Logo
Categories
Cloud Computing

Google Announces Availability of Cloud Monitoring Services

As a result of last year’s acquisition of Stackdriver, Google has released new cloud tracking and monitoring tool.

Categories
Cloud Computing

NTT Communications to Cloud Security Services with Fortinet

NTT Communications will provide one-stop service combining software security appliance and managed security.

Categories
Cloud Computing

Do the Benefits of Cloud Storage Outweigh the Risks?

Although the debate about the security and value of using the cloud rages on, experts like David Linthicum believe that clouds generally offer more security than traditional systems.

Categories
Cloud Computing

Should You Dial-in to the Cloud?

One of the main reasons why you should consider implementing a Cloud phone system is because it can significantly increase your business productivity.

Categories
Cloud Computing

IBM Redefines Storage Economics with New Software

Intelligent Software Allows Clients to Move All Data Types To The Right Storage to Help Optimize Cost, Performance and Security.

Categories
Cloud Computing

Move These 3 Parts of Your Business to the Cloud

The transition from physical storage and traditional systems to Web-based operations happens gradually due to the time and resources it requires. So, if you are deciding what to move to the cloud next, read on for some advice.

Categories
Cloud Computing

Docker Expands Broadest Orchestration Ecosystem to Ensure Distributed Application Portability

First downloadable versions of orchestration toolset highlight collaborators including AWS, Google, IBM, Joyent, Mesosphere, Microsoft and VMware.

Categories
Cloud Computing

Red Hat Launches Red Hat Enterprise Linux 7 Atomic Host

Red Hat, Inc., provider of open source solutions, has announced the general availability of Red Hat Enterprise Linux 7 Atomic Host, an operating system optimized for running the next generation of applications with Linux containers. Red Hat Enterprise Linux 7 Atomic Host provides all of the components necessary to easily package and run applications written for Red Hat Enterprise Linux 6 and 7 as containers.

As monolithic stacks give way to applications comprised of microservices, a container-based architecture can help enterprises to more fully realize the benefits of this more nimble, composable approach. Based on the world’s leading enterprise Linux platform, Red Hat Enterprise Linux 7 Atomic Host enables enterprises to embrace a container-based architecture, reaping the benefits of development and deployment flexibility and simplified maintenance, without sacrificing performance, stability, security, or the value of Red Hat’s vast certified ecosystem.

An application architecture based on Linux containers requires not only the tools to build and run containers, but also an underlying foundation that is secure, reliable, and enterprise-grade, with an established lifecycle designed to meet the ongoing requirements of the enterprise over the long term. These requirements include mitigation of security concerns, ongoing product enhancements, proactive diagnostics, and access to support. Red Hat is committed to offering enterprises a complete and integrated container-based infrastructure solution, combining container-based application packaging with robust, optimized infrastructure that will enable easy movement of Red Hat Enterprise Linux-certified applications across bare metal systems, virtual machines and private and public clouds – all of this with the product and security lifecycle that enterprise customers require. The release of Red Hat Enterprise Linux 7 Atomic Host delivers on Red Hat’s intent to make Linux containers a stable and reliable component of enterprise IT across the open hybrid cloud.

The Enterprise-Ready Container Host

Specifically designed to run Linux containers, Red Hat Enterprise Linux Atomic Host delivers only the operating system components required to run a containerized application, reducing overhead and simplifying maintenance. Because Red Hat Enterprise Linux 7 Atomic Host is built from Red Hat Enterprise Linux 7, it inherits Red Hat Enterprise Linux 7’s stability and maturity, as well as its vast ecosystem of certified hardware partners.

Security is always a top enterprise priority, but the security properties of containers – including the ability to maintain security across a container’s lifecycle – have raised additional questions. To address container security and lifecycle concerns, Red Hat Enterprise Linux Atomic Host offers automated security updates on-demand, bringing enterprise customers the support and lifecycle benefits that come with Red Hat Enterprise Linux in a reduced image size. From Heartbleed and Shellshock to Ghost and beyond, Red Hat customers receive security notifications and product updates as they are available and also have access to security tools that address container reliability and security. This is a benefit Red Hat uniquely brings to container deployments for enterprise customers.

For building and maintaining container infrastructure, Red Hat Enterprise Linux 7 Atomic Host provides many benefits, including:

  • Atomic updating and rollback through an image-like update mechanism. An atomic update can be downloaded and deployed in a single step, while the previous version is retained, allowing for easy atomic rollback, if necessary.
  • Container images in docker format can be deployed and run as application containers.
  • Certification and support, along with a chain of trust for containers built using platform images provided by Red Hat, such as Red Hat Enterprise Linux 6 and 7 and certified containers from Red Hat’s independent software vendor (ISV) partners.
  • Container orchestration at scale through Kubernetes, creating large-scale business applications from discrete services deployed in containers across clusters of Red Hat Enterprise Linux 7 Atomic Host.
  • Stronger security by default through SELinux, cgroups and kernel namespaces, isolating each container in a multi-container environment.
  • Support for super-privileged containers enables host management applications to access the host and other containers in a secure manner. This specialized container provides users with the means to install third party software and the atomic command inherent to Red Hat Enterprise Linux 7 Atomic Host makes creating and running super privileged containers dramatically easier.
  • Application portability across the open hybrid cloud by leveraging Red Hat’s vast certified ecosystem, enabling secure, stable container deployments on physical hardware, on certified hypervisors including Red Hat Enterprise Virtualization, VMware and Microsoft Hyper-V, and on certified public cloud services like Amazon Web Services and Google Cloud Platform.
  • Categories
    Cloud Computing

    Dell Cloud Access Manager 8.0 Enables Secure and Convenient Application Access

    Dell has announced the release of Dell One Identity Cloud Access Manager 8.0, which leverages Dell’s new Security Analytics Engine to give organizations control of web-based applications and OpenID Connect-compliant mobile application access activities within the organization. This control improves security and enables easier, appropriate access across a wide range of application types and access scenarios. Adding new social and mobile authentication capabilities, Cloud Access Manager gives users secure and convenient access to the broadest range of both legacy and emerging applications, while providing IT with the security and control it requires.

    Cloud Access Manager 8.0 addresses a number of customer pain points. Organizations today typically have a highly diverse user population as well as partners and customers who require access but are completely outside of IT’s control. All of these users require instant, always-on access to a variety of applications – on-premises, cloud-based and mobile – and IT must be able to provide this access with unparalleled security that enhances business agility, while still protecting critical corporate assets and data.

    The evolution of both the user and the application requires an evolution in the way organizations approach access management and security. They must switch from traditional approaches addressing point-in-time risk and security implemented in silos, to an adaptive approach focusing on contextual security that ensures access is appropriate in real-time, while moving security from a productivity barrier to a business enabler.

    Cloud Access Manager provides unified single sign-on that includes federation and legacy authentication types, along with the capabilities of Dell’s Security Analytics Engine to execute security in context – the “who, what, where, how, and why” of access activities – and adjust enforcement to ideally suit the situation. Dell’s Security Analytics Engine correlates this contextual information with enforcement capabilities to make all access appropriate every time, all the time, and without hindering productivity for an ever-evolving user who continues to access applications in new and more complex ways. New features in Cloud Access Manager 8.0 include:

  • Security Analytics Engine: Performs run-time risk evaluations that help companies scale security based on situational context, ensuring appropriate access for the right situations at the right time. Included with Cloud Access Manager 8.0 at no extra charge
  • Social Authentication: Further addresses user password fatigue for customers who wish to enable single sign-on through a user’s social media properties, including Google, Microsoft Live ID, Facebook and Twitter
  • OpenID Connect Protocol Support: Enables support for modern web and mobile applications using this next-generation identity protocol based on OAuth 2.0
  • Microsoft Certification: Cloud Access Manager has been validated by Microsoft as part of their “Works with Office 365” Identity Partner Program
  • Categories
    Cloud Computing

    Wipro Launches Boundary Less Data Center Solution

    Wipro Ltd. has announced the launch of a Boundary Less Data Center Solution (BLDC), based upon a software-defined data center architecture, powered by VMware, a leader in cloud infrastructure and business mobility. This solution enables enterprises to be competitive by reducing time to market, driving business agility and scale.

    The Boundary Less Data Center offering is based on an innovative IT transformational approach that is workload centric, software-defined, and hyper resilient. This helps enterprises to extend the capabilities of their traditional enterprise data centers into a scalable hybrid IT. BLDC offers transformative analytics to gain insights from enterprise assets and workloads, evaluates IT resiliency and provides a technology blueprint to maximize the business value of IT investments for customers. Wipro’s industrialized workload migration approach coupled with its ServiceNXT™, next generation integrated Managed Services framework for Hybrid IT makes the transformation journey easy for its customers.

    In collaboration with its ecosystem of partners, Wipro will build industrialized repeatable solutions based on the standard reference architectures and cloud blueprints for enterprises and new workloads on the next generation data center architecture.

    The reference architecture will include virtualized compute, networking and storage utilizing VMware vSphere®, VMware NSX™, VMware Virtual SAN™ and VMware vRealize™ Suite.

    Wipro currently offers this service from its data centers in the US and Europe, and from its customers’ on-premises data centers, with a roadmap to launch this service in emerging geographies later this year. Wipro’s customers will have access to run use cases and proof of concepts from the Wipro Centers of Excellence in India and USA.

    “Boundary Less Data Center is a new paradigm which helps enterprises accelerate their IT transformation. This offering will enable organizations to scale Data Center capabilities beyond the traditional IT boundaries to achieve the right business outcomes, and that is very exciting,” said G K Prasanna Chief Executive, Global Infrastructure Services, Wipro Limited.

    “VMware has a strong relationship with Wipro, which spans multiple VMware technologies. Our partnership is further strengthened with Wipro’s next generation services around the Boundary Less Data Center, which is designed to empower customers to experience the agility and flexibility benefits of the software-defined data center,” said Todd Surdey, Vice President, Strategic Alliances and Emerging Partners, VMware.