VMware completes $2.7 billion Pivotal acquisition

Tech Crunch | December 30, 2019

VMware is closing the year with a significant new component in its arsenal. Today it announced it has closed the $2.7 billion Pivotal acquisition it originally announced in August.The acquisition gives VMware another component in its march to transform from a pure virtual machine company into a cloud native vendor that can manage infrastructure wherever it lives. It fits alongside other recent deals like buying Heptio and Bitnami, two other deals that closed this year. They hope this all fits neatly into VMware Tanzu, which is designed to bring Kubernetes containers and VMware virtual machines together in a single management platform.

Spotlight

Guys in this video iexplained and configurw that how to manage vmware ESXi server and how to create datastore and also i will show you that how to install OS and how to manage OS in VMWARE esxi server.


Other News
DESKTOP

IPVanish Announces Commitment to Privacy Amidst Indian Data Legislation

IPVanish | June 20, 2022

IPVanish, a no-log VPN provider, has released its formal response to impending internet surveillance and data retention legislation in India. In a blog post published on June 7, IPVanish stated that they will not compromise on their no-logs policy despite this new directive demanding logs from VPN providers. According to this new legislation, VPN providers would be required to collect certain customer data and may need to provide that information to Indian authorities. While the directive is not set to go into effect until later this month, IPVanish remains firm in its stance on protecting its customers’ privacy and will continue operating its Indian servers for the time being. Should the directive be enforced, IPVanish has stated that they will continue to prioritize their consumers' privacy and will take any required action, including shutting down physical servers in India to comply with the Indian government's directive. “Privacy will never be something we sacrifice, While we will remain watchful of this impending legislation in India, IPVanish is standing firmly by our zero traffic logs policy, and is prepared to take proper action should the law go into effect.” Subbu Sthanu, VP of Strategy & Product Management at IPVanish In April, IPVanish had its technology and no-log VPN privacy practices audited and certified by a respected independent third-party cybersecurity consulting firm. The IPVanish VPN service delivers: Secure access to the fastest VPN in the world End-to-end network encryption and data protection User-friendly apps for macOS, Windows, iOS, Android, and Amazon Fire TV A verified no-logs policy 24/7 customer support About IPVanish: IPVanish is a worldwide online privacy and freedom advocate. Providing secure access to shared IPs and servers in 75+ locations, IPVanish consistently tests as the fastest VPN service globally, while maintaining industry-best security, reliability, and privacy protection standards.

Read More

VIRTUAL DESKTOP TOOLS

Comcast Business Partners with Fortinet to Secure Enterprise Application Access with New SASE and SSE Solutions

Fortinet | August 02, 2022

Comcast Business today announced a strategic partnership with Fortinet® (NASDAQ: FTNT), a global leader in broad, integrated and automated cybersecurity solutions, to deliver enterprises a new set of secure access service edge (SASE), and security service edge (SSE) solutions to help enterprises protect their distributed workforces using a cloud-delivered approach to security policy enforcement. This collaboration expands Comcast Business’s managed services expertise, while giving enterprises greater flexibility to choose the cloud architecture and vendor mix that is right for them. In today’s work-from-anywhere world, IT leaders are challenged with balancing employee convenience with securing their networks. New security architectures, such as SASE, which converges networking and security via SD-WAN and cloud-delivered security, and SSE, the security foundation of SASE, enable enterprises to strengthen their security posture while enhancing employees’ experience, regardless of their location. In fact, according to a recent Foundry CIO research study sponsored by Masergy (a Comcast Business company) and Fortinet, the overwhelming majority (98%) of enterprise IT leaders surveyed cited the convergence of network and security as critical or very important, while 94% said their adoption of SASE solutions has accelerated. The new Comcast Business offerings — delivered through Comcast Business Secure Gateways — give enterprises the option to choose from either SASE or SSE solutions backed by Fortinet’s security-driven networking technology and Equinix’s flexible cloud connection Equinix Fabric™ for a complete secure network service. Enterprises wanting to enable safe access to cloud and web services can take advantage of the Comcast Business SSE solution, which brings together multiple cloud-delivered network security technologies in a fully-hosted environment. The Comcast Business SASE solution provides this hosted SSE security architecture combined with zero trust capabilities and any of Comcast Business’s SD-WAN solutions. “In today’s dynamic world, no two companies are alike and very few are the same as they were just two years ago,” said Amit Verma, Chief Technology Officer, Enterprise Solutions, Comcast Business. “By expanding our relationship with Fortinet, we are offering our clients more choice and the flexibility to choose a solution that works for them – while providing some of the latest security solutions to help keep them ready for the day – today and tomorrow.” Comcast Business Secure Gateways provide a fully-hosted set of SASE or SSE services covering a broad range of security networking solutions for Firewall-as-a-Service (FWaaS), Intrusion Prevention (IPS), Data Loss Prevention (DLP), Cloud Access Security Brokers (CASB), and Zero Trust Network Access (ZTNA). Comcast Business Secure Gateways are hosted across the United States at Equinix data centers, offering up to 10 gigabits per second (Gbps) of cloud connectivity for public, private, or hybrid cloud deployments. The Equinix Fabric™ enables support of Amazon Web Services, Microsoft Azure, Google Cloud, IBM and more than 200 SaaS providers. "In order to enhance user experience, reduce complexity, and improve their security posture against today’s most advanced and persistent threats, organizations must adopt solutions that converge networking and security, We’re pleased to work closely with Comcast Business to build SASE services that support customers at any stage of digital innovation with Fortinet’s industry leading security-driven networking technology.” John Maddison, EVP of products and CMO, Fortinet About Comcast Business Comcast Business offers a suite of Connectivity, Communications, Networking, Cybersecurity, Wireless, and Managed Solutions to help organizations of different sizes prepare for what’s next. Powered by the nation’s largest Gig-speed broadband network, and backed by 24/7 customer support, Comcast Business is the nation’s largest cable provider to small and mid-size businesses and one of the leading service providers to the Enterprise market. Comcast Business has been consistently recognized by industry analysts and associations as a leader and innovator, and one of the fastest growing providers of Ethernet services. About Comcast Corporation Comcast Corporation is a global media and technology company that connects people to moments that matter. We are principally focused on broadband, aggregation, and streaming with 57 million customer relationships across the United States and Europe. We deliver broadband, wireless, and video through our Xfinity, Comcast Business, and Sky brands; create, distribute, and stream leading entertainment, sports, and news through Universal Filmed Entertainment Group, Universal Studio Group, Sky Studios, the NBC and Telemundo broadcast networks, multiple cable networks, Peacock, NBCUniversal News Group, NBC Sports, Sky News, and Sky Sports; and provide memorable experiences at Universal Parks and Resorts in the United States and Asia About Fortinet Fortinet makes possible a digital world that we can always trust through its mission to protect people, devices, and data everywhere. This is why the world’s largest enterprises, service providers, and government organizations choose Fortinet to securely accelerate their digital journey. The Fortinet Security Fabric platform delivers broad, integrated, and automated protections across the entire digital attack surface, securing critical devices, data, applications, and connections from the data center to the cloud to the home office. Ranking #1 in the most security appliances shipped worldwide, more than 580,000 customers trust Fortinet to protect their businesses. And the Fortinet NSE Training Institute, an initiative of Fortinet’s Training Advancement Agenda (TAA), provides one of the largest and broadest training programs in the industry to make cyber training and new career opportunities available to everyone.

Read More

VIRTUAL DESKTOP TOOLS

VMware and Award-Winning Cyber Security Leader guardDog.ai Announce Partnership for Virtual Implementations at 2022 VMware Explore

guardDog | August 10, 2022

Guard Dog Solutions, Inc., dba guardDog.ai, and VMware are now partnered. guardDog.ai is launching the VMware implementation of its Fido 3 technology at the 2022 VMware Explore event at the Moscone Center in San Francisco Aug. 29 – Sept. 1, in booth 1914. As the award-winning leader in real-time cyber security protection for business and consumers, guardDog.ai is using VMware’s Tanzu containerization technology to support hardware-free and entirely remote deployment and management of cyber security protection for any size MSSP or organization. guardDog’s subscription-based Fido technology uses patent-pending artificial intelligence from the company’s cloud-based Autonomous Incident Response (AiR) database to pre-emptively recognize all devices connected to a network (including most especially the IoT and smart device connections device management solutions can’t see). The solution exposes and shuts down most cybersecurity threats before exploits can happen, protecting users and organizations from threats such as ransomware, man-in-the-middle attacks, denial of service, and emerging novel threats, protecting networks and the devices attached to them. “Full virtualization has been on our product roadmap from the date of our inception, I have had the opportunity to partner with VMware through multiple organizations I have founded and led, and am particularly compelled by the power of the containerization architecture exemplified in VMware Tanzu. We are extremely pleased to provide what we believe is one of the most exemplary use cases for Tanzu implementation, and we look forward to using this technology to protect users and networks and to move the needle on the war against cybersecurity for many seasons to come.” Peter Bookman, CEO and founder of guardDog.ai “The implementation of guardDog.ai Fido 3 as a containerized appliance is a game changer, creating opportunities for anyone who wants to keep bad actors out of their systems,” says Industry veteran CIO Steve O'Donnell. “A wide variety of industry colleagues and I have had the opportunity to test Fido pre-launch and can report that it operates as advertised, it is fully automated, simple to implement and provides effective protection that can be deployed anywhere.” With the VMware implementation of guardDog.ai’s Fido technology, MSSPs and IT departments can now replace the Fido hardware plugins with entirely virtual and remotely manageable implementations. This provides exceptional economy and ability to deploy and manage guardDog’s protection remotely, from a single location, for any size of organization or IT customer base. guardDog.ai uses AI-driven overlay technology in Fido to find and protect users and networks from attempted cyberattacks in less than two milliseconds, by identifying the threats that device and network management solutions can’t see and proactively halting potential exploits before they begin. In both wired and Wi-Fi networks, Fido protects network and the device users from the threats across the entire Attack Surface, and most especially within the edge territory outside the perimeter of the network or on attached devices that other solutions cannot see. These include the myriad of IoT (Internet of Things) devices such as specialized health monitoring equipment, printers, doorbells, thermostats, smart refrigerators, smart pens, smart TVs, and game systems that are inherently vulnerable to the networks they join. Thanks to the VMware partnership and implimentation, the ability to obtain and deploy virtualized Fido technology also eliminates the supply chain issues of availability delays, while allowing for instant and continual updates to the AiR database of known threats and suspicious network behavior. For all implementations, the virtualized alternatives for guardDog’s Fido v3 technology is making it possible to cover all areas of the potential Attack Surface with far greater economy and ease than before. About guardDog.ai Guard Dog Solutions Inc., headquartered in Salt Lake City, Utah, guardDog.ai has developed a cloud-based Autonomous Incident Response (AiR) cyber security software service that works together with a companion Fido unit to simplify network security. The solution provides protection and visibility as it exposes invisible threats on networks and the devices attached to them, with patented technology to address and prevent cybersecurity threats before they compromise network environments. Every business, government, healthcare institution, home consumer, or other organization, is grappling to find security solutions that are adapting to this changing world. guardDog.ai is pioneering new innovations designed to meet these challenges.

Read More

VIRTUAL DESKTOP STRATEGIES

Tailscale SSH Now in Beta for Simple and Secure Remote Connections

Tailscale | June 27, 2022

Tailscale has released Tailscale SSH to beta, which makes authentication and authorization trustworthy and effortless by replacing SSH keys with the Tailscale identity of any machine. With Tailscale, each server and user device gets its own identity and node key for authenticating and encrypting the Tailscale network connection, and uses access control lists defined in code for authorizing connections, making it a natural extension for Tailscale to now manage access for SSH connections in your network. “SSH is an everyday tool for developers, but managing SSH keys for a server isn’t so simple or secure, SSH keys are difficult to protect and time consuming to manage. Protecting your network connections with SSH keys requires that admins spend significant resources managing, provisioning, or deprovisioning user access. Tailscale SSH removes the pain from SSH key management with the same powerful simplicity Tailscale offers for virtual private networks.” Tailscale Product Manager Maya Kaczorowski Kris Nóva, Senior Principal Engineer and published distributed systems expert used Tailscale to create a private network between her homelab in New York and a datacenter in Iceland: “Tailscale is seriously the best user experience of my life. I ran a Kubernetes 1.24 cluster on Tailscale with eBPF CNI networking on top of a tailnet, which connects my private subnet at home, across the Arctic ocean to a private subnet in a volcano-powered datacenter in Iceland. It blew my mind how easy and powerful it was to use. I’m excited to use their new SSH feature.” With Tailscale SSH, users can now securely code from their iPad running Tailscale, across operating systems to a Linux workstation, without having to figure out how to get their SSH private key onto their iPad. Enterprise Tailscale customers will reduce churn and resources on SSH key management or bastion jump boxes, and avoid risk of exposing memory unsafe servers to the open internet. The beta release gives all users: Authentication and encryption: Authenticate, authorize, and encrypt SSH connections using Tailscale. No need to generate, distribute, and manage SSH keys. SSO and MFA: Use existing identity providers and multi-factor authentication to protect SSH connections the same way you authorize and protect application access. Built-in key rotation: Tailscale makes it simple to rotate keys with a single command and manages key distribution. Node keys can be rotated by re-authenticating the device, as frequently as every day. Re-verify SSH connections: Tailscale works with existing identity providers and re-verifies before SSH connections are established, and gives users the option to re-authenticate when establishing high-risk SSH connections. Revoke SSH access easily: When an employee offboards, Tailscale allows admins to revoke access to SSH to a machine almost instantaneously with Tailscale ACLs. Manage permissions as code: Define connections to devices using a standard syntax and understand SSH access controls in a centralized configuration file. Reduced latency with point-to-point connections: Connect directly from a device to a server, without having to hairpin through a bastion. Developers can connect wherever they work, without slowing them down by routing their traffic through the main office. Add a user or server painlessly: Maintain users and servers in a network without adding complexity. Tailscale ACLs to give the right people access and add it to a team's known hosts. Tailscale makes network security accessible to teams of any scale and gives developers and DevOps teams the ability to connect to resources easily and securely in the cloud, on-premises, and everywhere in between. Tailscale uses the WireGuard® protocol, the open source, opinionated standard for secure connectivity. It is set up and configured in a matter of minutes on average, while other VPN solutions take weeks to fully implement and several hours a week to maintain. About Tailscale Tailscale builds software that makes it easy to interconnect and secure devices, no matter where they are. Every day, banks and multinational companies use Tailscale to protect their corporate networks. Homelabs and start-ups trust Tailscale to collaborate and share access to tooling. We're building a future for the Internet that's easy, small and safe, like it used to be. Founded in 2019 and fully distributed, we’re backed by Accel, CRV, Heavybit, Insight Partners, and Uncork Capital.

Read More