The Virtualization Practice

1149 search results for "vmware"

Checking Out The Possibilities Of A Storage Cloud Platform With Atmos and Panzura

Checking out the possibilities of a storage cloud platform with Atmos and Panzura: The advancement, acceptance and continued growing use of the public cloud storage and backup services gives us, the end users, options and capabilities that we just did not have available to us before the birth of the cloud. How many times have we used services like Drop Box to move, share or store some form a data that we might been working on. Having this kind of capability really helps to make our lives easier but is also a nightmare of corporate security folks whose job is to protect and secure the corporate data.

SDDC.Management.Stack.Reference.Architecture

Legacy management frameworks are going to get replaced by SDDC Management Platforms that combine big data back ends, analytics and ecosystem friendly data collection and integration strategies to give customers the best of both worlds. Customers will be able to choose from among best of breed solutions, and then integrate them at the data level via a big data back end data store. This will revolutionize the management software industry, give rise to a new set of leaders in this industry, and completely destroy the legacy management frameworks.

When it comes to the secure hybrid cloud, Identity has many different definitions from a device a user is using to the combination device, location, password, and other multi-factor authentication means. Even with all the technology there is still the question of where the identity store lives (the bits that contain the identity for all users, devices, etc.) as well as how do you prove identity once the user goes somewhere within the cloud which is outside your control?

SDDC.Management.Stack.Reference.Architecture

The handwriting is on the wall. Managing the SDDC and the cloud will upend the management software industry. BMC has been taken private because it has to go through changes to adapt to the new world that cannot be done as a public company. IBM’s revenues have declined for five straight quarters. CA has resorted to lawsuits against vendors (New Relic and AppDynamics) that have out innovated CA, and who are walking away with the new APM market.

When we look at the secure hybrid cloud, the entry point to the hybrid cloud is the end user computing device, whether that device is a tablet, smart phone, desktop, laptop, google glass, watch, etc. We enter our hybrid cloud from this device. From there we spread out to other clouds within our control, clouds outside our control, or to data centers. How these devices authenticate and access the data within these various places within the hybrid cloud becomes a matter of great importance and has been a concentration for many companies. How we protect the data that ends up on the end user computing device is also of great importance.

Data Protection for the Hybrid Cloud

In many cases, when we mention Data Protection for the Hybrid Cloud, we are usually talking about backing up to the cloud. The cloud becomes a repository of our backup images and in some cases those backup images can be launched within clouds that use the same technology. Being able to send data to the cloud is becoming table stakes for infrastructure as a service (IaaS) data protection. However, once we move outside the realm of IaaS to Platform or Software as a Service (PaaS or SaaS), data protection is hit or miss.

Securing the Hybrid Cloud

The secure hybrid cloud encompasses a complex environment with a complex set of security requirements spanning the data center (or data closet), end user computing devices, and various cloud services. The entry point to the entire hybrid cloud is some form of End User Computing device whether that is a smart phone, tablet, laptop, or even a desktop computer. Once you enter the hybrid cloud, you may be taken to a cloud service or to your data center. The goal is to understand how the data flows through out this environment in order to properly secure it and therefore secure the hybrid cloud, but since it is a complex environment, we need a simpler way to view this environment.