Soon after data centers began transitioning from hard drives to solid-state drives (SSD), the NVMe protocol arrived to support high-performance, direct-attached PCIe SSDs. NVMe was followed by NVMe over Fabrics (NVMe-oF), which was designed to efficiently support hyperscale remote SSD pools, effectively replacing direct-attached storage (DAS) to become the default protocol for disaggregated storage within a cloud infrastructure.To read this article in full, please click here
Intent-based networking applies a deep level of intelligence to enterprise networks. Here's how your organization can benefit from this powerful emerging technology.
As the new year dawns, take a step back and think about how your network and team can be improved to meet emerging demands. Here's a look at four key areas you should consider addressing.
Hyperconverged infrastructure (HCI) has made substantial inroads in enterprise environments, and vendors have responded with new use cases and purchasing scenarios, including an emerging deployment option: HCI as a service.Conventional HCI combines servers, storage and network resources into a single box, providing adopters with a gateway to simplified, centralized data-center management. HCI as a service (HCIaaS) ups the ante by enabling data-center operators to adopt HCI in a manner that promises to reduce both operational and financial overhead.Several HCI vendors, including VMware, Nutanix, Dell, and HPE, offer a managed service option, says Naveen Chhabra, a senior analyst at IT research firm Forrester. "It basically turns the capital expenditure and one-time investment into an [operating expense]," Chhabra says. "In most cases, the vendor will also manage the HCI's day-to-day operations."To read this article in full, please click here
Hyperconverged infrastructure (HCI) has made substantial inroads in enterprise environments, and vendors have responded with new use cases and purchasing scenarios, including an emerging deployment option: HCI as a service.Conventional HCI combines servers, storage and network resources into a single box, providing adopters with a gateway to simplified, centralized data-center management. HCI as a service (HCIaaS) ups the ante by enabling data-center operators to adopt HCI in a manner that promises to reduce both operational and financial overhead.Several HCI vendors, including VMware, Nutanix, Dell, and HPE, offer a managed service option, says Naveen Chhabra, a senior analyst at IT research firm Forrester. "It basically turns the capital expenditure and one-time investment into an [operating expense]," Chhabra says. "In most cases, the vendor will also manage the HCI's day-to-day operations."To read this article in full, please click here
Ceridian is betting on hybrid cloud, network virtualization and automation as it aims to improve IT service delivery, weed out inefficiencies and bolster security.The human capital management (HCM) company recently completed its transition to a cloud architecture, shuttering its on-premises data centers and migrating its applications and back-office systems to multiple clouds. "We are a true consumer of hybrid cloud technology," says CIO Warren Perlman. "We have operations in both [VMware Cloud on AWS] as well as native AWS, and also native Azure."To read this article in full, please click here
Ceridian is betting on hybrid cloud, network virtualization and automation as it aims to improve IT service delivery, weed out inefficiencies and bolster security.The human capital management (HCM) company recently completed its transition to a cloud architecture, shuttering its on-premises data centers and migrating its applications and back-office systems to multiple clouds. "We are a true consumer of hybrid cloud technology," says CIO Warren Perlman. "We have operations in both [VMware Cloud on AWS] as well as native AWS, and also native Azure."To read this article in full, please click here
Ceridian is betting on hybrid cloud, network virtualization and automation as it aims to improve IT service delivery, weed out inefficiencies and bolster security.The human capital management (HCM) company recently completed its transition to a cloud architecture, shuttering its on-premises data centers and migrating its applications and back-office systems to multiple clouds. "We are a true consumer of hybrid cloud technology," says CIO Warren Perlman. "We have operations in both [VMware Cloud on AWS] as well as native AWS, and also native Azure."To read this article in full, please click here
Network telemetry is far from new, but its importance is growing as data volume and network size relentlessly snowball. Streaming network telemetry gathers operational data from various network devices, combines the information, and then forwards it for inspection and study.Growing scale and the increasing use of automation in next-generation enterprise networks require a modern, more efficient approach to network data capture and analytics, says Bo Lane, vice president of global engineering for Kudelski Security, a cybersecurity technology provider. "Streaming telemetry allows enterprises to track network state, identify network problems and optimize network performance," Lane says. "In modern software-defined networks, problems or bottlenecks may be identified and autonomously remediated in near-real time."To read this article in full, please click here
Times have changed, with more employees working from home. Has your enterprise's remote access policy kept pace with the arrival of new users, tasks, access technologies, and threats?
Interest in microsegmentation is growing rapidly. Vendors are stepping forward to help enterprises update their infrastructure security to prevent catastrophic intrusions and data thefts. Here's a look at three microsegmentation market players, showing what they offer, how they work and the ways they differ.
READ MORE: How microsegmentation architectures differ | 3 early adopter stories | Defining microsegmentationTo read this article in full, please click here
It's a network jungle these days with predators relentlessly searching for ways to infiltrate corporate resources. IT leaders are responding with a variety of different microsegmentation approaches, all designed to isolate workloads from each other and prevent unauthorized lateral movements. We asked three enterprises to share why they deployed microsegmentation technology in their networks and how it's working. Here are their stories.Distributed firewalls via VMware NSX
Todd Pugh, CIO at food products manufacturer SugarCreek, manages a fully virtualized private data center. Like his counterparts at organizations worldwide, his goal is simple: to frustrate and deter network attackers. "Above all, we protect our databases," he says. "We do anything and everything to keep uninvited guests out of our databases."To read this article in full, please click here
It's a network jungle these days with predators relentlessly searching for ways to infiltrate corporate resources. IT leaders are responding with a variety of different microsegmentation approaches, all designed to isolate workloads from each other and prevent unauthorized lateral movements. We asked three enterprises to share why they deployed microsegmentation technology in their networks and how it's working. Here are their stories.Distributed firewalls via VMware NSX
Todd Pugh, CIO at food products manufacturer SugarCreek, manages a fully virtualized private data center. Like his counterparts at organizations worldwide, his goal is simple: to frustrate and deter network attackers. "Above all, we protect our databases," he says. "We do anything and everything to keep uninvited guests out of our databases."To read this article in full, please click here(Insider Story)
It's a network jungle these days with predators relentlessly searching for ways to infiltrate corporate resources. IT leaders are responding with a variety of different microsegmentation approaches, all designed to isolate workloads from each other and prevent unauthorized lateral movements. We asked three enterprises to share why they deployed microsegmentation technology in their networks and how it's working. Here are their stories.Distributed firewalls via VMware NSX
Todd Pugh, CIO at food products manufacturer SugarCreek, manages a fully virtualized private data center. Like his counterparts at organizations worldwide, his goal is simple: to frustrate and deter network attackers. "Above all, we protect our databases," he says. "We do anything and everything to keep uninvited guests out of our databases."To read this article in full, please click here
Despite a string of improvements over the past several years, enterprises can no longer rely on perimeter defenses alone to keep out network attackers. Microsegmentation directly addresses the challenge of unauthorized lateral movements by dividing IT environments into controllable compartments, enabling adopters to securely isolate workloads from each other while making network protection more granular. As cyber-attackers continue to try new ways to dodge security measures and roam across IT environments, microsegmentation is moving into the mainstream.To read this article in full, please click here
Despite a string of improvements over the past several years, enterprises can no longer rely on perimeter defenses alone to keep out network attackers. Microsegmentation directly addresses the challenge of unauthorized lateral movements by dividing IT environments into controllable compartments, enabling adopters to securely isolate workloads from each other while making network protection more granular. As cyber-attackers continue to try new ways to dodge security measures and roam across IT environments, microsegmentation is moving into the mainstream.To read this article in full, please click here
Containers have emerged over the past several years to provide an efficient method of storing and delivering applications reliably across different computing environments. By containerizing an application platform and its dependencies, differences in OS distributions and underlying infrastructures are abstracted away. Networking has emerged as a critical element within the container ecosystem, providing connectivity between containers running on the same host as well as on different hosts, says Michael Letourneau, an IT architect at Liberty Mutual Insurance. "Putting an application into a container automatically drives the need for network connectivity for that container," says Letourneau, whose primary focus is on building and operating Liberty Mutual's container platform. To read this article in full, please click here