Why VMware Bought the Network Monitoring Startup Nyansa

Datacenter knowledge | February 24, 2020

VMware’s recent acquisition of AI-powered network analytics startup Nyansa strengthens its network monitoring and management capabilities, but the startup’s technology also beefs up VMware’s broader, strategic efforts to help customers automate IT operations, analysts say. VMware said it was buying Nyansa in January. The Palo Alto, California-based startup is behind Voyance, a cloud-based network analytics system that provides network visibility and, using machine learning, detects problems and anomalies and recommends potential fixes to improve network and application performance. Six years in existence, Nyansa has made inroads into the network performance management market and attracted some big-name customers, including Uber, Walmart, Tesla, and Proctor and Gamble.VMware executives said in a blog post that the software giant would pair Voyance with SD-WAN by VeloCloud, its software-defined WAN platform – and that the acquisition would ultimately help it deliver on the promise of self-healing networks. (VMware acquired VeloCloud in 2017.)

Spotlight

Bert Schulze, VP SAP S/4HANA Product Management & Co-Innovation, SAP SE, introduces SAP S/4HANA 1809. In his video, he explains how intelligence is achieved in the latest release, which tools can be used, and the benefits users can take advantage of when using SAP S/4HANA 1809.


Other News
SERVER VIRTUALIZATION

Desktop Virtualization Market To Cross $36,258.9 Million Size by 2030, says P&S Intelligence

P&S Intelligenc | June 21, 2022

According to the market research report published by P&S Intelligence, the desktop virtualization market was valued at $11,980.7 million in 2021, and it is expected to touch $36,258.9 million by 2030, progressing at a compound annual growth rate of 13.1% in the years to come. Virtual desktops have substantial advantages as compared to physical desktops, including cost savings, simpler administration, enhanced efficiency, support for a wide diversity of device types, stouter security, suppleness and scalability, and improved user experiences. Approximately 25% of the revenue of the desktop virtualization market is generated by desktop as a service, which is likely to experience a growth rate of 13.5% in the years to come. This is because of the growing requirement for secured virtual desktops when working remotely, particularly since the epidemic has imposed hybrid work cultures. The number of people using desktop as a service has almost doubled in the last two years. Large organizations, which have in excess of 1,000 employees, are equipping their systems with desktop virtualization software for easy access to data from central sources and for safety reasons. Machines have already been virtualized, and now this trend is being witnessed in desktops as well. The virtualization of desktops and servers can help a business take a lead with abridged costs of hardware, quicker provisioning and deployment of the desktop and server, energy savings, enhanced data safety, disaster recovery, and higher IT working efficiency. The subscription-based pricing model has the larger size in the desktop virtualization market. Some vendors deliver the software free of cost, some charge on an hourly basis, and some offer the license or charge monthly or yearly. A subscription is expedient and dependable, creating a bond between the client and the vendor. Regional Analysis of Desktop Virtualization Market The share of North America is the largest in the desktop virtualization market, credited to the advanced IT infrastructure, because of the high funding in it, and early penetration of 5G and cloud-based technologies. Numerous universities, colleges, and K12 schools make use of this technology, which is the foremost reason for the high requirement for virtual desktop software in the U.S. and Canada. APAC will witness the fastest progress in the coming years because of the thriving economy, growing funding in IT infrastructure, and surging count of private and government initiatives for the usage of IoT and AI across numerous verticals. Key players are investing in niche markets, such as the MEA, to expand their consumer base. For example, Oracle started a novel cloud region in Johannesburg in January 2022, its first in Africa. Additionally, Microsoft and Amazon Web Services have invested in cloud setups in Africa over the last three years. About P&S Intelligence P&S Intelligence provides market research and consulting services to a vast array of industries across the world. As an enterprising research and consulting company, P&S believes in providing thorough insights on the ever-changing market scenario, to empower companies to make informed decisions and base their business strategies with astuteness. P&S keeps the interest of its clients at heart, which is why the insights we provide are both honest and accurate. Our long list of satisfied clients includes entry-level firms as well as multi-million-dollar businesses and government agencies.

Read More

VPN

Banyan Security Research Uncovers Primary Considerations Influencing Zero Trust Network Access (ZTNA) Adoption

Banyan Security | June 28, 2022

Banyan Security, a leading provider of Zero Trust Network Access (ZTNA) solutions, today revealed new research highlighting organizations’ preferences and hesitations for adopting modern remote access solutions. The independent survey was conducted by Sapio Research and engaged over 400 senior decision makers from mid- to large-sized companies in the U.S. and Canada, who are responsible for IT security and are aware of both virtual private networks (VPN) and ZTNA. The key findings from this study include: Over half (54%) of VPN owners stated that secure remote access is a priority at this time. VPN usage is still prevalent among a majority (90%) of security teams who have highlighted cost, time, and difficulty as reasons to not move forward with ZTNA adoption. Almost all organizations (97%) say that adopting a zero trust model is a priority, with 93% of organizations having committed a budget to enhance their VPN or move toward ZTNA within the next year or two. More than half (53%) of respondents have already started rolling out zero trust solutions. Personal Devices and VPNs Do Not Mix The last two years have shifted how we work, producing a new remote workforce that was essentially created overnight. As highlighted in this study, this has resulted in most workers – in this case 51% of respondents – using a combination of corporate and personal devices to connect to business applications and resources. Personal devices often used by less security-conscious family members. This creates a very risky environment as personal devices are easy targets for threat actors especially since IT teams cannot fully monitor activity on these devices. Additionally, personal devices are often used by other family members – particularly children – which make them even more susceptible to malware and other viruses. Despite known security issues, VPN usage continues to thrive, with 90% of respondents currently using a VPN in some capacity for secure remote access. When access is permitted on a personal device, it creates a risky situation for not only the user, but the entire organization. VPNs lack many of the application-level access controls and integrated security that are common in ZTNA solutions. As a result, cybercriminals will often target VPNs because a single set of compromised credentials can provide all of the access needed to carry out a data breach, ransomware incident, or other attacks. “As this study shows, VPN usage continues to be prevalent, often viewed as ‘good enough’ for remote access among organizations simply because that is what they have always used, What this doesn’t account for is the poor administrative and end user experience, not to mention that on-premises access must be handled with separate, siloed tools. We have plenty of evidence to show that legacy VPNs no longer adequately protect nor provide consistent and easy access to corporate resources for today’s ‘work from anywhere’ workforce.” Jayanth Gummaraju, CEO & Co-Founder of Banyan Security Key Drivers for ZTNA A majority of the respondents (97%) stated that adopting a zero trust model is a priority for their organization, where 44% said they have plans to roll out zero trust but are in the early stages, while 53% said they have already begun to roll out zero trust solutions. For organizations who have begun to roll out ZTNA solutions, the survey revealed that secure remote access (48%), improving the end user experience (34%) and eliminating exposure to VPN vulnerabilities (34%) were the top three drivers in their decision to choose ZTNA. Unlike VPNs, ZTNA provides access on a case-by-case basis, which is decided based on user, device, and application-level access and security controls. What’s Holding VPN Users Back from Making the Switch? Over two thirds of organizations (69%) believe implementing a ZTNA strategy would require a large undertaking. Aside from the general familiarity and comfortable usage of their traditional VPN solution, organizations stated that cost/budget constraints are the biggest barriers (62%) for VPN users to adopt ZTNA. Thirty percent of VPN owners said that it would be difficult to implement ZTNA infrastructure in their current security environment; however, 82% of respondents stated they would likely implement ZTNA if there was an easily deployable, inexpensive option. Apathy also appears to be one of the biggest barriers preventing VPN owners from adopting ZTNA solutions with 46% of respondents stating that modern, secure remote access is not a priority at this time. “While it is good to see that awareness of ZTNA solutions amongst IT security professionals continues to grow, the actual implementation of a ZTNA architecture is still considerably low, with just over 17% of respondents having truly begun to roll out a ZTNA strategy,” continued Gummaraju. “As we look toward a future where remote and hybrid work are the standard for most organizations, it’s encouraging to see that IT teams are looking beyond VPNs at more comprehensive zero trust network access solutions.” Research Methodology The survey was conducted among 410 Senior Decision Makers from mid- to large-sized companies in the U.S. and Canada, who are responsible for IT security and are aware of both VPN and ZTNA. The interviews were conducted online by Sapio Research in April 2022 using an email invitation and an online survey, with results accurate to ± 4.8% at 95% confidence limits. About Banyan Security Banyan Security provides secure, zero trust “work from anywhere” access to infrastructure and applications for employees, developers, and third parties without relying on network-centric legacy VPNs. Deep visibility provides actionable insight while continuous authorization with device trust scoring and least privilege access deliver the highest level of protection with a great end user experience. Banyan Security protects tens of thousands of employees across multiple industries, including finance, healthcare, manufacturing, and technology.

Read More

VIRTUAL DESKTOP STRATEGIES

Tailscale SSH Now in Beta for Simple and Secure Remote Connections

Tailscale | June 27, 2022

Tailscale has released Tailscale SSH to beta, which makes authentication and authorization trustworthy and effortless by replacing SSH keys with the Tailscale identity of any machine. With Tailscale, each server and user device gets its own identity and node key for authenticating and encrypting the Tailscale network connection, and uses access control lists defined in code for authorizing connections, making it a natural extension for Tailscale to now manage access for SSH connections in your network. “SSH is an everyday tool for developers, but managing SSH keys for a server isn’t so simple or secure, SSH keys are difficult to protect and time consuming to manage. Protecting your network connections with SSH keys requires that admins spend significant resources managing, provisioning, or deprovisioning user access. Tailscale SSH removes the pain from SSH key management with the same powerful simplicity Tailscale offers for virtual private networks.” Tailscale Product Manager Maya Kaczorowski Kris Nóva, Senior Principal Engineer and published distributed systems expert used Tailscale to create a private network between her homelab in New York and a datacenter in Iceland: “Tailscale is seriously the best user experience of my life. I ran a Kubernetes 1.24 cluster on Tailscale with eBPF CNI networking on top of a tailnet, which connects my private subnet at home, across the Arctic ocean to a private subnet in a volcano-powered datacenter in Iceland. It blew my mind how easy and powerful it was to use. I’m excited to use their new SSH feature.” With Tailscale SSH, users can now securely code from their iPad running Tailscale, across operating systems to a Linux workstation, without having to figure out how to get their SSH private key onto their iPad. Enterprise Tailscale customers will reduce churn and resources on SSH key management or bastion jump boxes, and avoid risk of exposing memory unsafe servers to the open internet. The beta release gives all users: Authentication and encryption: Authenticate, authorize, and encrypt SSH connections using Tailscale. No need to generate, distribute, and manage SSH keys. SSO and MFA: Use existing identity providers and multi-factor authentication to protect SSH connections the same way you authorize and protect application access. Built-in key rotation: Tailscale makes it simple to rotate keys with a single command and manages key distribution. Node keys can be rotated by re-authenticating the device, as frequently as every day. Re-verify SSH connections: Tailscale works with existing identity providers and re-verifies before SSH connections are established, and gives users the option to re-authenticate when establishing high-risk SSH connections. Revoke SSH access easily: When an employee offboards, Tailscale allows admins to revoke access to SSH to a machine almost instantaneously with Tailscale ACLs. Manage permissions as code: Define connections to devices using a standard syntax and understand SSH access controls in a centralized configuration file. Reduced latency with point-to-point connections: Connect directly from a device to a server, without having to hairpin through a bastion. Developers can connect wherever they work, without slowing them down by routing their traffic through the main office. Add a user or server painlessly: Maintain users and servers in a network without adding complexity. Tailscale ACLs to give the right people access and add it to a team's known hosts. Tailscale makes network security accessible to teams of any scale and gives developers and DevOps teams the ability to connect to resources easily and securely in the cloud, on-premises, and everywhere in between. Tailscale uses the WireGuard® protocol, the open source, opinionated standard for secure connectivity. It is set up and configured in a matter of minutes on average, while other VPN solutions take weeks to fully implement and several hours a week to maintain. About Tailscale Tailscale builds software that makes it easy to interconnect and secure devices, no matter where they are. Every day, banks and multinational companies use Tailscale to protect their corporate networks. Homelabs and start-ups trust Tailscale to collaborate and share access to tooling. We're building a future for the Internet that's easy, small and safe, like it used to be. Founded in 2019 and fully distributed, we’re backed by Accel, CRV, Heavybit, Insight Partners, and Uncork Capital.

Read More

DESKTOP

IPVanish Announces Commitment to Privacy Amidst Indian Data Legislation

IPVanish | June 20, 2022

IPVanish, a no-log VPN provider, has released its formal response to impending internet surveillance and data retention legislation in India. In a blog post published on June 7, IPVanish stated that they will not compromise on their no-logs policy despite this new directive demanding logs from VPN providers. According to this new legislation, VPN providers would be required to collect certain customer data and may need to provide that information to Indian authorities. While the directive is not set to go into effect until later this month, IPVanish remains firm in its stance on protecting its customers’ privacy and will continue operating its Indian servers for the time being. Should the directive be enforced, IPVanish has stated that they will continue to prioritize their consumers' privacy and will take any required action, including shutting down physical servers in India to comply with the Indian government's directive. “Privacy will never be something we sacrifice, While we will remain watchful of this impending legislation in India, IPVanish is standing firmly by our zero traffic logs policy, and is prepared to take proper action should the law go into effect.” Subbu Sthanu, VP of Strategy & Product Management at IPVanish In April, IPVanish had its technology and no-log VPN privacy practices audited and certified by a respected independent third-party cybersecurity consulting firm. The IPVanish VPN service delivers: Secure access to the fastest VPN in the world End-to-end network encryption and data protection User-friendly apps for macOS, Windows, iOS, Android, and Amazon Fire TV A verified no-logs policy 24/7 customer support About IPVanish: IPVanish is a worldwide online privacy and freedom advocate. Providing secure access to shared IPs and servers in 75+ locations, IPVanish consistently tests as the fastest VPN service globally, while maintaining industry-best security, reliability, and privacy protection standards.

Read More

Spotlight

Bert Schulze, VP SAP S/4HANA Product Management & Co-Innovation, SAP SE, introduces SAP S/4HANA 1809. In his video, he explains how intelligence is achieved in the latest release, which tools can be used, and the benefits users can take advantage of when using SAP S/4HANA 1809.

Resources