An Inside Look at Secure DevOps Kit for Microsoft Azure

Virtualization Review | July 01, 2019

Many challenges in cloud computing come from the sheer size of deployments. If you have a handful of servers that you need to manage and secure, a manual approach can work. As the number of servers and applications increase, however, managing security by hand won't work.

Spotlight

At VMware, we refused to choose. We weren’t satisfied with running only Windows applications on our PCs, and we wanted more than just rebooting between operating systems. We needed to be more productive, we needed to be more agile, and we needed to do it all more securely than ever before. To achieve this, we built what is now the most widely used enterprise hypervisor in the world, giving us all more control over our PCs than ever before.


Other News
VMWARE

Infoblox's State of Security Report Spotlights Remote Work Hazards around the World

Infoblox | June 01, 2022

Infoblox, the leader in DNS management and security services, today unveils a global report examining the state of security concerns, costs, and remedies. As the pandemic and uneven shutdowns stretch into a third year, organizations are accelerating digital transformation projects to support remote work. Meanwhile, attackers have seized on vulnerabilities in these environments, creating more work and larger budgets for security teams. 1,100 respondents in IT and cybersecurity roles in 11 countries – United States, Mexico, Brazil, United Kingdom, Germany, France, the Netherlands, Spain, United Arab Emirates, Australia, and Singapore – participated in the survey. Key findings include: The surge in remote work has changed the corporate landscape significantly – and permanently. 52% of respondents accelerated digital transformation projects, 42% increased customer portal support for remote engagement, 30% moved apps to third party cloud providers, and 26% shuttered physical offices for good. These changes led to the additions of VPNs and firewalls, a mix of corporate and employee owned devices as well as cloud and on-premises DDI servers to manage data traffic across the expanded network. The hybrid workforce reality is causing greater concerns with data leakage, ransomware and attacks through remote access tools and cloud services. Respondents indicate concerns about their abilities to counter increasingly sophisticated cyberattacks with limited control over employees, work-from-home technologies, and vulnerable supply chain partners. The sophistication of state-sponsored malware also is a source of worry for many. Organizations have good reason to worry: 53% of respondents experienced up to five security incidents that led to at least one breach. Though ransomware often grab headlines, phishing is the most common conduit for illegal entry. Attacks tended to originate on WiFi access points, employee-owned endpoints, or the cloud. Overall, 43% suffered at least $1 million in direct and indirect losses. Organizations are buying cloud-first security tools to protect their hybrid environments. 59% of respondents saw bigger budgets in 2021 and nearly 75% anticipate an increase in 2022. They are creating a defense-in-depth strategy using everything from endpoint and network security to cloud access security brokers, DNS security, and threat intelligence services to defend their expanded attack surface. Network data is taking center stage for threat hunting. 40% mostly relied on network flow data, 39% on systems-specific vulnerability information, 39% DNS queries, and 37% outside threat intelligence services. Interest in Secure Access Service Edge (SASE) frameworks is accelerating. As assets, access and security move out of the network core to the edge with the push for virtualization, 53% have already partially or fully implemented SASE and another 28% intend to do so. "The pandemic shutdowns over the past two years have reshaped how companies around the world operate, Cloud-first networks and corresponding security controls went from nice-to-have features to business mainstays as organizations sent office workers to work from home. To address the spike in cyberattacks, security teams are turning to DNS security and zero trust models like SASE for a more proactive approach to protecting corporate data and remote devices." Anthony James, VP of Product Marketing at Infoblox About Infoblox Infoblox is the leader in next generation DNS management and security. More than 12,000 customers, including over 70% of the Fortune 500, rely on Infoblox to scale, simplify and secure their hybrid networks to meet the modern challenges of a cloud-first world.

Read More

VMWARE

OpenShift boosts DevSecOps with VMware Tanzu in its rear view

OpenShift | May 12, 2022

Red Hat OpenShift was introduced, but the fiercest competition among DevOps platform vendors for enterprise buyers has only just begun. Red Hat first released OpenShift in 2011 and standardized its OpenShift Container Platform on Kubernetes in 2014, well ahead of the open source container orchestration framework's emergence as an industry standard. OpenShift remains, by most market analysts' measures, the most widely used DevOps platform, a category that took shape amid the upheavals of the COVID-19 pandemic and an industry consolidation that saw VMware acquire Heptio in 2018, forming the basis for its Tanzu Kubernetes products; IBM acquire Red Hat for $34 billion in 2019; and SUSE acquire Rancher in 2020. The latest IBM estimates put the number of OpenShift customers at about 3,500 companies. "They're still No. 1 in the market, especially with anything being done on premises with containers and Kubernetes," said Rob Strechay, an analyst at Enterprise Strategy Group, a division of TechTarget. "In public cloud, they hold their own, while [Amazon] EKS Anywhere and [Google] Anthos haven't made as much progress on premises." Multi-faceted platform comparisons complex Here and there, however, there are chinks in OpenShift's armor, depending on a customer's technical focus. Some early adopters of edge computing, such as the U.S. Air Force and the Department of Defense, have favored Rancher Kubernetes, for example, given it was first to market in 2019 with a stripped-down version of Kubernetes in k3s and UI support for centrally managing thousands of edge clusters. As of this week, Red Hat OpenShift Advanced Cluster Management supports up to 2,000 single-node OpenShift clusters. Analysts also point to VMware and its Tanzu platform -- despite Tanzu's status as a relative latecomer to the Kubernetes platform market after years of struggles to integrate it with Cloud Foundry PaaS -- as Red Hat's current chief rival, given the hundreds of thousands of large enterprise customers that use vSphere virtual machines and vRealize IT management tools. VMware's CEO, Raghu Raghuram, has claimed that a majority of OpenShift environments run on vSphere. VMware has also made some inroads in hybrid cloud with its VMware Tanzu on AWS offering, keeping pressure on Red Hat, according to Strechay.

Read More

VIRTUAL DESKTOP TOOLS

Yeahka Continues to Empower Commercial Digitalized Ecosystem as A Constituent of The Hang Seng China Metaverse Index

Yeahka Limited | June 06, 2022

Hang Seng Indexes Company launched the Hang Seng China Metaverse Index to track the performance of Shanghai, Shenzhen, and Hong Kong-listed companies which has businesses related to the development of the metaverse. The index is aimed at helping investors capture innovative and transformative thematic investment opportunities that may emerge in the Mainland and Hong Kong stock markets. Yeahka continues to explore the metaverse to empower its commercial digitalized ecosystem and is selected as one of the 30 constituents, among other major constituents such as Tencent, NetEase, and Kuaishou. According to public information, Yeahka had previously launched a coupon cloud platform based on blockchain technology and was included in the fourth batch of national domestic blockchain information services in October 2020. The platform provides merchant solutions for store management, customer acquisition, and traffic attraction, with the blockchain technology-driven advantage of being a tamper-proof traffic attraction mechanism, allowing transparency in customer acquisition paths. In October 2021, Yeahka formally ventured into the metaverse through Yeahka Gaming, empowering the company's ecosystem with metaverse games and exploring the integration of virtual and reality. The metaverse incorporates a series of cutting-edge technologies such as virtual reality (VR), augmented reality (AR), and artificial intelligence (AI). Users are exposed to a deeper degree of Internet virtualization and a stronger sense of experience and novelty: the communication and interaction in the virtual Internet world of the metaverse closely approximate the real world, and whatever obtained within the metaverse can also be recognized in the real world, blurring the boundaries between online and offline. The development and popularity of Web 3.0 would also support the open and decentralized nature of the metaverse. Compared with the "read-only" model of Web 1.0 and the model of user-led production and sharing of contents in Web 2.0, the public's vision of Web 3.0 is of a brand-new Internet world that is relatively decentralized, automated, and intelligent. On the premise that personal digital identities, digital assets, and data are completely personal for users, users can truly own their data and their transactions are protected by encryption technology. Therefore, Web 3.0 is considered to have tremendous potential in the future integration of online and offline, and metaverse is a virtual formation that can thrive under Web 3.0. As a payment-based technology platform, Yeahka has gradually expanded its business from one-stop payment services to merchant solutions and in-store e-commerce services over a period of 10+ years. It has served 7.5 million offline small and medium-sized merchants and reached over 900 million consumers. After the Pandemic, small and medium-sized offline merchants gradually realized the value of digitalization of their operations, and Yeahka has strategically seized this opportunity, launching QR Code ordering, integrated takeaway, and in-store e-commerce services under the "social + recommendation + selective" model, to solve merchants' pain points with smart operations, helping them to revitalize consumers and attract customers. On the consumer end, Yeahka enables the promotion of merchant brands through private domain and social recommendation marketing, promoting merchants' local lifestyle packages and inspiring consumers' desire to consume in-store. The interaction between merchants and consumers is not restricted to the real world, the combination of the virtual and the real world allows for more diversified interactions between merchants and consumers. Yeahka believes that, with the rapid development of Web 3.0, the combination of the virtual and the real world is a perfect area for Yeahka to involve in. Its social recommendation properties and the interactive nature between the virtual and the reality can empower the business ecosystem of Yeahka, adding more possibilities for the in-store e-commerce business and merchant solutions. Based on this, Yeahka Gaming launched the Year of the Tiger AR game during the Chinese New Year of the Tiger, and the game eventually had an exposure of more than 40 million times in the WeChat ecosystem, and the daily average WeChat index of related keywords was over 10,000, with the peak value exceeding 50,000. The community feedback on the game was also positive with the participation rate through sharing reaching over 26.6%, and the new customer acquisition rate through sharing was 50.1%. This further proves that the path of empowering merchants and consumers through the metaverse is viable and that Yeahka will continue to explore how to use "meta-universe + Web 3.0" to empower its business ecosystem. It is said that Yeahka will next launch a 3D store operation simulation game for consumers, in which players can build their own islands and operate stores related to real merchants on the islands; players can also visit each other and interact with businesses on the islands, breaking the barriers between the virtual and the reality through in-store incentives to achieve social media recommendation marketing and traffic attraction for the in-store e-commerce business of Yeahka.

Read More

VIRTUAL DESKTOP STRATEGIES

C3 Complete to Provide IT and Managed Services Across iM Critical’s Expanding Data Center Footprint

C3 Complete | June 23, 2022

C3 Complete, an award-winning technology service provider, and iM Critical, a data center and IT services company shaping the future of IT infrastructure, are pleased to announce the formation of a strategic partnership. Customers of iM Critical’s data centers will immediately gain access to C3’s extensive suite of technology services, and customers of C3 will benefit from the ultra-modern capabilities of iM Critical’s facilities. The combined services of these two companies will enable agile, turnkey solutions and provide next-generation IT results. Available initially in Miami and Pittsburgh, this partnership will expand to additional high-value markets in 2023. C3’s hybrid cloud services, available in all iM Critical facilities, includes Infrastructure, Desktop, Backup, Storage, and Disaster Recovery as a Service. Each iM Critical facility will also feature C3 Complete’s low-latency, high-speed, cloud on-ramp, data center interconnects, and premium multi-carrier Internet access solutions. For those organizations seeking a turn-key IT experience, iM Critical clients can select from a full suite of Managed Services, Network Engineering, Voice and Collaboration, and Information Security solutions provided by C3 experts. iM Critical recently acquired a premier hyper-connected data center in Miami, FL, with over 100,000 square feet of configurable colocation space and disaster recovery office suites and is repositioning the facility with a number of upgrades, all backed by sustainable advantages like on-site renewable power and unconstrained space and power. Strategically located outside of the 100-year floodplain and hurricane evacuation zones, iM’s Miami facility features a gated campus, 24x7 security, multiple independent utility power feeds and a Category 5 hurricane rating. Another iM Critical facility, an HPC-capable campus located in Pittsburgh, PA, offering the same extensive range of advantages, is slated to open in Q3 of 2022. As part of the Miami facility upgrades, C3 and iM Critical are deploying a highly secure, purpose built, Network Operations Center (NOC) / Security Operations Center (SOC). The state-of-the-art NOC/SOC will be staffed 24x7 and will offer deep monitoring, early detection and mitigation, and incident management and response services. “The iM Critical team brings an incredible amount of experience and strategic vision to the evolving data center market, and we could not be more excited about our partnership with them, We believe that the union of their modern facilities and our services capabilities will make C3 and iM Critical the go-to choice for customers and partners looking to achieve digital transformations with ease, efficiency and security.” Rick Mancinelli, CEO of C3 Complete “We are so pleased with our Miami acquisition, and with the improvements we are making, and are looking forward to providing a new level of security, reliability and interconnection to the Miami colocation market. We continually strive to look beyond those table stakes to understand where the market is going and how we can meet those needs for customers,” commented Michael Roark, CEO of iM Critical. “Partnering with C3 further enables our ability to become the premier single-source provider of end-to-end IT infrastructure solutions in the markets we serve, keeping iM, C3 and our customers ahead of a challenging, changing technology landscape.” About C3 Complete C3 is an award-winning technology consultancy headquartered in Delray Beach, Florida. Since 2009, we’ve delivered in-house, relationship-focused, outcome-driven solutions to hundreds of happy clients nationwide. C3 currently owns and operates a geo-diverse VMware Cloud Verified infrastructure that provides high-performance, secure, and compliant Infrastructure, Virtual Desktops, Backup, and Disaster recovery solutions. C3 also operates a state-of-the-art Cisco BroadWorks powered Hosted PBX, UCaaS and CCaaS platform as well as a nationwide SD-WAN network based on VMware’s industry-leading technologies. C3 maintains an extensive list of wholesale carrier relationships for connectivity and has a broad portfolio of technology-related authorizations and certifications. C3’s expert team of certified network engineers design and implement complex solutions and its bilingual service center is available for support 24×7. About iM Critical iM Critical is shaping the future of data centers, providing colocation with deep insight into IT managed service offerings and a specialization in High-Performance Computing (HPC). iM’s service platforms include Colocation, HPC, Cloud, Storage aaS, Network, 24/7 IT NOC Services with premier DR aaS, Cloud Connect, Data Security and IT Transformation aaS solutions. iM Critical provides access to strategic carrier-neutral networks and cloud onramps, risk mitigation, continuous uptime, and data security to deliver quality and sustainable innovation, saving customers time, money and resources.

Read More

Spotlight

At VMware, we refused to choose. We weren’t satisfied with running only Windows applications on our PCs, and we wanted more than just rebooting between operating systems. We needed to be more productive, we needed to be more agile, and we needed to do it all more securely than ever before. To achieve this, we built what is now the most widely used enterprise hypervisor in the world, giving us all more control over our PCs than ever before.

Resources