Drone analytics company crunches bunches of IoT data in the cloud

A single Internet of Things-connected device is nice, but two or three put together are better. That is, the data each device collects yields smarter insights when analyzed together. But crunching many converged data streams at once can strain ordinary data centers’ compute power. May research from Cisco Systems Inc. breaks down the struggle in numbers: 73 percent of surveyed businesses are implementing IoT strategies, and 60 percent say that execution is generally more difficult than expected. One company we spoke with commercial drone software analytics provider Airware Inc. says that storing and computing all data in the cloud makes IoT analytics easier.

Spotlight

Internetwork Engineering

Since 1996, IE has been connecting people to their customers, coworkers, suppliers, patients, citizens, and students throughout the Southeast, creating more meaningful interactions with the people you care about most. Founded in Charlotte, NC, Internetwork Engineering (IE) is a strategic solution provider offering mid-market and enterprise clients consulting, implementation and operational services in four validated architectures: Collaboration, Data Center, Intelligent Networks, and Security. It's through the perfect combination of people, partners, and process that IE delivers customized technology solutions that align with business goals to accelerate business transformation.

OTHER ARTICLES
Hyper-Converged Infrastructure

WIRELESS DATA CENTERS AND CLOUD COMPUTING

Article | October 3, 2023

One of the most exciting areas of Vubiq Network’s innovative millimeter wave technology is in the application of ultra high-speed, short-range communications as applied to solving the scaling constraints and costs for internal data center connectivity and switching. Today’s limits of cabled and centralized switching architectures are eliminated by leveraging the wide bandwidths of the millimeter wave spectrum for the high-density communications requirements inside the modern data center. Our patented technology has the ability to provide more than one terabit per second of wireless uplink capacity from a single server rack through an innovative approach to create a millimeter wave massive mesh network. The elimination of all inter-rack cabling – as well as the elimination of all aggregation and core switches – is combined with higher throughput, lower latency, lower power, higher reliability, and lower cost by using millimeter wave wireless connectivity.

Read More
Hyper-Converged Infrastructure, Application Infrastructure

Accelerating DevOps and Continuous Delivery with IaaS Virtualization

Article | July 19, 2023

Adopting DevOps and CD in IaaS environments is a strategic imperative for organizations seeking to achieve agility, competitiveness, and customer satisfaction in their software delivery processes. Contents 1. Introduction 2. What is IaaS Virtualization? 3. Virtualization Techniques for DevOps and Continuous Delivery 4. Integration of IaaS with CI/CD Pipelines 5. Considerations in IaaS Virtualized Environments 5.1. CPU Swap Wait 5.2. CPU System/Wait Time for VKernel: 5.3. Memory Balloon 5.4.Memory Swap Rate: 5.5. Memory Usage: 5.6. Disk/Network Latency: 6. Industry tips for IaaS Virtualization Implementation 6.1. Infrastructure Testing 6.2. ApplicationTesting 6.3. Security Monitoring 6.4. Performance Monitoring 6.5. Cost Optimization 7. Conclusion 1. Introduction Infrastructure as a Service (IaaS) virtualization presents significant advantages for organizations seeking to enhance their agility, flexibility, and speed to market within the DevOps and continuous delivery frameworks. Addressing the associated risks and challenges is crucial and can be achieved by employing the appropriate monitoring and testing techniques, enlisted further, in this blog. IaaS virtualization allows organizations to provision and de-provision resources as needed, eliminating the need for long-term investments in hardware and data centers. Furthermore, IaaS virtualization offers the ability to operate with multiple operating systems, databases, and programming languages, empowering teams to select the tools and technologies that best suit their requirements. However, organizations must implement comprehensive testing and monitoring strategies, ensure proper security and compliance controls, and adopt the best resource optimization and management practices to leverage the full potential of virtualized IaaS. To achieve high availability and fault tolerance along with advanced networking, enabling complex application architectures in IaaS virtualization, the blog mentions five industry tips. 2. What is IaaS Virtualization? IaaS virtualization involves simultaneously running multiple operating systems with different configurations. To run virtual machines on a system, a software layer known as the virtual machine monitor (VMM) or hypervisor is required. Virtualization in IaaS handles website hosting, application development and testing, disaster recovery, and data storage and backup. Startups and small businesses with limited IT resources and budgets can benefit greatly from virtualized IaaS, enabling them to provide the necessary infrastructure resources quickly and without significant capital expenditures. Virtualized IaaS is a potent tool for businesses and organizations of all sizes, enabling greater infrastructure resource flexibility, scalability, and efficiency. 3. Virtualization Techniques for DevOps and Continuous Delivery Virtualization is a vital part of the DevOps software stack. Virtualization in DevOps process allows teams to create, test, and implement code in simulated environments without wasting valuable computing resources. DevOps teams can use the virtual services for thorough testing, preventing bottlenecks that could slow down release time. It heavily relies on virtualization for building intricate cloud, API, and SOA systems. In addition, virtual machines benefit test-driven development (TDD) teams that prefer to begin their troubleshooting at the API level. 4. Integration of IaaS with CI/CD Pipelines Continuous integration is a coding practice that frequently implements small code changes and checks them into a version control repository. This process not only packages software and database components but also automatically executes unit tests and other tests to provide developers with vital feedback on any potential breakages caused by code changes. Continuous testing integrates automated tests into the CI/CD pipeline. For example, unit and functionality tests identify issues during continuous integration, while performance and security tests are executed after a build is delivered in continuous delivery. Continuous delivery is the process of automating the deployment of applications to one or more delivery environments. IaaS provides access to computing resources through a virtual server instance, which replicates the capabilities of an on-premise data center. It also offers various services, including server space, security, load balancing, and additional bandwidth. In modern software development and deployment, it's common to integrate IaaS with CI/CD pipelines. This helps automate the creation and management of infrastructure using infrastructure-as-code (IAC) tools. Templates can be created to provision resources on the IaaS platform, ensuring consistency and meeting software requirements. Additionally, containerization technologies like Docker and Kubernetes can deploy applications on IaaS platforms. 5. Considerations in IaaS Virtualized Environments 5.1. CPU Swap Wait The CPU swap wait is when the virtual system waits while the hypervisor swaps parts of the VM memory back in from the disk. This happens when the hypervisor needs to swap, which can be due to a lack of balloon drivers or a memory shortage. This can affect the application's response time. One can install the balloon driver and/or reduce the number of VMs on the physical machine to resolve this issue. 5.2. CPU System/Wait Time for VKernel Virtualization systems often report CPU or wait time for the virtualization kernel used by each virtual machine to measure CPU resource overhead. While this metric can't be directly linked to response time, it can impact both ready and swap times if it increases significantly. If this occurs, it could indicate that the system is either misconfigured or overloaded, and reducing the number of VMs on the machine may be necessary. 5.3. Memory Balloon Memory ballooning is a memory management technique used in virtualized IaaS environments. It works by injecting a software balloon into the VM's memory space. The balloon is designed to consume memory within the VM, causing it to request more memory from the hypervisor. As a result, if the host system is experiencing low memory, it will take memory from its virtual infrastructures, thus negatively affecting the guest's performance, causing swapping, reduced file-system buffers, and smaller system caches. 5.4. Memory Swap Rate Memory swap rate is a performance metric used in virtualized IaaS environments to measure the amount of memory being swapped to disk. When the swap rate is high, it leads to longer CPU swap times and negatively affects application performance. In addition, when a VM is running, it may require more memory than is physically available on the server. In such cases, the hypervisor may use disk space as a temporary storage area for excess memory. Therefore, to optimize, it is important to ensure that VMs have sufficient memory resources allocated. 5.5. Memory Usage Memory usage refers to the amount of memory being used by a VM at any given time. Memory usage is assessed by analyzing the host level, VM level, and granted memory. When memory usage exceeds the available physical memory on the server, the hypervisor may use disk space as a temporary storage area for excess memory, leading to performance issues. The disparity between used and granted memory indicates the overcommitment rate, which can be adjusted through ballooning. 5.6. Disk/Network Latency Some virtualization providers provide integrated utilities for assessing the latency of disks and network interfaces utilized by a virtual machine. Since latency directly affects response time, increased latency at the hypervisor level will also impact the application. An excessive amount of latency indicates the system is overloaded and requires reconfiguration. These metrics enable us to monitor and detect any negative impact a virtualized system might have on our application. 6. Industry tips for IaaS Virtualization Implementation Testing, compliance management and security arecritical aspects of managing virtualized IaaS environments . By implementing a comprehensive strategy, organizations ensure their infrastructure and applications' reliability, security, and performance. 6.1. Infrastructure Testing This involves testing the infrastructure components of the IaaS environment, such as the virtual machines, networks, and storage, aiming to ensure the infrastructure is functioning correctly and that there are no performance bottlenecks, security vulnerabilities, or configuration issues. Testing the virtualized environment, storage testing (testing data replication and backup and recovery processes), and network testing are some of the techniques to be performed. 6.2. Application Testing Applications running on the IaaS virtual environment should be thoroughly tested to ensure they perform as expected. This includes functional testing to ensure that the application meets its requirements and performance testing to ensure that the application can handle anticipated user loads. 6.3. Security Monitoring Security monitoring is critical in IaaS environments, owing to the increased risks and threats. This involves monitoring the infrastructure and applications for potential security threats, vulnerabilities, or breaches. In addition, regular vulnerability assessments and penetration testing help identify and address potential security issues before they become significant problems. 6.4. Performance Monitoring Performance monitoring is essential to ensuring that the underlying infrastructure meets performance expectations and has no performance bottlenecks. This comprises monitoring metrics such as CPU usage, memory usage, network traffic, and disk utilization. This information is used to identify performance issues and optimize resource usage. 6.5. Cost Optimization Cost optimization is a critical aspect of a virtualized IaaS environment with optimized efficiency and resource allocation. Organizations reduce costs and optimize resource usage by identifying and monitoring usage patterns and optimizing elastic and scalable resources. It involves right-sizing resources, utilizing infrastructure automation, reserved instances, spot instances (unused compute capacity purchased at a discount), and optimizing storage usage. 7. Conclusion IaaS virtualization has become a critical component of DevOps and continuous delivery practices. To rapidly develop, test, and deploy applications with greater agility and efficiency by providing on-demand access to scalable infrastructure resources to Devops teams, IaaS virtualization comes into picture. As DevOps teams continue to seek ways to streamline processes and improve efficiency, automation will play an increasingly important role. Automated deployment, testing, and monitoring processes will help reduce manual intervention and increase the speed and accuracy of development cycles. In addition, containers will offer a lightweight and flexible alternative to traditional virtualization, allowing DevOps teams to package applications and their dependencies into portable, self-contained units that can be easily moved between different environments. This can reduce the complexity of managing virtualized infrastructure environments and enable greater flexibility and scalability. By embracing these technologies and integrating them into their workflows, DevOps teams can achieve greater efficiency and accelerate their delivery of high-quality software products.

Read More
Application Infrastructure, Application Storage

Implementation of IaaS Container Security for Confidentiality and Integrity

Article | July 19, 2023

Containers have emerged as a choice for deploying and scaling applications, owing to their lightweight, isolated, and portable nature. However, the absence of robust security measures may expose containers to diverse threats, thereby compromising the confidentiality and integrity of data and apps. Contents 1 Introduction 2 IaaS Container Security Techniques 2.1 Container Image Security 2.2 Host Security 2.3 Network Security 2.4 Data Security 2.5 Identity and Access Management (IAM) 2.6 Runtime Container Security 2.7 Compliance and Auditing 3 Conclusion 1. Introduction Infrastructure as a Service has become an increasingly popular way of deploying and managing applications, and containerization has emerged as a leading technology for packaging and deploying these applications. Containers are software packages that include all the necessary components to operate in any environment. While containers offer numerous benefits, such as portability, scalability, and speed, they also introduce new security challenges that must be addressed. Implementing adequate IaaS container security requires a comprehensive approach encompassing multiple layers and techniques. This blog explores the critical components of IaaS container security. It provides an overview of the techniques and best practices for implementing security measures that ensure the confidentiality and integrity of containerized applications. By following these, organizations can leverage the benefits of IaaS and containerization while mitigating the security risks that come along. 2. IaaS Container Security Techniques The increasing IAAS security risks and security issues associated with IAAS these days are leading to a massive data breach. Thus, IAAS security concerns are taken into consideration, and seven best techniques are drafted below. 2.1. Container Image Security: Container images are the building blocks of containerized applications. Ensuring the security of these images is essential to prevent security threats. The following measures are used for container image security: Using secure registries: The registry is the location where container images are stored and distributed. Usage of centrally managed registries on campus, the International Organization for Standardization (ISO) can scan them for security issues and system managers may simply assess package gaps, etc. Signing images: Container images can be signed using digital signatures to ensure their authenticity. Signed images can be verified before being deployed to ensure they have not been tampered with. Scanning images: Although standard AppSec tools such as Software Composition Analysis (SCA) can check container images for vulnerabilities in software packages and dependencies, extra dependencies can be introduced during the development process or even at runtime. 2.2. Host Security: Host security is a collection of capabilities that provide a framework for implementing a variety of security solutions on hosts to prevent attacks. The underlying host infrastructure where containers are deployed must be secured. The following measures are used for host security: Using secure operating systems: The host operating system must be safe and up-to-date with the latest high severity security patches within 7 days of release, and others, within 30 days to prevent vulnerabilities and security issues. Applying security patches: Security patches must be applied to the host operating system and other software packages to fix vulnerabilities and prevent security threats. Hardening the host environment: The host environment must be hardened by disabling unnecessary services, limiting access to the host, and applying security policies to prevent unauthorized access. 2.3. Network Security: Network security involves securing the network traffic between containers and the outside world. The following measures are used for network security: Using Microsegmentation and firewalls: Microsegmentation tools with next-gen firewalls provide container network security. Microsegmentation software leverages network virtualization to build extremely granular security zones in data centers and cloud applications to isolate and safeguard each workload. Encryption: Encryption can protect network traffic and prevent eavesdropping and interception of data. Access control measures: Access control measures can restrict access to containerized applications based on user roles and responsibilities. 2.4. Data Security: Data stored in containers must be secured to ensure its confidentiality and integrity. The following measures are used for data security: Using encryption: Data stored in containers can be encrypted, using Transport Layer Security protocol version 1.1. (TLS 1.1) or higher, to protect it from unauthorized access and prevent data leaks. All outbound traffic from private cloud should be encrypted at the transport layer. Access control measures: Access control measures can restrict access to sensitive data in containers based on user roles and responsibilities. Not storing sensitive data in clear text: Sensitive data must not be stored in clear text within containers to prevent unauthorized access and data breaches. Backup app data, atleast weekly. 2.5. Identity and Access Management (IAM): IAM involves managing access to the container infrastructure and resources based on the roles and responsibilities of the users. The following measures are used for IAM: Implementing identity and access management solutions: IAM solutions can manage user identities, assign user roles and responsibilities, authenticate and provide access control policies. Multi-factor authentication: Multi-factor authentication can add an extra layer of security to the login process. Auditing capabilities: Auditing capabilities can monitor user activity and detect potential security threats. 2.6. Runtime Container Security: To keep its containers safe, businesses should employ a defense-in-depth strategy, as part of runtime protection. Malicious processes, files, and network activity that deviates from a baseline can be detected and blocked via runtime container security. Container runtime protection can give an extra layer of defense against malicious code on top of the network security provided by containerized next-generation firewalls. In addition, HTTP layer 7 based threats like the OWASP Top 10, denial of service (DoS), and bots can be prevented with embedded web application and API security. 2.7. Compliance and Auditing: Compliance and auditing ensure that the container infrastructure complies with relevant regulatory and industry standards. The following measures are used for compliance and auditing: Monitoring and auditing capabilities: Monitoring and auditing capabilities can detect and report cloud security incidents and violations. Compliance frameworks: Compliance frameworks can be used to ensure that the container infrastructure complies with relevant regulatory and industry standards, such as HIPAA, PCI DSS, and GDPR. Enabling data access logs on AWS S3 buckets containing high-risk Confidential Data is one such example. 3. Conclusion IaaS container security is critical for organizations that rely on containerization technology for deploying and managing their applications. There is likely to be an increased focus on the increased use of AI and ML to detect and respond to security incidents in real-time, the adoption of more advanced encryption techniques to protect data, and the integration of security measures into the entire application development lifecycle. In order to stay ahead of the challenges and ensure the continued security of containerized applications, the ongoing process of IaaS container security requires continuous attention and improvement. By prioritizing security and implementing effective measures, organizations can confidently leverage the benefits of containerization while maintaining the confidentiality and integrity of their applications and data.

Read More
Application Infrastructure

Why Should Your Business Utilize Infrastructure as a Service (IaaS)?

Article | August 3, 2022

Flexible data access, enhanced disaster recovery, and reduced infrastructure staff burden are some of the biggest reasons businesses migrate to innovative and reliable cloud technologies. Infrastructure-as-a-service or Iaas, is one such cloud computing model that has simplified the lives of enterprises and developers by reducing their infrastructure burden. Iaas gives you access to servers, networking, storage, and virtualization features. IaaS is fast becoming one of the biggest trends in cloud computing. According to Technavio's latest report, the IaaS market projects a growth of USD 141.77 billion, registering a CAGR of 28.2% from 2021 to 2026. “So many systems end up as a big dreaded ball of mud (which is totally preventable) when designing an enforceable architecture model.” Alexander von Zitzewitz, CEO, hello2morrow Inc. But, how can IaaS technology help you grow and advance your business? Here are some key advantages of switching to IaaS: Better Performance One of the more well-known benefits of IaaS is achieving a higher performance level from your infrastructure. Rather than worrying about the latest hardware for your infrastructure, with IaaS in place, your in-house IT team will be able to focus more on working on your business goals and objectives through technology. Because the SLA (Service Level Agreement) with your IaaS cloud service provider can ensure that you are getting the best performance from your cloud provider's infrastructure. An SLA will ensure that your cloud provider is accountable for continuous upgrades and the best possible service for your business. Decreased CapEx With IaaS technology, you can choose the IaaS cloud service provider of your choice. Typically, a cloud provider has a more reliable, robust, and redundant infrastructure setup than what would be feasible and financially realistic in an office environment. This means you can save on maintenance, purchase, and operating hardware-related business expenditures. Additionally, it also decreases your overall IT-related capital expenditure (CapEx). Increased Flexibility IaaS increases your scalability and flexibility exponentially. Your business can scale up and down as needed and on-demand. For example, say your business is hosting a short-term campaign to drive more traffic to your website. IaaS will automatically provision resources to ensure your business infrastructure is well equipped to handle the sudden incoming traffic boost. Scale- Up Your Business Additionally, IaaS gives your growing business the flexibility it needs from its IT infrastructure. For example, if you’re considering opening a new office in a different location, you don’t need to spend extra on new hardware; instead, you can directly connect to your infrastructure virtually. This means you don’t need to invest in additional infrastructure for business expansion continually. Managed-Task Virtualization As IaaS supports the virtualization of management tasks, your IT is free to concentrate on other, more thought-intensive work. This will not only drive more efficiency but also help boost ROI. Disaster Recovery During disasters like an earthquake or floods, IaaS ensures smooth business operations. Disaster Recovery as a Service (DRaaS) stores and replicates data in multiple data centers in different geographical locations. So even if a disaster or mishap causes significant damage to the data center, your IaaS providers can quickly restore the data from another data center. Conclusion IaaS allows your businesses to utilize the cloud to achieve your IT goals. It is flexible, scalable, reliable, cost-effective and provides seamless access to maximize business continuity. Therefore, you should choose a reliable IaaS cloud provider who can deliver a variety of cloud infrastructure solutions.

Read More

Spotlight

Internetwork Engineering

Since 1996, IE has been connecting people to their customers, coworkers, suppliers, patients, citizens, and students throughout the Southeast, creating more meaningful interactions with the people you care about most. Founded in Charlotte, NC, Internetwork Engineering (IE) is a strategic solution provider offering mid-market and enterprise clients consulting, implementation and operational services in four validated architectures: Collaboration, Data Center, Intelligent Networks, and Security. It's through the perfect combination of people, partners, and process that IE delivers customized technology solutions that align with business goals to accelerate business transformation.

Related News

Storage Management

SoftIron Recognized as a Sample Vendor in Gartner Hype Cycle for Edge Computing

GlobeNewswire | October 25, 2023

SoftIron, the worldwide leader in private cloud infrastructure, today announced it has been named as a Sample Vendor for the “Gartner Hype Cycle for Edge Computing, 2023.” Gartner Hype Cycle provides a view of how a technology or application will evolve over time, providing a sound source of insight to manage its deployment within the context of your specific business goals. The five phases of a Hype cycle are innovation trigger, Peak of Inflated Expectations, Trough of Disillusionment, Slope of Enlightenment and the Plateau of Productivity. SoftIron is recognized in the Gartner report as a Sample Vendor for Edge Storage and the report defines the technology as those that enable the creation, analysis, processing and delivery of data services at, or close to, the location where the data is generated or consumed, rather than in a centralized environment. Gartner predicts that infrastructure and operations (I&O) leaders are beginning the process of laying out a strategy for how they intend to manage data at the edge. Although I&O leaders embrace infrastructure as a service (IaaS) cloud providers, they also realize that a significant part of the infrastructure services will remain on-premises, and would require edge storage data services. Gartner Hype Cycles provide a graphic representation of the maturity and adoption of technologies and applications, and how they are potentially relevant to solving real business problems and exploiting new opportunities. Gartner Hype Cycle methodology gives you a view of how a technology or application will evolve over time, providing a sound source of insight to manage its deployment within the context of your specific business goals. The latest Gartner Hype Cycle analyzed 31 emerging technologies and included a Priority Matrix that provides perspective on the edge computing innovations that will have a bigger impact, and those that might take longer to fully mature. “We are excited to be recognized in the 2023 Garter Hype Cycle for Edge Computing,” said Jason Van der Schyff, COO at SoftIron. “We believe at SoftIron to be well positioned to help our customers address and take advantage of the latest trends and developments in Edge Computing as reported in Gartner’s Hype Cycle.”

Read More

Hyper-Converged Infrastructure

Colohouse Launches Dedicated Server and Hosting Offering for Data Center and Cloud Customers

Business Wire | October 05, 2023

Colohouse, a prominent data center colocation, cloud, dedicated server and services provider, is merging TurnKey Internet’s hosting and dedicated server offering into the Colohouse brand and services portfolio. This strategic move comes from TurnKey Internet’s acquisition in 2021 to align with Colohouse’s broader compute, connectivity and cloud strategy. With the integration of dedicated servers and hosting services into its core brand portfolio, Colohouse aims to enhance its ability to meet the diverse needs of its growing customer base. Including TurnKey Internet’s servers and services is a testament to Colohouse’s dedication to delivering comprehensive and impactful solutions for its customers and prospects in key markets and edge locations. Colohouse will begin offering hosting services immediately available on www.colohouse.com Products: dedicated bare metal servers, enterprise series dedicated servers, cloud VPS servers, control panel offerings and licensing Colohouse’s dedicated servers will be available in these data centers: Miami, FL, Colorado Springs, CO, Chicago, IL, Orangeburg, NY, Albany, NY and Amsterdam, The Netherlands. Client Center: The support team will be available to assist customers 24/7/365 through a single support portal online, or via email and phone, as well as Live Chat through colohouse.com Compliance and security are a top priority for Colohouse’s customers. In fall of 2023, Colohouse will have its first combined SOC audit for all of its data center locations, including dedicated servers and hosting. This will be available for request on its website upon completion of the audit. When I accepted the job of CEO at Colohouse, my vision was, and still is, to build a single platform company that provides core infrastructure but also extends past just colocation, cloud, or bare metal. We recognize that businesses today require flexible options to address their IT infrastructure needs. This is a step for us to create an ecosystem within Colohouse that gives our customers room to test their applications instantly or have a solution for backups and migrations with the same provider. The same provider that knows the nuances of a customer's IT infrastructure, like colocation or cloud, can also advise or assist that same customer with alternative solutions that enhance their overall IT infrastructure, shared Jeremy Pease, CEO of Colohouse. Jeremy further added, “The customer journey and experience is our top priority. Consolidating the brands into Colohouse removes confusion about the breadth of our offerings. Our capability to provide colocation, cloud, and hosting services supports our customers’ growing demand for infrastructure that can be optimized for cost, performance and security. This move also consolidates our internal functions, which will continue to improve the customer experience at all levels.” All products are currently available on colohouse.com. TurnKey Internet customers will not be impacted by transitioning from the TurnKey Internet to Colohouse. All Colohouse and TurnKey Internet customers will continue to receive the industry's best service and support. Colohouse will be launching its first-ever “Black Friday Sale” for all dedicated servers and hosting solutions. TurnKey Internet’s customers have incorporated this annual sale in their project planning and budget cycles to take advantage of the price breaks. The sale will begin in mid-November on colohouse.com. About Colohouse Colohouse provides a digital foundation that connects our customers with impactful technology solutions and services. Our managed data center and cloud infrastructure paired with key edge locations and reliable connectivity allow our customers to confidently scale their application and data while optimizing for cost, performance, and security. To learn more about Colohouse, please visit: https://colohouse.com/.

Read More

Hyper-Converged Infrastructure

Tenable Completes Acquisition of Ermetic

GlobeNewswire | October 03, 2023

Tenable® Holdings, Inc., the Exposure Management company, today announced it has closed its acquisition of Ermetic, Ltd. (“Ermetic”), an innovative cloud-native application protection platform (CNAPP) company, and a leading provider of cloud infrastructure entitlement management (CIEM). The acquisition combines two cybersecurity innovators and marks an important milestone in Tenable’s mission to shift organizations to proactive security. The combination of Tenable and Ermetic offerings will add capabilities to both the Tenable One Exposure Management Platform and the Tenable Cloud Security solution to deliver market-leading contextual risk visibility, prioritization and remediation across infrastructure and identities, both on-premises and in the cloud. With unified CNAPP, iron-clad CSPM protection, and industry-leading CIEM, security teams receive the context and prioritization guidance to make efficient and accurate remediation decisions. Security teams will no longer need to be cloud security experts to understand where the most urgent risks exist and what to do about them. Tenable and Ermetic together will help organizations address some of the most difficult challenges in cybersecurity today: Simplifying security management to meet the increasing demands of cloud infrastructure growth Reducing the risk caused by an explosion in volume of user and machine identities in the cloud Understanding the complex relationships and risks across all assets and identities The unique combination of Tenable and Ermetic will give customers tightly integrated CNAPP capabilities for cloud environments, delivered through an elegant user experience that minimizes complexity and speeds adoption, said Amit Yoran, chairman and chief executive officer, Tenable. We’re delivering unparalleled insights into identities and access, which are absolutely critical to securing cloud environments. And with the integration of insights from Tenable One, customers can also consolidate, simplify and reduce costs. The Tenable One Exposure Management Platform enables customers to gain a more complete, accurate and actionable view of their attack surface. Exposure management shifts preventive security from securing technology silos to applying contextual risk intelligence to protect the business. The acquisition of Ermetic accelerates this shift for Tenable customers, adding a depth of cloud security expertise and capabilities that provide context to prioritize risk and simplify remediation. Ermetic adds analytical strength to ExposureAI, more contextual relationships and deep data insights to make Tenable One an even more effective platform for preventive security. Ermetic will also expand and augment Tenable Cloud Security, which enables security teams to continuously assess the security posture of cloud environments, offering full visibility and helping to prioritize efforts based on business risk. About Tenable Tenable® is the Exposure Management company. Approximately 43,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include approximately 60 percent of the Fortune 500, approximately 40 percent of the Global 2000, and large government agencies. Learn more at tenable.com.

Read More

Storage Management

SoftIron Recognized as a Sample Vendor in Gartner Hype Cycle for Edge Computing

GlobeNewswire | October 25, 2023

SoftIron, the worldwide leader in private cloud infrastructure, today announced it has been named as a Sample Vendor for the “Gartner Hype Cycle for Edge Computing, 2023.” Gartner Hype Cycle provides a view of how a technology or application will evolve over time, providing a sound source of insight to manage its deployment within the context of your specific business goals. The five phases of a Hype cycle are innovation trigger, Peak of Inflated Expectations, Trough of Disillusionment, Slope of Enlightenment and the Plateau of Productivity. SoftIron is recognized in the Gartner report as a Sample Vendor for Edge Storage and the report defines the technology as those that enable the creation, analysis, processing and delivery of data services at, or close to, the location where the data is generated or consumed, rather than in a centralized environment. Gartner predicts that infrastructure and operations (I&O) leaders are beginning the process of laying out a strategy for how they intend to manage data at the edge. Although I&O leaders embrace infrastructure as a service (IaaS) cloud providers, they also realize that a significant part of the infrastructure services will remain on-premises, and would require edge storage data services. Gartner Hype Cycles provide a graphic representation of the maturity and adoption of technologies and applications, and how they are potentially relevant to solving real business problems and exploiting new opportunities. Gartner Hype Cycle methodology gives you a view of how a technology or application will evolve over time, providing a sound source of insight to manage its deployment within the context of your specific business goals. The latest Gartner Hype Cycle analyzed 31 emerging technologies and included a Priority Matrix that provides perspective on the edge computing innovations that will have a bigger impact, and those that might take longer to fully mature. “We are excited to be recognized in the 2023 Garter Hype Cycle for Edge Computing,” said Jason Van der Schyff, COO at SoftIron. “We believe at SoftIron to be well positioned to help our customers address and take advantage of the latest trends and developments in Edge Computing as reported in Gartner’s Hype Cycle.”

Read More

Hyper-Converged Infrastructure

Colohouse Launches Dedicated Server and Hosting Offering for Data Center and Cloud Customers

Business Wire | October 05, 2023

Colohouse, a prominent data center colocation, cloud, dedicated server and services provider, is merging TurnKey Internet’s hosting and dedicated server offering into the Colohouse brand and services portfolio. This strategic move comes from TurnKey Internet’s acquisition in 2021 to align with Colohouse’s broader compute, connectivity and cloud strategy. With the integration of dedicated servers and hosting services into its core brand portfolio, Colohouse aims to enhance its ability to meet the diverse needs of its growing customer base. Including TurnKey Internet’s servers and services is a testament to Colohouse’s dedication to delivering comprehensive and impactful solutions for its customers and prospects in key markets and edge locations. Colohouse will begin offering hosting services immediately available on www.colohouse.com Products: dedicated bare metal servers, enterprise series dedicated servers, cloud VPS servers, control panel offerings and licensing Colohouse’s dedicated servers will be available in these data centers: Miami, FL, Colorado Springs, CO, Chicago, IL, Orangeburg, NY, Albany, NY and Amsterdam, The Netherlands. Client Center: The support team will be available to assist customers 24/7/365 through a single support portal online, or via email and phone, as well as Live Chat through colohouse.com Compliance and security are a top priority for Colohouse’s customers. In fall of 2023, Colohouse will have its first combined SOC audit for all of its data center locations, including dedicated servers and hosting. This will be available for request on its website upon completion of the audit. When I accepted the job of CEO at Colohouse, my vision was, and still is, to build a single platform company that provides core infrastructure but also extends past just colocation, cloud, or bare metal. We recognize that businesses today require flexible options to address their IT infrastructure needs. This is a step for us to create an ecosystem within Colohouse that gives our customers room to test their applications instantly or have a solution for backups and migrations with the same provider. The same provider that knows the nuances of a customer's IT infrastructure, like colocation or cloud, can also advise or assist that same customer with alternative solutions that enhance their overall IT infrastructure, shared Jeremy Pease, CEO of Colohouse. Jeremy further added, “The customer journey and experience is our top priority. Consolidating the brands into Colohouse removes confusion about the breadth of our offerings. Our capability to provide colocation, cloud, and hosting services supports our customers’ growing demand for infrastructure that can be optimized for cost, performance and security. This move also consolidates our internal functions, which will continue to improve the customer experience at all levels.” All products are currently available on colohouse.com. TurnKey Internet customers will not be impacted by transitioning from the TurnKey Internet to Colohouse. All Colohouse and TurnKey Internet customers will continue to receive the industry's best service and support. Colohouse will be launching its first-ever “Black Friday Sale” for all dedicated servers and hosting solutions. TurnKey Internet’s customers have incorporated this annual sale in their project planning and budget cycles to take advantage of the price breaks. The sale will begin in mid-November on colohouse.com. About Colohouse Colohouse provides a digital foundation that connects our customers with impactful technology solutions and services. Our managed data center and cloud infrastructure paired with key edge locations and reliable connectivity allow our customers to confidently scale their application and data while optimizing for cost, performance, and security. To learn more about Colohouse, please visit: https://colohouse.com/.

Read More

Hyper-Converged Infrastructure

Tenable Completes Acquisition of Ermetic

GlobeNewswire | October 03, 2023

Tenable® Holdings, Inc., the Exposure Management company, today announced it has closed its acquisition of Ermetic, Ltd. (“Ermetic”), an innovative cloud-native application protection platform (CNAPP) company, and a leading provider of cloud infrastructure entitlement management (CIEM). The acquisition combines two cybersecurity innovators and marks an important milestone in Tenable’s mission to shift organizations to proactive security. The combination of Tenable and Ermetic offerings will add capabilities to both the Tenable One Exposure Management Platform and the Tenable Cloud Security solution to deliver market-leading contextual risk visibility, prioritization and remediation across infrastructure and identities, both on-premises and in the cloud. With unified CNAPP, iron-clad CSPM protection, and industry-leading CIEM, security teams receive the context and prioritization guidance to make efficient and accurate remediation decisions. Security teams will no longer need to be cloud security experts to understand where the most urgent risks exist and what to do about them. Tenable and Ermetic together will help organizations address some of the most difficult challenges in cybersecurity today: Simplifying security management to meet the increasing demands of cloud infrastructure growth Reducing the risk caused by an explosion in volume of user and machine identities in the cloud Understanding the complex relationships and risks across all assets and identities The unique combination of Tenable and Ermetic will give customers tightly integrated CNAPP capabilities for cloud environments, delivered through an elegant user experience that minimizes complexity and speeds adoption, said Amit Yoran, chairman and chief executive officer, Tenable. We’re delivering unparalleled insights into identities and access, which are absolutely critical to securing cloud environments. And with the integration of insights from Tenable One, customers can also consolidate, simplify and reduce costs. The Tenable One Exposure Management Platform enables customers to gain a more complete, accurate and actionable view of their attack surface. Exposure management shifts preventive security from securing technology silos to applying contextual risk intelligence to protect the business. The acquisition of Ermetic accelerates this shift for Tenable customers, adding a depth of cloud security expertise and capabilities that provide context to prioritize risk and simplify remediation. Ermetic adds analytical strength to ExposureAI, more contextual relationships and deep data insights to make Tenable One an even more effective platform for preventive security. Ermetic will also expand and augment Tenable Cloud Security, which enables security teams to continuously assess the security posture of cloud environments, offering full visibility and helping to prioritize efforts based on business risk. About Tenable Tenable® is the Exposure Management company. Approximately 43,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include approximately 60 percent of the Fortune 500, approximately 40 percent of the Global 2000, and large government agencies. Learn more at tenable.com.

Read More

Events