The Virtualization of an Amenity: A New Way To Delight Your Guests

Hospitality Net | May 22, 2019

Any hospitality professional knows that the modern traveler wants it all - but they also want it delivered in a faster, more efficient, and more attentive manner. As our world continues to change and adapt under the influence of increasingly automated, smart technology, consumer expectations, and trends are shifting in tandem. What was once the industry standard has, in many cases, been replaced by tech-enabled enhancements that provide instant gratification, simplified touch-points, and personalization. Consumers are used to ATMs at the bank instead of tellers, checking in for airplane flights online, and they are now looking for that same efficiency when they arrive at a hotel. No one wants to wait in line for the front desk anymore. Travelers especially are increasingly in favor of self-service platforms, and technology which taps into (and leverages) their data for a more refined, meaningful experience. This is further exemplified by studies revealing that when it comes to hotel guests, 63% prefer tech-enabled lobbies, and 84% prefer mobile check-in and check-out.

Spotlight

You want the most value from your virtualization investments and you know that identifying the best approach upfront can be crucial for long-term success. Learn about various approaches and technologies available to you.


Other News
VIRTUAL DESKTOP TOOLS

VMware Named a Leader in the 2022 Gartner Magic Quadrant™ for Unified Endpoint Management for Fifth Year in a Row

VMware | August 19, 2022

VMware, Inc. announced it has been positioned by Gartner, Inc. as a Leader in the 2022 Magic Quadrant for Unified Endpoint Management (UEM). This is the fifth consecutive year Workspace ONE – a core technology supporting unified endpoint management requirements that is part of VMware’s Anywhere Workspace - has been named a Leader in the Gartner Magic Quadrant for unified endpoint management. In addition, VMware received the highest product scores in the 2022 Gartner Critical Capabilities for Unified Endpoint Management Tools report across all four defined Use Cases – Security-Centric Management, Remote Worker, Modern Windows Management, and Non-Standard PC. “Today’s workforce faces key challenges like fragmented security, operational complexity and subpar experiences, In our view, this recognition validates our mission to enable employees to work from anywhere more securely and without friction, while supporting our customers’ most pressing priorities including workplace modernization, zero trust security, a great digital employee experience and profound time and cost savings.” Shankar Iyer, senior vice president and general manager, End-User Computing, VMware About VMware Anywhere Workspace and Workspace ONE VMware Anywhere Workspace is an integrated platform that enables employees to work from anywhere with more secure and frictionless experiences. It brings together all the necessary solutions into a single experience for IT and employees, including Unified End-point Management with Workspace ONE UEM, desktop as a service (DaaS) with Horizon, Digital Employee Experience (DEX), and Workspace Security. Workspace ONE UEM provides a comprehensive solution that enables companies to manage and better secure any device across all platforms. This UEM platform gives IT teams control over the highly diversified device deployments found in so many organizations today, while ensuring enterprise security at every level. Standout features include: Manage Every Endpoint on Every Platform: Manage and secure all devices (mobile, desktop, special-purpose, etc.) and apps (native, SaaS, virtual, etc.) at scale with a single powerful solution by taking advantage of modern, cloud-native efficiencies. Intelligence to Enlighten and Automate: IT teams get real-time visibility into the entire technology environment with Workspace ONE Intelligence, enabling informed, data-driven decisions. Proactive analytics help IT with faster resolution of issues that can negatively impact the overall digital employee experience (DEX) and security. Using the no-/low-code automation framework of Workspace ONE Freestyle Orchestrator, admins can automate routine and complex processes to minimize manual tasks for the IT team. Consistent Employee Experience: Employees work effectively on the go by providing a self-service unified app catalog that is consistent in look, feel, and function across all devices and platforms. The self-service digital workspace provides secure, single sign-on (SSO) access to all apps, actionable notifications, corporate communications, and support resources – all at one touch. Built-in per-app tunneling secures sessions even with apps behind a firewall. Automated Out-of-the-Box Device Onboarding: New devices register over the air during initial power-up with customizable configuration tools like Windows Drop Ship Provisioning, automated device enrollment with Apple Business Manager, zero-touch enrollment of rugged devices, and more. Admins can easily set up and customize the imageless configuration of work profiles such as email, VPN, Wi-Fi, apps, content, intranet sites, and other back-end resources. This gives employees immediate access to email, apps, and data within minutes of device startup, all of which ensures immediate user productivity and a positive employee experience no matter where the user is located. About VMware VMware is a leading provider of multi-cloud services for all apps, enabling digital innovation with enterprise control. As a trusted foundation to accelerate innovation, VMware software gives businesses the flexibility and choice they need to build the future. Headquartered in Palo Alto, California, VMware is committed to building a better future through the company’s 2030 Agenda.

Read More

VIRTUAL DESKTOP TOOLS

Verge.io and Dallas Digital Offer Alternative Enterprise Virtualization Solutions

Verge.io | September 14, 2022

Verge.io, the company with a simpler way to virtualize data centers, and Dallas Digital Services, an IT solutions provider for enterprises and government agencies, today announced an agreement to offer Verge.io’s virtual cloud software stack as a simple, cost-effective alternative to build, deploy and manage virtual data centers. With Verge-OS software, Dallas Digital enables virtualized data centers for its clients with greater savings and efficiencies. Verge-OS abstracts compute, network, and storage from commodity servers and creates pools of raw resources that are simple to run and manage, creating feature-rich infrastructures for environments and workloads like clustered HPC, ultra-converged and hyperconverged data centers, DevOps and Test/Dev, compliant medical and healthcare, remote and edge compute including VDI, and multi-tenant private clouds. “Legacy virtualization platforms require many different SKUs, with complex pricing schemes and significant API integration to build out a virtualized data center, especially at scale,” said Howie Evans Vice President Dallas Digital. “We are pleased to be able to offer Verge-OS as a way to deliver a virtual data center experience but in a secure, hardware-efficient system that can scale compute, memory, and storage resources as needed.” “Recent M&A activity is causing enterprises to look for alternatives to legacy systems, and partnerships with solution providers like Dallas Digital are an ideal way to bring these customers a modernized virtualization platform for the way organizations work today, Verge-OS is not only simpler to configure and run, it’s simpler to buy, and simpler for Dallas Digital to support.” Yan Ness, CEO at Verge.io Verge-OS is an ultra-thin software—less than 300,000 lines of code—that is easy to install and scale on low-cost commodity hardware and self-manages based on AI/ML. A single license replaces separate hypervisor, networking, storage, data protection, and management tools to simplify operations and downsize complex technology stacks. Secure virtual data centers based on Verge-OS include all enterprise data services like global deduplication, disaster recovery, continuous data protection, snapshots, long-distance synch, and auto-failover. They are ideal for creating honeypots, sandboxes, cyber ranges, air-gapped computing, and secure compliance enclaves to meet regulations such as HIPAA, CUI, SOX, NIST, and PCI. Nested multi-tenancy gives service providers, departmental enterprises, and campuses the ability to assign resources and services to groups and sub-groups. About Dallas Digital Services Founded in 1996, Dallas Digital Services began as an on-site service provider for enterprise companies and has developed into a highly recognized solution provider for mission critical and high availability solutions. It is a relationship-driven IT solutions provider, offering best-of-breed technology and services for enterprise organizations as well as public-sector entities. It offers strategic services, technical expertise, and sales support to enable clients to maximize the value of their data center investments. Based on each customer's unique objectives and IT environment, Dallas Digital can assess, architect, implement, and manage solutions that improve current technology performance.

Read More

VPN

Banyan Security Research Uncovers Primary Considerations Influencing Zero Trust Network Access (ZTNA) Adoption

Banyan Security | June 28, 2022

Banyan Security, a leading provider of Zero Trust Network Access (ZTNA) solutions, today revealed new research highlighting organizations’ preferences and hesitations for adopting modern remote access solutions. The independent survey was conducted by Sapio Research and engaged over 400 senior decision makers from mid- to large-sized companies in the U.S. and Canada, who are responsible for IT security and are aware of both virtual private networks (VPN) and ZTNA. The key findings from this study include: Over half (54%) of VPN owners stated that secure remote access is a priority at this time. VPN usage is still prevalent among a majority (90%) of security teams who have highlighted cost, time, and difficulty as reasons to not move forward with ZTNA adoption. Almost all organizations (97%) say that adopting a zero trust model is a priority, with 93% of organizations having committed a budget to enhance their VPN or move toward ZTNA within the next year or two. More than half (53%) of respondents have already started rolling out zero trust solutions. Personal Devices and VPNs Do Not Mix The last two years have shifted how we work, producing a new remote workforce that was essentially created overnight. As highlighted in this study, this has resulted in most workers – in this case 51% of respondents – using a combination of corporate and personal devices to connect to business applications and resources. Personal devices often used by less security-conscious family members. This creates a very risky environment as personal devices are easy targets for threat actors especially since IT teams cannot fully monitor activity on these devices. Additionally, personal devices are often used by other family members – particularly children – which make them even more susceptible to malware and other viruses. Despite known security issues, VPN usage continues to thrive, with 90% of respondents currently using a VPN in some capacity for secure remote access. When access is permitted on a personal device, it creates a risky situation for not only the user, but the entire organization. VPNs lack many of the application-level access controls and integrated security that are common in ZTNA solutions. As a result, cybercriminals will often target VPNs because a single set of compromised credentials can provide all of the access needed to carry out a data breach, ransomware incident, or other attacks. “As this study shows, VPN usage continues to be prevalent, often viewed as ‘good enough’ for remote access among organizations simply because that is what they have always used, What this doesn’t account for is the poor administrative and end user experience, not to mention that on-premises access must be handled with separate, siloed tools. We have plenty of evidence to show that legacy VPNs no longer adequately protect nor provide consistent and easy access to corporate resources for today’s ‘work from anywhere’ workforce.” Jayanth Gummaraju, CEO & Co-Founder of Banyan Security Key Drivers for ZTNA A majority of the respondents (97%) stated that adopting a zero trust model is a priority for their organization, where 44% said they have plans to roll out zero trust but are in the early stages, while 53% said they have already begun to roll out zero trust solutions. For organizations who have begun to roll out ZTNA solutions, the survey revealed that secure remote access (48%), improving the end user experience (34%) and eliminating exposure to VPN vulnerabilities (34%) were the top three drivers in their decision to choose ZTNA. Unlike VPNs, ZTNA provides access on a case-by-case basis, which is decided based on user, device, and application-level access and security controls. What’s Holding VPN Users Back from Making the Switch? Over two thirds of organizations (69%) believe implementing a ZTNA strategy would require a large undertaking. Aside from the general familiarity and comfortable usage of their traditional VPN solution, organizations stated that cost/budget constraints are the biggest barriers (62%) for VPN users to adopt ZTNA. Thirty percent of VPN owners said that it would be difficult to implement ZTNA infrastructure in their current security environment; however, 82% of respondents stated they would likely implement ZTNA if there was an easily deployable, inexpensive option. Apathy also appears to be one of the biggest barriers preventing VPN owners from adopting ZTNA solutions with 46% of respondents stating that modern, secure remote access is not a priority at this time. “While it is good to see that awareness of ZTNA solutions amongst IT security professionals continues to grow, the actual implementation of a ZTNA architecture is still considerably low, with just over 17% of respondents having truly begun to roll out a ZTNA strategy,” continued Gummaraju. “As we look toward a future where remote and hybrid work are the standard for most organizations, it’s encouraging to see that IT teams are looking beyond VPNs at more comprehensive zero trust network access solutions.” Research Methodology The survey was conducted among 410 Senior Decision Makers from mid- to large-sized companies in the U.S. and Canada, who are responsible for IT security and are aware of both VPN and ZTNA. The interviews were conducted online by Sapio Research in April 2022 using an email invitation and an online survey, with results accurate to ± 4.8% at 95% confidence limits. About Banyan Security Banyan Security provides secure, zero trust “work from anywhere” access to infrastructure and applications for employees, developers, and third parties without relying on network-centric legacy VPNs. Deep visibility provides actionable insight while continuous authorization with device trust scoring and least privilege access deliver the highest level of protection with a great end user experience. Banyan Security protects tens of thousands of employees across multiple industries, including finance, healthcare, manufacturing, and technology.

Read More

VIRTUAL DESKTOP TOOLS

VMware and Award-Winning Cyber Security Leader guardDog.ai Announce Partnership for Virtual Implementations at 2022 VMware Explore

guardDog | August 10, 2022

Guard Dog Solutions, Inc., dba guardDog.ai, and VMware are now partnered. guardDog.ai is launching the VMware implementation of its Fido 3 technology at the 2022 VMware Explore event at the Moscone Center in San Francisco Aug. 29 – Sept. 1, in booth 1914. As the award-winning leader in real-time cyber security protection for business and consumers, guardDog.ai is using VMware’s Tanzu containerization technology to support hardware-free and entirely remote deployment and management of cyber security protection for any size MSSP or organization. guardDog’s subscription-based Fido technology uses patent-pending artificial intelligence from the company’s cloud-based Autonomous Incident Response (AiR) database to pre-emptively recognize all devices connected to a network (including most especially the IoT and smart device connections device management solutions can’t see). The solution exposes and shuts down most cybersecurity threats before exploits can happen, protecting users and organizations from threats such as ransomware, man-in-the-middle attacks, denial of service, and emerging novel threats, protecting networks and the devices attached to them. “Full virtualization has been on our product roadmap from the date of our inception, I have had the opportunity to partner with VMware through multiple organizations I have founded and led, and am particularly compelled by the power of the containerization architecture exemplified in VMware Tanzu. We are extremely pleased to provide what we believe is one of the most exemplary use cases for Tanzu implementation, and we look forward to using this technology to protect users and networks and to move the needle on the war against cybersecurity for many seasons to come.” Peter Bookman, CEO and founder of guardDog.ai “The implementation of guardDog.ai Fido 3 as a containerized appliance is a game changer, creating opportunities for anyone who wants to keep bad actors out of their systems,” says Industry veteran CIO Steve O'Donnell. “A wide variety of industry colleagues and I have had the opportunity to test Fido pre-launch and can report that it operates as advertised, it is fully automated, simple to implement and provides effective protection that can be deployed anywhere.” With the VMware implementation of guardDog.ai’s Fido technology, MSSPs and IT departments can now replace the Fido hardware plugins with entirely virtual and remotely manageable implementations. This provides exceptional economy and ability to deploy and manage guardDog’s protection remotely, from a single location, for any size of organization or IT customer base. guardDog.ai uses AI-driven overlay technology in Fido to find and protect users and networks from attempted cyberattacks in less than two milliseconds, by identifying the threats that device and network management solutions can’t see and proactively halting potential exploits before they begin. In both wired and Wi-Fi networks, Fido protects network and the device users from the threats across the entire Attack Surface, and most especially within the edge territory outside the perimeter of the network or on attached devices that other solutions cannot see. These include the myriad of IoT (Internet of Things) devices such as specialized health monitoring equipment, printers, doorbells, thermostats, smart refrigerators, smart pens, smart TVs, and game systems that are inherently vulnerable to the networks they join. Thanks to the VMware partnership and implimentation, the ability to obtain and deploy virtualized Fido technology also eliminates the supply chain issues of availability delays, while allowing for instant and continual updates to the AiR database of known threats and suspicious network behavior. For all implementations, the virtualized alternatives for guardDog’s Fido v3 technology is making it possible to cover all areas of the potential Attack Surface with far greater economy and ease than before. About guardDog.ai Guard Dog Solutions Inc., headquartered in Salt Lake City, Utah, guardDog.ai has developed a cloud-based Autonomous Incident Response (AiR) cyber security software service that works together with a companion Fido unit to simplify network security. The solution provides protection and visibility as it exposes invisible threats on networks and the devices attached to them, with patented technology to address and prevent cybersecurity threats before they compromise network environments. Every business, government, healthcare institution, home consumer, or other organization, is grappling to find security solutions that are adapting to this changing world. guardDog.ai is pioneering new innovations designed to meet these challenges.

Read More

Spotlight

You want the most value from your virtualization investments and you know that identifying the best approach upfront can be crucial for long-term success. Learn about various approaches and technologies available to you.

Resources