VIRTUAL SERVER INFRASTRUCTURE

Expanding the Open RAN Ecosystem with a Wide Portfolio of High-Performance O-RAN Compliant Radios

Mavenir | February 24, 2022

Mavenir, the Network Software Provider building the future of networks with cloud-native software that runs on any cloud and transforms the way the world connects, announces a wide portfolio of O-RAN compliant Radio Units (RUs) – expanding the Open RAN radio ecosystem, to provide Communications Service Providers (CSPs) with a wider choice of radios as they progress in rolling out open and interoperable networks.

OpenBeam, the Future of Radio, is providing CSPs with a comprehensive portfolio of O-RAN compliant radio products spanning micro, macro, millimeter wave (mmWave) and massive MIMO (mMIMO) to support Open RAN deployments in 2022 and beyond.

The OpenBeam radio portfolio covers a wide range of spectrum, both licensed and unlicensed and strictly follows the philosophy of open interfaces and O-RAN 7.2 interface to which Mavenir is strongly committed with Open RAN CU/DU products. OpenBeam radios will be available to the Open RAN Ecosystem including vendors, operators, and system integrators.

According to Dell’Oro’s January 2022 reporti, total Open RAN revenues remain on track to approach $6B or 15% of the overall RAN market by 2026. Additionally, in the Remote Radio Unit (RRU) and Active Antennas Unit (AAU), the growth of Open RAN Units shows CAGR >50% versus a declining number of traditional legacy radios.

Alongside a strong existing ecosystem of partners that Mavenir MAVair Open vRAN interworks with (more than 15 O-RAN RRU partners), the new OpenBeam suite provides an innovative and comprehensive radio portfolio that is specifically designed for the growing needs of CSPs with agile, cost-efficient, smart radios to meet critical demands on the network now, and as the network changes and expands.

The radio solutions can be used for a wide range of use cases, including basic coverage across all frequency bands for enterprise, urban and rural deployment opportunities. The robust set of options address the needs of CSPs to be agile and cost-efficient with low power consumption, low wind load, and are built with integrated intelligence and automation. Designed for the growing needs of private enterprises to public networks, the portfolio supports both new and legacy radio access technologies. All radios have a modular design, using proven technology to support both beamforming and multi-band needs.

We have engaged with customers globally to curate a comprehensive O-RAN portfolio that addresses the needs of both private enterprises as well as traditional communication providers. OpenBeam portfolio covers a wide range of deployment scenarios starting from micro-RUs to 64TR Massive MIMO Radios. OpenBeam radios deliver industry-leading performance and energy efficiency packed in a small footprint.”

Rajesh Srinivasa, Senior Vice President of Radio Business Unit at Mavenir

Pardeep Kohli, Chief Executive Officer at Mavenir, said, “With the incredible growth of virtualization and Open RAN, we always believed that the ecosystem had to be accelerated as this is fundamental for the success of the future of networks. Mavenir has been working with many partners in the ecosystem, and we have also injected more direct contributions when it comes to innovative design.

“Mavenir is a strong believer in new generation software-based networks which are orchestrated by artificial intelligence (AI) and analytics software and adapt in a dynamic way to the user behaviors and market demands. The intelligent, dynamic and adaptable software, together with strong underlying automation, is what drives innovation in the future of networks.”

About Mavenir
Mavenir is building the future of networks and pioneering advanced technology, focusing on the vision of a single, software-based automated network that runs on any cloud. As the industry's only end-to-end, cloud-native network software provider, Mavenir is focused on transforming the way the world connects, accelerating software network transformation for 250+ Communications Service Providers in over 120 countries, which serve more than 50% of the world’s subscribers.

Spotlight

Most IT sites, have a key system that is essential to the survival of their business. When processing on such a system is interrupted, essential Line of Business (LoB) operations cease to function and corporate business is significantly impacted. Moreover, the longer it takes to restore a mission-critical system, the greater the likelihood that the business will face substantial repercussions.


Other News
VIRTUAL DESKTOP STRATEGIES

Tailscale SSH Now in Beta for Simple and Secure Remote Connections

Tailscale | June 27, 2022

Tailscale has released Tailscale SSH to beta, which makes authentication and authorization trustworthy and effortless by replacing SSH keys with the Tailscale identity of any machine. With Tailscale, each server and user device gets its own identity and node key for authenticating and encrypting the Tailscale network connection, and uses access control lists defined in code for authorizing connections, making it a natural extension for Tailscale to now manage access for SSH connections in your network. “SSH is an everyday tool for developers, but managing SSH keys for a server isn’t so simple or secure, SSH keys are difficult to protect and time consuming to manage. Protecting your network connections with SSH keys requires that admins spend significant resources managing, provisioning, or deprovisioning user access. Tailscale SSH removes the pain from SSH key management with the same powerful simplicity Tailscale offers for virtual private networks.” Tailscale Product Manager Maya Kaczorowski Kris Nóva, Senior Principal Engineer and published distributed systems expert used Tailscale to create a private network between her homelab in New York and a datacenter in Iceland: “Tailscale is seriously the best user experience of my life. I ran a Kubernetes 1.24 cluster on Tailscale with eBPF CNI networking on top of a tailnet, which connects my private subnet at home, across the Arctic ocean to a private subnet in a volcano-powered datacenter in Iceland. It blew my mind how easy and powerful it was to use. I’m excited to use their new SSH feature.” With Tailscale SSH, users can now securely code from their iPad running Tailscale, across operating systems to a Linux workstation, without having to figure out how to get their SSH private key onto their iPad. Enterprise Tailscale customers will reduce churn and resources on SSH key management or bastion jump boxes, and avoid risk of exposing memory unsafe servers to the open internet. The beta release gives all users: Authentication and encryption: Authenticate, authorize, and encrypt SSH connections using Tailscale. No need to generate, distribute, and manage SSH keys. SSO and MFA: Use existing identity providers and multi-factor authentication to protect SSH connections the same way you authorize and protect application access. Built-in key rotation: Tailscale makes it simple to rotate keys with a single command and manages key distribution. Node keys can be rotated by re-authenticating the device, as frequently as every day. Re-verify SSH connections: Tailscale works with existing identity providers and re-verifies before SSH connections are established, and gives users the option to re-authenticate when establishing high-risk SSH connections. Revoke SSH access easily: When an employee offboards, Tailscale allows admins to revoke access to SSH to a machine almost instantaneously with Tailscale ACLs. Manage permissions as code: Define connections to devices using a standard syntax and understand SSH access controls in a centralized configuration file. Reduced latency with point-to-point connections: Connect directly from a device to a server, without having to hairpin through a bastion. Developers can connect wherever they work, without slowing them down by routing their traffic through the main office. Add a user or server painlessly: Maintain users and servers in a network without adding complexity. Tailscale ACLs to give the right people access and add it to a team's known hosts. Tailscale makes network security accessible to teams of any scale and gives developers and DevOps teams the ability to connect to resources easily and securely in the cloud, on-premises, and everywhere in between. Tailscale uses the WireGuard® protocol, the open source, opinionated standard for secure connectivity. It is set up and configured in a matter of minutes on average, while other VPN solutions take weeks to fully implement and several hours a week to maintain. About Tailscale Tailscale builds software that makes it easy to interconnect and secure devices, no matter where they are. Every day, banks and multinational companies use Tailscale to protect their corporate networks. Homelabs and start-ups trust Tailscale to collaborate and share access to tooling. We're building a future for the Internet that's easy, small and safe, like it used to be. Founded in 2019 and fully distributed, we’re backed by Accel, CRV, Heavybit, Insight Partners, and Uncork Capital.

Read More

SERVER VIRTUALIZATION

New Audit Resources from ISACA Help Professionals Keep Pace with 2022 Audit and Compliance Trends and Updates

ISACA | December 22, 2021

As the year winds down, many audit professionals are shifting their focus to 2022 priorities—including developing dynamic new strategies such as agile auditing, revisiting established technologies from a remote or hybrid working environment perspective, and closing any gaps between compliance expectations and current practices—and how they can enhance their skills to meet the needs of the evolving audit landscape. To meet these needs, ISACA has released three new audit resources—its VPN Security Audit Program, Destination: Agile Auditing white paper, and a new edition of its IT Control Objectives for Sarbanes-Oxley publication. During the pandemic, the reliance on virtual private networks (VPNs) was heightened as many shifted to working from home—as did the need to manage its risks and implement safeguards. ISACA’s VPN Security Audit Program provides a foundation for auditors to provide assurance around the effectiveness of implemented VPN controls, including pre-audit planning, governance and oversight, implementation and configuration, operations, and maintenance and monitoring, to avoid some of the following risks: The increase in number of end users combined with extended VPN use may put additional pressure on infrastructure and adversely affect performance. Failure to detect unauthorized VPN activity may cause denial of service due to excessive traffic or connection attempts. Lack of alignment of data classification requirements with VPN requirements and configuration may impair compliance initiatives that are reliant on data classification. During the pandemic, organizations embraced methods to increase agility and efficiency, including by using Agile. Destination: Agile Auditing outlines how audit professionals can incorporate Agile principles into their audit methodologies. Auditors can learn the basics about Agile auditing, its benefits, how Agile complements established assurance standards, how developing competency in Agile can enhance the planning, fieldwork, and reporting phases of an audit. The white paper also includes examples of elements from the Agile tool set, including an Agile road map and Agile audit engagement workflows and illuminates key components like sprints, audit backlog and daily standups. Internal and external auditors, IT auditors and managers, and financial and operational managers can also ensure they are keeping up with the latest guidance in complying with the Sarbanes-Oxley Act in a new edition of ISACA’s IT Control Objectives for Sarbanes-Oxley publication. This latest edition incorporates updated guidance and standards from the Public Company Accounting Oversight Board (PCAOB) and the American Institute of CPAs (AICPA) and its Auditing Standards Board, with updates including: Integrating guidance for implementing internal control over financial reporting (ICFR) using COBIT® 2019, for IT and financial management within enterprises and for their internal and external auditors and consultants Aligning with COBIT 2019 Focus Area: Information & Technology Risk Providing the mapping of the role of COSO Internal Control – Integrated Framework, 2013 to COBIT 2019 Highlighting technological innovations and their impacts on auditing IT controls. The audit landscape is constantly shifting as technologies and regulations evolve, making it essential that audit professionals prioritize continuous learning to ensure they are applying the most current and effective audit practices. ISACA is committed to equipping the global audit community with the tools they need to deliver the highest audit standards at their organizations.” Robin Lyons, IT Audit Professional Practices Lead About ISACA For more than 50 years, ISACA has advanced the best talent, expertise and learning in technology. ISACA equips individuals with knowledge, credentials, education and community to progress their careers and transform their organizations, and enables enterprises to train and build quality teams. ISACA is a global professional association and learning organization that leverages the expertise of its more than 150,000 members who work in information security, governance, assurance, risk and privacy to drive innovation through technology. It has a presence in 188 countries, including more than 220 chapters worldwide. In 2020, ISACA launched One In Tech, a philanthropic foundation that supports IT education and career pathways for under-resourced, under-represented populations.

Read More

VMWARE

OpenShift boosts DevSecOps with VMware Tanzu in its rear view

OpenShift | May 12, 2022

Red Hat OpenShift was introduced, but the fiercest competition among DevOps platform vendors for enterprise buyers has only just begun. Red Hat first released OpenShift in 2011 and standardized its OpenShift Container Platform on Kubernetes in 2014, well ahead of the open source container orchestration framework's emergence as an industry standard. OpenShift remains, by most market analysts' measures, the most widely used DevOps platform, a category that took shape amid the upheavals of the COVID-19 pandemic and an industry consolidation that saw VMware acquire Heptio in 2018, forming the basis for its Tanzu Kubernetes products; IBM acquire Red Hat for $34 billion in 2019; and SUSE acquire Rancher in 2020. The latest IBM estimates put the number of OpenShift customers at about 3,500 companies. "They're still No. 1 in the market, especially with anything being done on premises with containers and Kubernetes," said Rob Strechay, an analyst at Enterprise Strategy Group, a division of TechTarget. "In public cloud, they hold their own, while [Amazon] EKS Anywhere and [Google] Anthos haven't made as much progress on premises." Multi-faceted platform comparisons complex Here and there, however, there are chinks in OpenShift's armor, depending on a customer's technical focus. Some early adopters of edge computing, such as the U.S. Air Force and the Department of Defense, have favored Rancher Kubernetes, for example, given it was first to market in 2019 with a stripped-down version of Kubernetes in k3s and UI support for centrally managing thousands of edge clusters. As of this week, Red Hat OpenShift Advanced Cluster Management supports up to 2,000 single-node OpenShift clusters. Analysts also point to VMware and its Tanzu platform -- despite Tanzu's status as a relative latecomer to the Kubernetes platform market after years of struggles to integrate it with Cloud Foundry PaaS -- as Red Hat's current chief rival, given the hundreds of thousands of large enterprise customers that use vSphere virtual machines and vRealize IT management tools. VMware's CEO, Raghu Raghuram, has claimed that a majority of OpenShift environments run on vSphere. VMware has also made some inroads in hybrid cloud with its VMware Tanzu on AWS offering, keeping pressure on Red Hat, according to Strechay.

Read More

SERVER VIRTUALIZATION

Lightbits and Harel IT to Showcase NVMe Storage for Virtualized Clouds at VMware VForum 2022

Lightbits | March 24, 2022

VMware vForum – Lightbits Labs® (Lightbits®), a leader in NVMe®-based, scalable and software-defined elastic block storage for private and edge clouds, today announced their silver sponsorship of the VMware vForum 2022, in Tel Aviv, Israel, with Harel IT. To register or learn more about the event On the wake of the recent announcement that VMware is supporting NVMe/TCP, this is a great event for us to showcase high-performance, low latency NVMe storage for modern applications running in VMware-based clouds,” said Elie Barsheshet, CEO at Harel IT. “As sponsors of the event, it affords VMware users the opportunity to meet with us and learn how to deploy simple, efficient NVMe/TCP-based infrastructure services.” About Harel IT Harel Information Technologies strives to provide its customers high-end computing solutions while providing our customers with unparalleled service and support and long term relationships with our customers. We provide professional computer solutions for organizations and businesses. Since our inception in 1989, we have set a goal to lead the field of computing and communications solutions. Our commitment is to provide comprehensive solutions for hardware, peripherals, communication and turnkey project management (including the management and implementation of projects abroad). Harel Information Technologies is a business partner of the world's leading manufacturers, including: Lenovo, NetApp, Fujitsu, VMware, Microsoft, Commvault, Veeam and others. The business results allow the company to deal with projects on any scale, professional complexity and stringent schedule requirements and high level of availability. About Lightbits Labs Lightbits Labs (Lightbits) is leading the digital data center transformation by making high-performance elastic block storage available to any cloud. Creators of the NVMe® over TCP (NVMe®/TCP) protocol, Lightbits software-defined storage is easy to deploy at scale and delivers performance equivalent to local flash to accelerate cloud-native applications in bare metal, virtual, or containerized environments. Backed by leading enterprise investors including Cisco Investments, Dell Technologies Capital, Intel Capital, and Micron, Lightbits is on a mission to make high-performance elastic block storage simple, scalable and cost-efficient for any cloud.

Read More

Spotlight

Most IT sites, have a key system that is essential to the survival of their business. When processing on such a system is interrupted, essential Line of Business (LoB) operations cease to function and corporate business is significantly impacted. Moreover, the longer it takes to restore a mission-critical system, the greater the likelihood that the business will face substantial repercussions.

Resources