Virtual Desktop Strategies, Server Virtualization

Under the hood of Wslink’s multi layered virtual machine

October 11, 2022

under-the-hood-of-wslinks
ESET researchers recently described Wslink, a unique and previously undocumented malicious loader that runs as a server and that features a virtual-machine-based obfuscator. There are no code, functionality or operational similarities that suggest this is likely to be a tool from a known threat actor; the complete analysis of the malware can be found here.

Spotlight

Kasten by Veeam

Kasten is the leader in Kubernetes Backup and Disaster Recovery. Kasten helps enterprises overcome Day 2 data management challenges to confidently run applications on Kubernetes. Kasten K10, a data management platform purpose-built for Kubernetes, provides enterprise operations teams an easy-to-use, scalable, and secure system for backup/restore, disaster recovery, and application mobility with unparalleled operational simplicity. Kasten, an independent Kubernetes Business Unit within Veeam, has offices in the San Francisco Bay Area and Salt Lake City, Utah.

OTHER WHITEPAPERS
news image

Can Zero Trust Network Access Replace Your VPN?

whitePaper | October 11, 2022

Secure, seamless remote network access is a business enabler — boosting remote user productivity and reducing the time spent by IT teams to onboard and maintain user-to-application connectivity with agility and resilience. And yet, remote access remains a challenge for many organizations

Read More
news image

Citrix Virtual Apps and Desktops service

whitePaper | November 5, 2019

Citrix Virtual Apps and Desktops provides virtualization solutions that give IT control of virtual machines, applications, and security while providing anywhere access for any device. End users can use applications and desktops independently of the device’s operating system and interface.

Read More
news image

Network as a programmable service

whitePaper | November 10, 2021

Over the past decade, the cloud has become integral to nearly every digital and business transformation strategy, allowing clients to access the latest technologies, such as IoT, high-performance computing, and blockchain from multiple vendors to reimagine business processes and ecosystems. However, the network and the inter-connectivity across physical infrastructure, virtual infrastructure, and “as-a-service” ingestion points hinder or block broad cloud adoption across the enterprise. Traditional networking approaches make it difficult to keep pace with change and take advantage of new and differentiating technology. Today’s leading network service providers are virtualizing the network, separating the proprietary network appliance functions into discrete hardware and software components. This enables networks to achieve the same benefits already realized with the virtualization and software-defined enablement of systems and storage. The virtualization of the network is recognized as Network Function Virtualization (NFV) and Virtualized Network Functions (VNF).

Read More
news image

Why VDI makes sense forhard-core UNIX® and Linux® engineering applications

whitePaper | December 6, 2022

By now, everyone has heard the terms desktop virtualization and VDI It seems like we’ve been pounded with marketing propaganda about these technologies from companies like VMware, Citrix® and Microsoft® since 2006. But if desktop virtualization is so good, why are most of the world’s desktops still “old-style” physical desktops and laptops?

Read More
news image

NSX-T Data Center Installation Guide - VMware NSX-T Data Center 2.4

whitePaper | February 28, 2020

In the same way that server virtualization programmatically creates and manages virtual machines, NSXT Data Center network virtualization programmatically creates and managed software-based virtual networks. With network virtualization, the functional equivalent of a network hypervisor reproduces the complete set of Layer 2 through Layer 7 networking services (for example, switching, routing, access control, firewalling, QoS) in software. As a result, these services can be programmatically assembled in any arbitrary combination, to produce unique, isolated virtual networks in a matter of seconds.

Read More
news image

ADDRESSING THE NEW THREAT INMODERN IT INFRASTRUCTURES

whitePaper | July 19, 2022

Data has become a new global currency. As with other currencies, it has also become a target for threats from those who wish to exploit its value. Ransomware is the new threat to data and it’s wreaking havoc on businesses of all sizes around the world.

Read More

Spotlight

Kasten by Veeam

Kasten is the leader in Kubernetes Backup and Disaster Recovery. Kasten helps enterprises overcome Day 2 data management challenges to confidently run applications on Kubernetes. Kasten K10, a data management platform purpose-built for Kubernetes, provides enterprise operations teams an easy-to-use, scalable, and secure system for backup/restore, disaster recovery, and application mobility with unparalleled operational simplicity. Kasten, an independent Kubernetes Business Unit within Veeam, has offices in the San Francisco Bay Area and Salt Lake City, Utah.

Events