There seems to be a new business model appearing: Split the company. Symantec has done this, and now HP. IBM did it by selling off a great chunk of its server line to Lenovo. Cisco did it by divesting itself of ownership of VCE. What is telling is that there is a growing number of large companies splitting rather noisily, all for the same official purpose: to concentrate on core competencies in whatever areas the split resolves into. But this may be a misrepresentation. At least from the outside, it looks like it will be. Continue reading The Great Split Business Model
Veeam has successfully fended off a patent infringement suit brought by Symantec over how Veeam does its backups. Yet, Symantec did not bring a suit against VMware, which created the underlying technology that Veeam employs for pulling data from a vSphere environment. When you look at the court case, it is about older technology and older patents, not Veeam’s latest innovations. I found this rather interesting—that instead of going after VMware, Symantec tried to sue the little guy out of existence. We all know this is not the first time someone has tried to do that.
Backup, disaster recovery, and business continuity have changed quite a bit over the years, and they will continue to change into the future as more capability, analytics, and functionality are added to the general family of data protection tools. As we launch ourselves into the clouds, we need to perhaps rethink how we do data protection, what tools are available for data protection, and how to use our older tools to accomplish the same goals. We need an integrated data protection plan that not only accounts for cloud or data center failures but also accounts for the need to run within the cloud. There is always the need to get your data there and back again. Continue reading The Face of the New Backup
Recently I have had the pleasure of discussing security with a number of cloud providers. Specifically, we talked about what security they implement and how they inform their tenants of security-related issues. In other words, do they provide transparency? I have come to an early conclusion that there are two types of clouds out there: those that provide additional security measures and work with their tenants to improve security, and those who do not. On the Virtualization Security podcast we have discussed this many times, with the conclusion being drawn that many clouds do a better job at security than the average organization does, but that there is no way to know what is implemented, as there is no transparency. Continue reading A Tale of Two Clouds
HyTrust released version 3.5 of their virtualization security proxy and compliance tool. This tool is core to a growing ecosystem of partners and systems. HyTrust has also expanded its role within the secure hybrid cloud by covering more of what is traditionally part of the data center. HyTrust is a proxy that sits between an administrator and sensitive systems by providing both advanced role-based access controls and advanced logging. With HyTrust fronting your VMware vSphere environment, HP ILO, Cisco UCS UIM, and Nexus Switches, administrators gain a fine-grained level of control over actions, improved logging in these environments, and the ability to vault critical passwords. With HyTrust there is no need to share passwords, but there is a need for robust control of an Active Directory environment. Continue reading HyTrust Expanding Role in Secure Hybrid Cloud
When we look at the secure hybrid cloud, the entry point to the hybrid cloud is the end user computing device, whether that device is a tablet, smart phone, desktop, laptop, google glass, watch, etc. We enter our hybrid cloud from this device. From there we spread out to other clouds within our control, clouds outside our control, or to data centers. How these devices authenticate and access the data within these various places within the hybrid cloud becomes a matter of great importance and has been a concentration for many companies. How we protect the data that ends up on the end user computing device is also of great importance. Continue reading End User Computing within the Secure Hybrid Cloud