifio GO.

Spotlight

In this video we explain what a VMware Validated Design is, some common components across all VMware Validated Designs, and how the VMware Validated Design process makes deploying a Software-Defined Datacenter a streamlined experience.


Other News
VIRTUAL DESKTOP STRATEGIES

C3 Complete to Provide IT and Managed Services Across iM Critical’s Expanding Data Center Footprint

C3 Complete | June 23, 2022

C3 Complete, an award-winning technology service provider, and iM Critical, a data center and IT services company shaping the future of IT infrastructure, are pleased to announce the formation of a strategic partnership. Customers of iM Critical’s data centers will immediately gain access to C3’s extensive suite of technology services, and customers of C3 will benefit from the ultra-modern capabilities of iM Critical’s facilities. The combined services of these two companies will enable agile, turnkey solutions and provide next-generation IT results. Available initially in Miami and Pittsburgh, this partnership will expand to additional high-value markets in 2023. C3’s hybrid cloud services, available in all iM Critical facilities, includes Infrastructure, Desktop, Backup, Storage, and Disaster Recovery as a Service. Each iM Critical facility will also feature C3 Complete’s low-latency, high-speed, cloud on-ramp, data center interconnects, and premium multi-carrier Internet access solutions. For those organizations seeking a turn-key IT experience, iM Critical clients can select from a full suite of Managed Services, Network Engineering, Voice and Collaboration, and Information Security solutions provided by C3 experts. iM Critical recently acquired a premier hyper-connected data center in Miami, FL, with over 100,000 square feet of configurable colocation space and disaster recovery office suites and is repositioning the facility with a number of upgrades, all backed by sustainable advantages like on-site renewable power and unconstrained space and power. Strategically located outside of the 100-year floodplain and hurricane evacuation zones, iM’s Miami facility features a gated campus, 24x7 security, multiple independent utility power feeds and a Category 5 hurricane rating. Another iM Critical facility, an HPC-capable campus located in Pittsburgh, PA, offering the same extensive range of advantages, is slated to open in Q3 of 2022. As part of the Miami facility upgrades, C3 and iM Critical are deploying a highly secure, purpose built, Network Operations Center (NOC) / Security Operations Center (SOC). The state-of-the-art NOC/SOC will be staffed 24x7 and will offer deep monitoring, early detection and mitigation, and incident management and response services. “The iM Critical team brings an incredible amount of experience and strategic vision to the evolving data center market, and we could not be more excited about our partnership with them, We believe that the union of their modern facilities and our services capabilities will make C3 and iM Critical the go-to choice for customers and partners looking to achieve digital transformations with ease, efficiency and security.” Rick Mancinelli, CEO of C3 Complete “We are so pleased with our Miami acquisition, and with the improvements we are making, and are looking forward to providing a new level of security, reliability and interconnection to the Miami colocation market. We continually strive to look beyond those table stakes to understand where the market is going and how we can meet those needs for customers,” commented Michael Roark, CEO of iM Critical. “Partnering with C3 further enables our ability to become the premier single-source provider of end-to-end IT infrastructure solutions in the markets we serve, keeping iM, C3 and our customers ahead of a challenging, changing technology landscape.” About C3 Complete C3 is an award-winning technology consultancy headquartered in Delray Beach, Florida. Since 2009, we’ve delivered in-house, relationship-focused, outcome-driven solutions to hundreds of happy clients nationwide. C3 currently owns and operates a geo-diverse VMware Cloud Verified infrastructure that provides high-performance, secure, and compliant Infrastructure, Virtual Desktops, Backup, and Disaster recovery solutions. C3 also operates a state-of-the-art Cisco BroadWorks powered Hosted PBX, UCaaS and CCaaS platform as well as a nationwide SD-WAN network based on VMware’s industry-leading technologies. C3 maintains an extensive list of wholesale carrier relationships for connectivity and has a broad portfolio of technology-related authorizations and certifications. C3’s expert team of certified network engineers design and implement complex solutions and its bilingual service center is available for support 24×7. About iM Critical iM Critical is shaping the future of data centers, providing colocation with deep insight into IT managed service offerings and a specialization in High-Performance Computing (HPC). iM’s service platforms include Colocation, HPC, Cloud, Storage aaS, Network, 24/7 IT NOC Services with premier DR aaS, Cloud Connect, Data Security and IT Transformation aaS solutions. iM Critical provides access to strategic carrier-neutral networks and cloud onramps, risk mitigation, continuous uptime, and data security to deliver quality and sustainable innovation, saving customers time, money and resources.

Read More

SERVER VIRTUALIZATION

Leading Danish Service Provider Nuuday Selects Netcracker as a Strategic Partner for Major IT Transformation Program

Netcracker Technology | June 29, 2022

Netcracker Technology and Nuuday announced today that Nuuday, the largest telecom service provider in Denmark, has selected Netcracker as its strategic partner for the largest IT transformation program in the Nordic region. Netcracker’s cloud-native, microservices-based Digital BSS/OSS portfolio and Professional Services will serve as the cornerstone of the project to help the service provider eliminate legacy solutions, quickly launch new services and create superior digital customer journeys. The transformation program will support all of Nuuday’s lines of business, including broadband, TV, mobile and B2B services. Nuuday will also leverage Netcracker Managed Services for the solution, which will be hosted in the public cloud. “We are now making the largest IT investment in our company history with the purpose of replacing complex systems and re-engineering our commercial and operational processes to make life easier for our customers,” said Jon James, CEO of Nuuday. “We want to accelerate our pace of innovation and transform Nuuday into one of the most digital and advanced telcos in Europe.” “Netcracker is thrilled to partner with Nuuday through this strategic initiative to modernize its BSS and OSS systems,” said Benedetto Spaziani, GM at Netcracker. “Netcracker is making its mark in the Nordics, and we are excited for the opportunity to help realize Nuuday’s vision to become best in class.” “In Netcracker, we have found the perfect partner with a solid delivery record and previous success with large IT transformation projects, Together with Netcracker, we will apply a best-of-suite approach and build a new modern IT stack that will allow Nuuday to concentrate on customers, channel management and product innovation.” Monika Gullin, CTO of Nuuday About Netcracker Technology Netcracker Technology, a wholly owned subsidiary of NEC Corporation, offers mission-critical digital transformation solutions to service providers around the globe. Our comprehensive portfolio of software solutions and professional services enables large-scale digital transformations, unlocking the opportunities of the cloud, virtualization and the changing mobile ecosystem. With an unbroken service delivery track record of more than 25 years, our unique combination of technology, people and expertise helps companies transform their networks and enable better experiences for their customers. About Nuuday Nuuday is a united family of strong and well-known brands with the shared purpose of making sense with technology. Our family consists of YouSee, Telmore, Hiper, Blockbuster, TDC Erhverv, NetDesign, YouTV, eesy and Relatel, and together we represent the TV, broadband, network, telephony and entertainment of the future. We deliver innovative digital services to most Danish households and businesses across cross-functional teams, 33 nationalities and more than 3,800 unique colleagues. As Denmark’s leading digital service provider, we aspire to use technology to create a more meaningful future for our customers and society.

Read More

VIRTUAL DESKTOP TOOLS

Comcast Business Partners with Fortinet to Secure Enterprise Application Access with New SASE and SSE Solutions

Fortinet | August 02, 2022

Comcast Business today announced a strategic partnership with Fortinet® (NASDAQ: FTNT), a global leader in broad, integrated and automated cybersecurity solutions, to deliver enterprises a new set of secure access service edge (SASE), and security service edge (SSE) solutions to help enterprises protect their distributed workforces using a cloud-delivered approach to security policy enforcement. This collaboration expands Comcast Business’s managed services expertise, while giving enterprises greater flexibility to choose the cloud architecture and vendor mix that is right for them. In today’s work-from-anywhere world, IT leaders are challenged with balancing employee convenience with securing their networks. New security architectures, such as SASE, which converges networking and security via SD-WAN and cloud-delivered security, and SSE, the security foundation of SASE, enable enterprises to strengthen their security posture while enhancing employees’ experience, regardless of their location. In fact, according to a recent Foundry CIO research study sponsored by Masergy (a Comcast Business company) and Fortinet, the overwhelming majority (98%) of enterprise IT leaders surveyed cited the convergence of network and security as critical or very important, while 94% said their adoption of SASE solutions has accelerated. The new Comcast Business offerings — delivered through Comcast Business Secure Gateways — give enterprises the option to choose from either SASE or SSE solutions backed by Fortinet’s security-driven networking technology and Equinix’s flexible cloud connection Equinix Fabric™ for a complete secure network service. Enterprises wanting to enable safe access to cloud and web services can take advantage of the Comcast Business SSE solution, which brings together multiple cloud-delivered network security technologies in a fully-hosted environment. The Comcast Business SASE solution provides this hosted SSE security architecture combined with zero trust capabilities and any of Comcast Business’s SD-WAN solutions. “In today’s dynamic world, no two companies are alike and very few are the same as they were just two years ago,” said Amit Verma, Chief Technology Officer, Enterprise Solutions, Comcast Business. “By expanding our relationship with Fortinet, we are offering our clients more choice and the flexibility to choose a solution that works for them – while providing some of the latest security solutions to help keep them ready for the day – today and tomorrow.” Comcast Business Secure Gateways provide a fully-hosted set of SASE or SSE services covering a broad range of security networking solutions for Firewall-as-a-Service (FWaaS), Intrusion Prevention (IPS), Data Loss Prevention (DLP), Cloud Access Security Brokers (CASB), and Zero Trust Network Access (ZTNA). Comcast Business Secure Gateways are hosted across the United States at Equinix data centers, offering up to 10 gigabits per second (Gbps) of cloud connectivity for public, private, or hybrid cloud deployments. The Equinix Fabric™ enables support of Amazon Web Services, Microsoft Azure, Google Cloud, IBM and more than 200 SaaS providers. "In order to enhance user experience, reduce complexity, and improve their security posture against today’s most advanced and persistent threats, organizations must adopt solutions that converge networking and security, We’re pleased to work closely with Comcast Business to build SASE services that support customers at any stage of digital innovation with Fortinet’s industry leading security-driven networking technology.” John Maddison, EVP of products and CMO, Fortinet About Comcast Business Comcast Business offers a suite of Connectivity, Communications, Networking, Cybersecurity, Wireless, and Managed Solutions to help organizations of different sizes prepare for what’s next. Powered by the nation’s largest Gig-speed broadband network, and backed by 24/7 customer support, Comcast Business is the nation’s largest cable provider to small and mid-size businesses and one of the leading service providers to the Enterprise market. Comcast Business has been consistently recognized by industry analysts and associations as a leader and innovator, and one of the fastest growing providers of Ethernet services. About Comcast Corporation Comcast Corporation is a global media and technology company that connects people to moments that matter. We are principally focused on broadband, aggregation, and streaming with 57 million customer relationships across the United States and Europe. We deliver broadband, wireless, and video through our Xfinity, Comcast Business, and Sky brands; create, distribute, and stream leading entertainment, sports, and news through Universal Filmed Entertainment Group, Universal Studio Group, Sky Studios, the NBC and Telemundo broadcast networks, multiple cable networks, Peacock, NBCUniversal News Group, NBC Sports, Sky News, and Sky Sports; and provide memorable experiences at Universal Parks and Resorts in the United States and Asia About Fortinet Fortinet makes possible a digital world that we can always trust through its mission to protect people, devices, and data everywhere. This is why the world’s largest enterprises, service providers, and government organizations choose Fortinet to securely accelerate their digital journey. The Fortinet Security Fabric platform delivers broad, integrated, and automated protections across the entire digital attack surface, securing critical devices, data, applications, and connections from the data center to the cloud to the home office. Ranking #1 in the most security appliances shipped worldwide, more than 580,000 customers trust Fortinet to protect their businesses. And the Fortinet NSE Training Institute, an initiative of Fortinet’s Training Advancement Agenda (TAA), provides one of the largest and broadest training programs in the industry to make cyber training and new career opportunities available to everyone.

Read More

VIRTUAL DESKTOP STRATEGIES

Tailscale SSH Now in Beta for Simple and Secure Remote Connections

Tailscale | June 27, 2022

Tailscale has released Tailscale SSH to beta, which makes authentication and authorization trustworthy and effortless by replacing SSH keys with the Tailscale identity of any machine. With Tailscale, each server and user device gets its own identity and node key for authenticating and encrypting the Tailscale network connection, and uses access control lists defined in code for authorizing connections, making it a natural extension for Tailscale to now manage access for SSH connections in your network. “SSH is an everyday tool for developers, but managing SSH keys for a server isn’t so simple or secure, SSH keys are difficult to protect and time consuming to manage. Protecting your network connections with SSH keys requires that admins spend significant resources managing, provisioning, or deprovisioning user access. Tailscale SSH removes the pain from SSH key management with the same powerful simplicity Tailscale offers for virtual private networks.” Tailscale Product Manager Maya Kaczorowski Kris Nóva, Senior Principal Engineer and published distributed systems expert used Tailscale to create a private network between her homelab in New York and a datacenter in Iceland: “Tailscale is seriously the best user experience of my life. I ran a Kubernetes 1.24 cluster on Tailscale with eBPF CNI networking on top of a tailnet, which connects my private subnet at home, across the Arctic ocean to a private subnet in a volcano-powered datacenter in Iceland. It blew my mind how easy and powerful it was to use. I’m excited to use their new SSH feature.” With Tailscale SSH, users can now securely code from their iPad running Tailscale, across operating systems to a Linux workstation, without having to figure out how to get their SSH private key onto their iPad. Enterprise Tailscale customers will reduce churn and resources on SSH key management or bastion jump boxes, and avoid risk of exposing memory unsafe servers to the open internet. The beta release gives all users: Authentication and encryption: Authenticate, authorize, and encrypt SSH connections using Tailscale. No need to generate, distribute, and manage SSH keys. SSO and MFA: Use existing identity providers and multi-factor authentication to protect SSH connections the same way you authorize and protect application access. Built-in key rotation: Tailscale makes it simple to rotate keys with a single command and manages key distribution. Node keys can be rotated by re-authenticating the device, as frequently as every day. Re-verify SSH connections: Tailscale works with existing identity providers and re-verifies before SSH connections are established, and gives users the option to re-authenticate when establishing high-risk SSH connections. Revoke SSH access easily: When an employee offboards, Tailscale allows admins to revoke access to SSH to a machine almost instantaneously with Tailscale ACLs. Manage permissions as code: Define connections to devices using a standard syntax and understand SSH access controls in a centralized configuration file. Reduced latency with point-to-point connections: Connect directly from a device to a server, without having to hairpin through a bastion. Developers can connect wherever they work, without slowing them down by routing their traffic through the main office. Add a user or server painlessly: Maintain users and servers in a network without adding complexity. Tailscale ACLs to give the right people access and add it to a team's known hosts. Tailscale makes network security accessible to teams of any scale and gives developers and DevOps teams the ability to connect to resources easily and securely in the cloud, on-premises, and everywhere in between. Tailscale uses the WireGuard® protocol, the open source, opinionated standard for secure connectivity. It is set up and configured in a matter of minutes on average, while other VPN solutions take weeks to fully implement and several hours a week to maintain. About Tailscale Tailscale builds software that makes it easy to interconnect and secure devices, no matter where they are. Every day, banks and multinational companies use Tailscale to protect their corporate networks. Homelabs and start-ups trust Tailscale to collaborate and share access to tooling. We're building a future for the Internet that's easy, small and safe, like it used to be. Founded in 2019 and fully distributed, we’re backed by Accel, CRV, Heavybit, Insight Partners, and Uncork Capital.

Read More

Spotlight

In this video we explain what a VMware Validated Design is, some common components across all VMware Validated Designs, and how the VMware Validated Design process makes deploying a Software-Defined Datacenter a streamlined experience.

Resources