Archives

Monthly Archives: April 2017

Webcast: How CenturyLink Built a Better Infrastructure with vSAN

In our May 4th webcast, hear from CenturyLink Cloud&#rsquo;s Sr. Lead Systems Engineer, Nilan Shakya, and the VMware vSAN team about how we built a better infrastructure together. CenturyLink, a global enterprise with nearly 6 million customers and an extensive portfolioof network, managed hosting, and cloud solutions, used VMware vSAN to create a more agile

The post Webcast: How CenturyLink Built a Better Infrastructure with vSAN appeared first on Virtual Blocks.

Read more..

vRealize Network Insight, NSX and Palo Alto Networks for micro-segmentation

 

Data Center cyber security is a fast-moving target where the IT teams need to constantly stay ahead of those that wish to do evil things. As security attacks can come from all directions, externally, and internally as well, the IT teams must fortify all the data, with a zero-trust security approach. Perimeter security augmented with intrusion detection and protection at the application level are the tools of choice for most data centers. This protects outsiders from getting in, as well as ensuring that the applications do not get impacted by a virus or other forms of malicious activities.

What has not been addressed is the intercommunications of applications amongst themselves, especially within the hypervisor layer, where virtual machines are communicating in an East-West traffic pattern. Traffic never hits the perimeter, and the conversations are happening several layers below the application layers where IDS sits. East-west traffic, from within the data center, has been an area overlooked as there is a gap organizationally. Simply put no one is paying attention to this area of vulnerability. The network infrastructure security teams are fortifying the perimeter, while the server teams are deploying IDS/IPS solutions. What has gone unnoticed is the East-West traffic that is flowing between virtual machines and the ease that an intruder could tap into these conversation, as there is little, to no firewalling, for denying access.

The VMware NSX Distributed Firewall (DFW) protects East-West L2-L4 traffic within the virtual data center. The DFW operates in the vSphere kernel and provides a firewall at the NIC of every VM. This enables micro-segmented, zero-trust networking with dynamic security policy leveraging the vCenter knowledge of VMs and applications to build policy rather than using IP or MAC addresses that may change. Tools for automation and orchestration as well as a rich set of APIs for partner and customer extensibility complete the toolset for security without impossible management overhead. While this is a dramatic improvement in the security posture of most data centers, layer 4 policies may not prevent malware or other threats that propagate via standard, likely permitted, protocols.

The NSX NetX API allows the insertion of 3rd party security services into the VM traffic flow, including streamlining their deployment and the sharing of security tags in order that security policy can still be dynamic. Palo Alto Networks integration with NSX automatically deploys a Palo Alto Next-Generation firewall to every host in a cluster then steers traffic to it within the host for inspection according to policy. Combining the high throughput DFW with the inspection depth of the App-ID and Threat prevention feature sets from Palo Alto Networks permits the blocking of malware and tunneled bad traffic while retaining the distributed nature of NSX traffic flow. Flows take an optimal path between VMs, remaining within the host where possible, delivering on the NSX objective of controlling lateral movement within the data center with micro-segmentation without becoming an administrative burden.Identifying legitimate East-West traffic is a key step to setup micro-segmentation in an existing data center.

VMware offers an analytic tool known as vRealize Network Insight (vRNI) for observing traffic conversations within the hypervisor. vRNI identifies and documents traffic flows, and provides suggested security policies which can be applied to both NSX and Palo Alto firewalls. vRNI analyzes IPFIX output from the Distributed Virtual Switch to provide suggested security policies and security groups. Additionally, including Palo Alto Networks either using existing production devices or during the planning phase of a deployment adding a device temporarily in tap mode, to provide more data for the assessment.The vRNI assessment results enable the addition of NSX based micro-segmentation and the Palo Alto Next-Generation firewall to a brownfield data center with confidence that existing application flows will not be erroneously blocked. The Palo Alto services can either be deployed as virtual appliances to give Threat and anti-malware protection to East-West traffic or hardware to protect North-South traffic at the edge of the data center.

 

Join us for an Upcoming Webinar:

Using vRNI to Visualize and Secure Your Data Center Virtual Network

Learn how to analyze traffic patterns non-disruptively within your production vSphere data centers, and how to use the vRNI assessment to fortify your data center virtual machines, with zero trust security and enforcement policies.

Speaker: Frank Snyder, Sr. Systems Engineer, VMware

Thursday, May 4, 2017 | 12:00pm - 1:00pm Central Time

Register today!

 

We also have a session at Palo Alto Networks Ignite:

Real World Perspectives on Implementing and Operationalizing Software Defined Security and Micro-Segmentation in Data Center and Cloud

Thursday, June 15, 1:30-2:20 PM

It&#rsquo;s 2017. Software continues to eat the world. Data centers are undergoing rapid transformation and becoming software-defined (SDDC). Workloads are moving to public clouds creating a hybrid environment for IT to manage. Amidst this sea change, Security continues to be the #1 priority and driver. Micro-segmentation has emerged as a clear winner among all security models to protecting next generation and cloud ready applications. A key obstacle to successful micro-segmentation is lack of visibility and operational readiness. In this session, we will have real world customers talk about how they overcame this obstacle and went about successfully implementing a SDDC. You will learn how they used VMware vRealize Network Insight (vRNI) platform to get pervasive visibility, high automation and efficient operations for their SDDC, built upon VMware NSX platform and Palo Alto Networks Firewalls.

Ignite registrants, click here to select your sessions.


To learn more about VMware NSX and Palo Alto Networks

  • Solution Brief
  • Watch our joint customer sessions from VMworld 2016 SEC10020 - Managing Cybersecurity Risks Within SDDC: VMware and Palo Alto Networks Customers Discuss Their Perspectives and Experiences with NSX and VM-Series Deployments
  • Test drive a free Hands-On-Lab (HOL)
    • Intro to vRealize Network Insight
    • Palo Alto Networks Next-Generation Security Platform with VMware NSX

The post vRealize Network Insight, NSX and Palo Alto Networks for micro-segmentation appeared first on Network Virtualization.

Read more..

Citrix XenApp Essentials Service: Your Questions Answered!

With the recent announcement that XenApp Essentials Service is now available on Microsoft Azure Marketplace, we have received great feedback from customers interested in the new service. We’ve put together this FAQ to help determine if XenApp Essentials Service …


  

Related Stories

Continue reading..

Почему vSAN 6.6 — это то, что нужно вашему бизнесу?

Недавно мы представили vSAN 6.6, который предлагает заказчикам встроенную безопасность гиперконвергентной инфраструктуры, повышает экономию и обеспечивает рост производительности до 50%.

Сегодня мы хотим показать вам инфографику, которая наглядно демонстрирет, почему vSAN 6.6 — это то, что нужно вашему бизнесу.

 

Дополнительные ресурсы

  • Регистрируйтесь уже сегодня на новый курс VMware vSAN6
  • Узнайте больше о VMware vSAN

Подписывайтесь на @VMware_rus в Twitter и на нашу страницу в Facebook, чтобы всегда быть в курсе анонсов и новостей.

Read more..

In Top Mobile News: Windows 10 Smartwatches & Android-Supported Laptops

Windows 10 smartwatches come to the enterprise. It&#rsquo;s 1.54 inches, runs Universal Windows Applications, secure and built to &#rsquo;survive a hard day at work,&#rdquo; saidMicrosoft. The TrekStor IoT Wearable runs on Windows 10 IoT Core, a version of Windows 10 for the Internet of Things. Microsoft will reveal more soon on the smartwatch for healthcare, […]]> Windows 10 smartwatches come to the enterprise.

It&#rsquo;s 1.54 inches, runs Universal Windows Applications, secure and built to &#rsquo;survive a hard day at work,&#rdquo; saidMicrosoft. The TrekStor IoT Wearable runs on Windows 10 IoT Core, a version of Windows 10 for the Internet of Things. Microsoft will reveal more soon on the smartwatch for healthcare, manufacturing, retail and other industries.

Migrating to Windows 10—everyone&#rsquo;s doing it.

By the end of this year, 85% of enterprises will have started deploying Windows 10, according to a newGartnersurvey. The top reason to migrate? Nearly half of respondents said it’s improved security.

You may be putting Office 365 apps at risk.

Mobile application management (MAM) helps you control Microsoft Office 365 apps—but there are limitations to an application-onlysecurity framework. Worried?Find out the risks and more comprehensive solutions here.

Are you thinking what I&#rsquo;m thinking?

Chrome could soon predict what you&#rsquo;re searching for in other Android apps based on the last website you visited in the mobile browser. The &#rsquo;Copyless Paste&#rdquo; feature spotted in development would use machine learning to guess what text you&#rsquo;ll enter next.

Google also updated thelistof Chromebook laptops planned to support Android apps, bumping the total from six to more than 80 devices, reportsThe Verge.

Personal privacy matters to enterprise security, too.

Mobile surveillance is a growing threat to individual privacyandto enterprise data. Bring-your-own (BYO) devices that allow apps to collect personal data, &#rsquo;open the door to corporate hacks, stolen business data and crippling cyber attacks.&#rdquo; Read more fromAppthority President Domingo Guerraon what you can do.

Wonder why workers won&#rsquo;t use the apps you deploy?

Blame it on shorter attention spans. About 7% of users won&#rsquo;t use a new work app for each extra step it takes to get started. So if it takes six extra steps, about 42% of workers won&#rsquo;t use a new app. Read more on theVMware EUC Blog.

Tweet of the Week

Renu Upadhyay, director of product marketing at VMware, on this week&#rsquo;s CMSWire Tweet Jam, &#rsquo;Optimizing the Employee Experience:&#rdquo;

 

 

It&#rsquo;s time for a change of scenery.

This year&#rsquo;s largest VMware event, VMworld, will be a once-in-a-lifetime experience for enterprise mobility experts. You’ll hear from Sumit Dhawan, Blake Brannon, Noah Wasmer and other end-user computing (EUC) leaders. Register now for early-bird rates, and get all the details at theAirWatch Blog.

Up next:

  • Join our SociaLab—Introduction to Mobile Device Management (MDM) with AirWatch—May 2 in Houston.
  • &#rsquo;Realize Your Digital Future&#rdquo; May 8–11 atDell EMC Worldin Vegas.
  • Unlock mobility withderived credentials and AirWatchJune 23 online.
  • Don&#rsquo;t miss anexclusive AirWatch experience atVMworld 2017, Aug. 27–31 in Vegas.

Read more..

vCAN LIVE 2017 is June 8 – Register Now

Register now to attend this virtual session dedicated to EMEA Service Providers: ‘Multiply Your Success in the Multi-Cloud Era’, from 10.30 to 13.00 CEST, to learn how to help your customers become a market disruptor with the agility to capitalize on emerging opportunities before anyone else. Join our panel of VMware experts, Ajay Patel, Senior Vice President and General Manager, Cloud Provider Software Business Unit, Geoff Waters, Vice President of Cloud Sales, and Graham Crich, Director, Cloud and Service Provider Partners, EMEA to discover how VMware is turning ambitions like these into reality for every kind of business. We will show you how, by building the right platform and differentiating your Cloud services, so you can help your customers activate digital transformation that delivers a competitive punch.

The post vCAN LIVE 2017 is June 8 - Register Now appeared first on Partner News.

Read more..

See How NVIDIA GRID Powers the Ultimate User Experience for Every Digital Workspace

In this special guest blog post, Kim Harrington from NVIDIA talks about the Citrix-NVIDIA collaboration and how you can experience its powerful combination of technologies at Citrix Synergy 2017.

nvidia_blogimg

4 Ways to Experience NVIDIA GRID at Citrix Synergy 2017

From …


  

Related Stories

Continue reading..

Firma invitada: Cómo llevar el Cross-Cloud de VMware a África

Como uno de los mayores socios de VMware de África, Node África está ayudando a las empresas de todo el continente en su viaje de transformación digital, utilizando el conjunto completo de soluciones cloud de VMware. Al comenzar 2017, le pedimos al CEO de Node Africa, Phares Kariuki, que compartiera sus pensamientos sobre las oportunidades para negocios y partners en África.

Hoy en día, las empresas buscan con más atención qué servicios existen en diferentes nubes y cómo pueden ejecutarlos mientras gestionan eficientemente los costes. El ecosistema de TI en Kenia es una mezcla compleja de oportunidades y desafíos en un contexto de hardware limitado y con la necesidad de equilibrar cargas de trabajo en presupuestos cada vez más limitados.

Muchas empresas están explorando maneras innovadoras de asegurar cargas de trabajo a menor coste y probando procesos y software antes de firmar compromisos a largo plazo con los proveedores. Por ejemplo, una compañía de seguros con la que trabajamos ha puesto recientemente cargas de trabajo en la plataforma de Centro de Datos Definido por Software (SDDC) de VMware y se beneficia de la infraestructura en un modelo de “try as you buy”. Esto permite a la empresa escalar según la demanda, y la agilidad y el ahorro de costes incurridos han tenido un impacto impresionante.

Tener una plataforma consistente a largo plazo que apoye esto, como es el caso de la estrategia de VMware Cross-Cloud, es increíblemente valioso. Este enfoque permite a las empresas aprovechar las estrategias multi-cloud que están transformando la flexibilidad disponible para muchas empresas keniatas. La arquitectura Cross-Cloud de VMware permite a las empresas ejecutar, administrar, conectar y asegurar aplicaciones a través de nubes y dispositivos en un entorno operativo común.

El principal beneficio de una solución como la plataforma de virtualización de red NSX en Kenia es que no importa qué hardware tenga ya que toda la inteligencia es atendida por el software. Esto ofrece a las empresas la flexibilidad de utilizar hardware de diferentes fabricantes, intercambiar características dentro y fuera y ofrecer una mayor seguridad con políticas más granulares.

Pero, ¿cuáles son las oportunidades que esto crea para los socios?

Existen grandes oportunidades para que los socios de VMware ayuden a los clientes a comprender los entresijos de la arquitectura de cross-cloud y la gestión, políticas, redes y seguridad asociadas. Por ello, pueden ayudar a los clientes a trabajar de forma inteligente y aprovechar al máximo cualquier presupuesto que tengan, ya sea trabajando en múltiples lugares o proporcionando la mejor orientación cuando las opciones de hardware son limitadas. Los socios que sean capaces de comprender el delicado equilibrio del panorama tecnológico de Kenia y África serán los que tendrá éxito. Los socios también deben ser conscientes de que el valor añadido para el cliente radica en la experiencia de cómo adoptar SDDC y no en las ventas de infraestructura, por lo que las oportunidades son ilimitadas.

Las empresas keniatas saben la importancia de encontrar un socio que esté tan dedicado a su trayectoria como lo está en términos de infraestructura y de obtener lo mejor de su estrategia en la nube. En Node Africa contamos con una amplia experiencia en la gestión de sistemas críticos y en la creación de infraestructuras de nube a medida.

Mi consejo es que aporten valor ayudando a las empresas a implementar conjuntos de plataformas como NSX. Muchos todavía los están infrautilizando y espero ver políticas de establecimiento de una red de centros de datos en 2017 ya que las compañías cuentan cada vez más con plataformas con arquitecturas flexibles para apoyar su viaje hacia la transformación digital.

En África, el dinero, la agilidad y la tranquilidad serán una parte importante de la agenda de negocios para el próximo año en muchas empresas, pero encontrar un socio que les ayude a aprovechar todo el potencial de sus presupuestos de TI también lo será.

Para más información del VMware Partner Programme, visita:http://www.vmware.com/uk/partners.html

Read more..

vSpeaking Podcast Episode 42: Secondary Storage with Cohesity

In the world of HCI vSAN helped redefine the possible in the primary storage space. Now Cohesity is looking to bring these same principles and advantages to the secondary storage space. Secondary data consumes about 80% of enterprise storage capacity and imposes a huge burden on enterprise IT budgets. Cohesity calls this the Storage Iceberg.

The post vSpeaking Podcast Episode 42: Secondary Storage with Cohesity appeared first on Virtual Blocks.

Read more..

Have Branch/Satellite Office IT to Set Up? Citrix Synergy Has Your Blueprint for Success!

Have Branch/Satellite Office IT to Set Up? Join us at SYN309 for blueprint and best practices @Synergy2017

Do any of these sound like your challenge? A bank that needs to absorb new branch offices due to a recent M&A activity. …


  

Related Stories

Continue reading..

Go Que Newsroom Categories

Fatal error: Allowed memory size of 67108864 bytes exhausted (tried to allocate 7 bytes) in /home/content/36/8658336/html/goquecom/wp-includes/wp-db.php on line 1889