Data center transformation with hyper-converged infrastructure for sap hana

April 8, 2019

SAP is responding to customer demands for extremely flexible and money-saving IT concepts and is certifying hyperconverged infrastructures (HCI) for SAP HANA®. Fujitsu is one of the first manufacturers to have a 4-socket system certified by SAP for VMware vSAN. This white paper provides an overview of the solution and outlines the criteria that businesses that use SAP solutions should keep in mind when running productive HCI environments. Fujitsu is one of the first manufacturers to receive SAP certification of a hyper-converged infrastructure (HCI) based on VMware vSAN with a 4-socket server for SAP HANA. The FUJITSU Integrated System PRIMEFLEX for VMware vSAN is based on VMware vSphere, the leading virtualization platform. The native vSAN in vSphere is capable of using all 4 CPU sockets and the 6 TB of memory in a PRIMERGY RX4770 M4 server when running SAP HANA. In other words, most customers can run their SAP HANA production databases with only one node. PRIMEFLEX for VMware vSAN thus offers the highest levels of performance and cost-effectiveness for software-defined SAP operation.

Spotlight

FishNet Security

FishNet Security is North America's largest provider of information security solutions. Headquartered in the Kansas City metro, we help customers define the risks in their environment and select the right technologies and solutions to enable day-to-day operations and business goals. We have 29 offices nationwide, including nine Authorized Training Centers, two state-of-the-art Security Operations Centers and a cloud-based testing lab in Minnesota.

OTHER WHITEPAPERS
news image

VMware Workspace Security and Carbon Black Datasheet

whitePaper | January 10, 2020

Today’s expanding organizational and work perimeters provide even greater opportunities for cyber criminals. According to the world’s leading incident response (IR) professionals, increasingly sophisticated attacks involving instances of “island hopping,” counter incident response, and lateral movement within a network are quickly becoming the new normal. Advanced phishing techniques using social engineering and programming expertise, bots, and ransomware threats also more frequently expose organizations, even those working hard to stay one step ahead.

Read More
news image

The Right Approach to Zero Trust for IoT Devices

whitePaper | May 3, 2022

Networking and security teams have historically relied on protections at the network perimeter to secure the entire enterprise. The internal network was deemed trusted and secure. While everything outside was considered “dirty,” everything on the internal network was considered “clean,” and application traffic would flow unrestricted. However, recent and developing shifts in enterprise working models are having a far-reaching effect on the traditionally managed network perimeter for security. The following trends are making organizations reassess their approach to security:

Read More
news image

Citrix Secure Private Access: A better ZTNA alternative than Zscaler Private Access.

whitePaper | June 15, 2022

With the recent surge in remote work, IT has been tasked with enabling thousands of remote users with secure access to applications and data. Rather than a few users accessing the corporate networks via VPN, entire organizations now work outside the office. This has flipped the entire security posture of countless organizations.

Read More
news image

ADDRESSING THE NEW THREAT INMODERN IT INFRASTRUCTURES

whitePaper | July 19, 2022

Data has become a new global currency. As with other currencies, it has also become a target for threats from those who wish to exploit its value. Ransomware is the new threat to data and it’s wreaking havoc on businesses of all sizes around the world.

Read More
news image

Core principles of cyber hygiene in a world of cloud and mobility

whitePaper | February 15, 2022

Cybersecurity is a top concern at the highest levels of government and industry worldwide. More than ever, government and corporate leaders – from Senators and Members of Parliament to CEOs and Board Directors – are deeply engaged in ensuring effective cybersecurity strategies are in place at government agencies and companies.

Read More
news image

Intel Page Modification Logging, a hardware virtualization feature: study and improvement for virtual machine working set estimation

whitePaper | January 7, 2020

Intel Page Modification Logging (PML) is a novel hardware feature for tracking virtual machine (VM) accessed memory pages. This task is essential in today’s data centers since it allows, among others, checkpointing, live migration and working set size (WSS) estimation. Relying on the Xen hypervisor, this paper studies PML from three angles: power consumption, efficiency, and performance impact on user applications. Our findings are as follows. First, PML does not incur any power consumption overhead. Second, PML reduces by up to 10.18% both VM live migration and checkpointing time. Third, PML slightly reduces by up to 0.95% the performance degradation on applications incurred by live migration and checkpointing.

Read More

Spotlight

FishNet Security

FishNet Security is North America's largest provider of information security solutions. Headquartered in the Kansas City metro, we help customers define the risks in their environment and select the right technologies and solutions to enable day-to-day operations and business goals. We have 29 offices nationwide, including nine Authorized Training Centers, two state-of-the-art Security Operations Centers and a cloud-based testing lab in Minnesota.

Events