Robin Systems debuts new editions of its cloud infrastructure platform

Container-based cloud infrastructure provider Robin Systems Inc. is making its platform more accessible to the developer community with the launch of two new versions available on Amazon Web Services. The company today announced the general availability of new Community and Developer versions of its Robin Cloud Platform, which provides a container-based infrastructure platform for running big data workloads such as Apache Hadoop, Spark and NoSQL databases. Robin Systems debuted the enterprise version of RCP last year, touting its ability to run these kinds of workloads while dramatically reducing the overhead associated with traditional virtualization that can lead to a serious drag on application performance.

Spotlight

Proofpoint

Proofpoint is a next-generation cybersecurity company that protects your people, data and brand against advanced threats and compliance risks. Built on the cloud and the world's most advanced intelligence platform, our solutions help you effectively detect and block targeted attacks and respond quickly to suspected compromises.

OTHER ARTICLES
Hyper-Converged Infrastructure, Application Infrastructure

ARE COMPANIES INVESTING TOO MUCH IN DIGITAL INFRASTRUCTURE?

Article | July 19, 2023

Data science and big data analytics have become the new must-haves for businesses across many industries. Gone are the days when algorithm development and large-scale data mining were confined to Silicon Valley. In the modern, tech-savvy age, it’s almost an afterthought that banks, insurance brokerages, healthcare entities, and other non-tech-sector companies seek to be “the next Apple/Google/Amazon” or whatever tech behemoth completes the C-suite’s bromide. This is true not just in word, but in deed.

Read More
Hyper-Converged Infrastructure

Why are Investments in Network Monitoring Necessary for Businesses?

Article | July 13, 2023

Businesses are depending more and more on information technology to accomplish daily objectives. The viability and profitability of a firm are directly impacted by the necessity of putting the appropriate technological processes in place. The misunderstanding that "the Internet is down" is often associated with poor internet connectivity shows how crucial network maintenance is since troubleshooting should always begin and conclude with a network expert. In actuality, though, that employee will spend time out of their day to "repair the Internet," and the money spent on that time is the result of the company's failure to implement a dependable network monitoring system. The direct financial loss increases with network unreliability. Because expanding wide area network (WAN) infrastructure and cloud networking have now become a significant component of today's enterprise computing, networks have grown much more virtualized and are no longer restricted to either physical location or hardware. While networks themselves are evolving, there is a growing need for IT network management. As organizations modernize their IT infrastructure, they should think about purchasing a network management system for several reasons. Creating More Effective, Less Redundant Systems Every network has to deal with data transfer through significant hubs and the flow of information. In order to avoid slowing down data transfer, not using up more IP addresses in a network scheme than necessary, and avoiding dead loops, networking engineers have had to carefully route networking equipment to end devices over the years. An effective IT management solution can analyze how your network is operating and provide immediate insights into the types of changes you need to make to cut down on redundancy and improve workflow. More productivity and less time spent troubleshooting delayed data transfers result from increased efficiency. Increasing Firewall Defense Given that more apps are being utilized for internal and external massive data transfers, every network must have adequate firewalls and access control setup. In addition to screen sharing and remote desktop services, more companies require team meeting software with live video conferencing choices. Programs with these features can be highly vulnerable to hackers and other vulnerabilities; thus, it's crucial that firewalls stop attackers from utilizing the software to access restricted sections of corporate networks. Your network management tools can set up your firewalls and guarantee that only secure network connections and programs are used in critical parts of your system. The bottom line is that your company network will constantly require security and development, and your underlying network must be quick and dependable to satisfy demands for both workplace productivity and customer experience. Which IT network management system, nevertheless, is best for your company? Effectiveness doesn't require a lot of complexity, and if it works with well-known network providers, there's a good chance the cost will be justified. Rock-solid security will be the most crucial factor, but you should also search for a system that can operate on physical, cloud, and hybrid infrastructure.

Read More
Hyper-Converged Infrastructure

What Is IaaS? A Data Center in the Cloud Packed with Services

Article | October 3, 2023

Consider IaaS (infrastructure as a service) as a virtual version of your traditional data center. IaaS is a branch of cloud computing technology that offers virtualized storage, server, and networking wrapped together as a self-service platform. It is highly cost-efficient and makes up for easier, faster workloads. Although incredibly convenient for business, it largely depends on what your company needs to use it for. What is IaaS, and How Can It Benefit Your Business? IaaS first rose to popularity in the early 2010s. Since then, it has become the standard abstraction model for many types of workloads. But with the rise of the microservices application pattern and the arrival of new technologies like containers and serverless IaaS is still a foundational service, but the field is more crowded than ever. The most common household cloud computing names—AWS (Amazon Web Services), Google Cloud and Microsoft Azure— are all IaaS providers. They all maintain giant data centers around the globe. It includes tons of storage systems, physical servers, and networking equipment under a virtualization layer. Cloud customers access these resources to deploy and run applications in a highly automated manner. Developing a cloud adoption strategy is a vital step forward for modern-day business. And this subscription-based cloud computing service, IaaS, offers a remote management solution and reduces your purchase cost at the same time. Additionally, IaaS also provides key solutions vital for any company’s future plans, such as big-data analysis. It allows businesses like yours to analyze massive data sets and see future trends, patterns, and associations that a human wouldn’t. Understanding the IaaS Architecture In an IaaS service model, your cloud provider will take over your infrastructure components, such as traditional on-premises data centers and host them on the internet. This includes virtual computing, servers, networking hardware, and infrastructure components, as well as the hypervisor layer. IaaS service providers will also provide a wide array of services to accompany those infrastructure components. Monitoring Detailed billing Security Log access Load balancing Clustering Storage resiliency Backup Replication Disaster Recovery IaaS services are automated and highly policy-driven, so you can implement all your infrastructure tasks effortlessly. How Does It Work? IaaS customers access their resources through a WAN (wide area network). Leveraging the cloud provider's services, they will install the remaining elements of an application stack. For example, you can log in to the IaaS platform to create VMs (virtual machines), install operating systems on each VM, deploy middleware like databases, create storage buckets for workloads and backups, and install the enterprise workload on that VM. Afterward, you can also use the IaaS provider's services to track costs, balance network traffic, monitor performance, troubleshoot application-related issues and manage disaster recovery. IaaS Use Cases As IaaS provides general-purpose computing resources, it can be used for any kind of use case. IaaS is most often used today for the development and testing environments, websites, and web apps that interact with customers, data storage, analytics, and data warehousing workloads. Plus, it also offers backup and disaster recovery services, especially for on-premises workloads. IaaS is also a good way to set up and run common business software and apps like SAP. Real-life Examples GE Healthcare: Reputed medical imaging facility GE Healthcare adopted Amazon EC2 from AWS to design the GE Health Cloud. GE Health Cloud platform successfully empowered its consumers by collecting, storing, accessing, and processing information worldwide from different types of medical devices to obtain value from data. Coca-Cola: The beverage giant Coca-Cola collaborated with SoftLayer adopting a pay-as-you-go architecture to manage their CRM system effectively during peak seasons. Final Thoughts Before choosing a provider, you will need to think carefully about the services, reliability, and costs. First, you should thoroughly assess the capabilities of your organization’s IT department and determine how well equipped it is to deal with the ongoing demands of IaaS implementation. Accordingly, you will be prepared to choose an alternative provider and move to the alternative infrastructure if you need to.

Read More
Hyper-Converged Infrastructure

Ensuring Long-Term Reliability of Technology Partners using HCI

Article | October 10, 2023

Building trust through HCI by unveiling strategies to ensure the long-term reliability of technology partnerships, cementing lasting collaborations in a dynamic business landscape through vendor stability. Contents 1. Introduction 2. How HCI Overcomes Infrastructural Challenges 3. Evaluation Criteria for Enterprise HCI 3.1. Distributed Storage Layer 3.2. Data Security 3.3. Data Reduction 4. Assessing Vendor Stability: Ensuring Long-Term Reliability of Partners 4.1. Vendor Track Record 4.2. Financial Stability 4.3. Customer Base and References 4.4. Product Roadmap and Innovation 4.5. Support and Maintenance 4.6. Partnerships and Ecosystem 4.7. Industry Recognition and Analyst Reports 4.8. Contracts and SLAs 5. Final Takeaway 1. Introduction When collaborating with a vendor, it is essential to evaluate their financial stability. This ensures that they are able to fulfil their obligations and deliver the promised services or goods. Prior to making contractual commitments, it is necessary to conduct due diligence to determine a vendor's financial health. This article examines when a vendor's financial viability must be evaluated, why to do so, and how vendor and contract management software can assist businesses. IT organizations of all sizes face numerous infrastructure difficulties. On one hand, they frequently receive urgent demands from the business to keep their organization agile and proactive while implementing new digital transformation initiatives. They also struggle to keep their budget under control, provide new resources swiftly, and manage the increasing complexity while maintaining a reasonable level of efficiency. For many organizations, a cloud-only IT strategy is not a viable option; as a result, there is a growing interest in hybrid scenarios that offer the best of both realms. By combining cloud and traditional IT infrastructures, there is a real danger of creating silos, going in the incorrect direction, and further complicating the overall infrastructure, thereby introducing inefficiencies. 2. How HCI Overcomes Infrastructural Challenges Hyper-converged infrastructures (HCI) surpass conventional infrastructures in terms of simplicity and adaptability. HCI enables organizations to conceal the complexity of their IT infrastructure while reaping the benefits of a cloud-like environment. HCI simplifies operations and facilitates the migration of on-premises data and applications to the cloud. HCI is a software-defined solution that abstracts and organizes CPU, memory, networking, and storage devices as resource pools, typically utilizing commodity x86-based hardware and virtualization software. It enables the administrator to rapidly combine and provision these resources as virtual machines and, more recently, as independent storage resources such as network-attached storage (NAS) filers and object stores. Management operations are also simplified, allowing for an increase in infrastructure productivity while reducing the number of operators and system administrators per virtual machine managed. HCI market and itssolutions can be categorized into three groups: Enterprise Solutions They have an extensive feature set, high scalability, core-to-cloud integrations, and tools that extend beyond traditional virtualization platform management and up the application stack. Small/Medium Enterprise Solutions Comparable to the previous category, but simplified and more affordable. The emphasis remains on simplifying the IT infrastructure for virtualized environments, with limited core-to-cloud integrations and a limited ecosystem of solutions. Vertical Solutions Designed for particular use cases or vertical markets, they are highly competitive in edge-cloud or edge-core deployments, but typically have a limited ecosystem of solutions. These solutions incorporate open-source hypervisors, such as KVM, to provide end-to-end support at lower costs. They are typically not very scalable, but they are efficient from a resource consumption standpoint. 3. Evaluation Criteria for Enterprise HCI 3.1 Distributed Storage Layer The distributed storage layer provides primary data storage service for virtual machines and is a crucial component of every HCI solution. Depending on the exposed protocol, they are typically presented as a virtual network-attached storage (NAS) or storage area network (SAN) and contain all of the data. There are three distributed storage layer approaches for HCI: Virtual storage appliance (VSA): A virtual machine administered by the same hypervisor as the other virtual machines in the node. A VSA is more flexible and can typically support multiple hypervisors, but this method may result in increased latency. Integrated within the hypervisor or the Operating System (OS): The storage layer is an extension of the hypervisor and does not require the preceding approach's components (VM and guest OS). The tight integration boosts overall performance, enhances workload telemetry, and fully exploits hypervisor characteristics, but the storage layer is not portable. Specialized storage nodes: The distributed storage layer is comprised of specialized nodes in order to achieve optimal performance consistency and scalability for both internal and external storage consumption. This strategy, which is typically more expensive than the alternatives for lesser configurations, is utilized. 3.2 Data Security Currently, all vendors offer sophisticated data protection against multiple failures, such as full node, single, and multiple-component issues. Distributed erasure coding safeguards information by balancing performance and data footprint efficiency. This equilibrium is made possible by modern CPUs with sophisticated instruction sets, new hardware such as NVMe and storage-class memory (SCM) devices, and data path optimizations. In addition, the evolution of storage technologies has played a pivotal role in enhancing data protection strategies. The introduction of high-capacity SSDs (Solid-State Drives) and advancements in storage virtualization have further strengthened the ability to withstand failures and ensure uninterrupted data availability. These technological innovations, combined with the relentless pursuit of redundancy and fault tolerance, have elevated the resilience of modern data storage systems. Furthermore, for data protection and security, compliance with rules, regulations, and laws is paramount. Governments and regulatory bodies across the globe have established stringent frameworks to safeguard sensitive information and ensure privacy. Adherence to laws such as the General Data Protection Regulation (GDPR) in Europe, the Health Insurance Portability and Accountability Act (HIPAA) in the United States, and various industry-specific regulations is non-negotiable. Organizations must fortify their data against technical vulnerabilities and align their practices with legal requirements to prevent costly fines, legal repercussions, and reputational damage. 3.3 Data Reduction Optimization of the data footprint is a crucial aspect of hyper-converged infrastructures. Deduplication, compression, and other techniques, such as thin provisioning, can significantly improve capacity utilization in virtualized environments, particularly for Virtual desktop infrastructure (VDI) use cases. Moreover, in order to optimize rack space utilization and achieve server balance, the number of storage devices that can be deployed on a single HCI node is restricted. 4. Assessing Vendor Stability: Ensuring Long-Term Reliability of Partners Here are some key factors that contribute to ensuring long-term reliability: 4.1 Vendor Track Record Assessing the vendor's track record and reputation in the industry is crucial. Look for established vendors with a history of delivering reliable products and services. A vendor that has been operating in the market for a significant period of time and has a strong customer base indicates stability. 4.2 Financial Stability Consider factors such as the vendor's profitability, revenue growth, and ability to invest in research and development. Financial stability ensures the vendor's ability to support their products and services over the long term. 4.3 Customer Base and References Look at the size and diversity of the vendor's customer base. A large and satisfied customer base indicates that the vendor's solutions have been adopted successfully by organizations. Request references from existing customers to get insights into their experience with the vendor's stability and support. 4.4 Product Roadmap and Innovation Assess the vendor's product roadmap and commitment to ongoing innovation. A vendor that actively invests in research and development, regularly updates their products, and introduces new features and enhancements demonstrates a long-term commitment to their solution's reliability and advancement. 4.5 Support and Maintenance Evaluate the vendor's support and maintenance services. Look for comprehensive support offerings, including timely bug fixes, security patches, and firmware updates. Understand the vendor's service-level agreements (SLAs), response times, and availability of technical support to ensure they can address any issues that may arise. 4.6 Partnerships and Ecosystem Consider the vendor's partnerships and ecosystem. A strong network of partners, including technology alliances and integrations with other industry-leading vendors, can contribute to long-term reliability. Partnerships demonstrate collaboration, interoperability, and a wider ecosystem that enhances the vendor's solution. 4.7 Industry Recognition and Analyst Reports Assess the vendor's industry recognition and performance in analyst reports. Look for accolades, awards, and positive evaluations from reputable industry analysts. These assessments provide independent validation of the vendor's stability and the reliability of their HCI solution. 4.8 Contracts and SLAs Review the vendor's contracts, service-level agreements, and warranties carefully. Ensure they provide appropriate guarantees for support, maintenance, and ongoing product updates throughout the expected lifecycle of the HCI solution. 5. Final Takeaway Evaluating a vendor's financial stability is crucial before entering into contractual commitments to ensure their ability to fulfill obligations. Hyper-converged infrastructure overcomes infrastructural challenges by simplifying operations, enabling cloud-like environments, and facilitating data and application migration. The HCI market offers enterprise, small/medium enterprise, and vertical solutions, each catering to different needs and requirements. Analysing enterprise HCI solutions requires careful consideration of various criteria. Each approach has its own advantages and considerations related to flexibility, performance, and cost. The mentioned techniques can significantly reduce the data footprint, particularly in use cases like VDI, while maintaining performance and efficiency. Organizations take decisions that align with their specific storage, security, and efficiency requirements by considering the evaluation criteria for enterprise HCI solutions. By considering these factors, organizations can make informed decisions and choose a vendor with a strong foundation of reliability, stability, and long-term commitment, ensuring the durability of their HCI infrastructure and minimizing risks associated with vendor instability.

Read More

Spotlight

Proofpoint

Proofpoint is a next-generation cybersecurity company that protects your people, data and brand against advanced threats and compliance risks. Built on the cloud and the world's most advanced intelligence platform, our solutions help you effectively detect and block targeted attacks and respond quickly to suspected compromises.

Related News

Storage Management

SoftIron Recognized as a Sample Vendor in Gartner Hype Cycle for Edge Computing

GlobeNewswire | October 25, 2023

SoftIron, the worldwide leader in private cloud infrastructure, today announced it has been named as a Sample Vendor for the “Gartner Hype Cycle for Edge Computing, 2023.” Gartner Hype Cycle provides a view of how a technology or application will evolve over time, providing a sound source of insight to manage its deployment within the context of your specific business goals. The five phases of a Hype cycle are innovation trigger, Peak of Inflated Expectations, Trough of Disillusionment, Slope of Enlightenment and the Plateau of Productivity. SoftIron is recognized in the Gartner report as a Sample Vendor for Edge Storage and the report defines the technology as those that enable the creation, analysis, processing and delivery of data services at, or close to, the location where the data is generated or consumed, rather than in a centralized environment. Gartner predicts that infrastructure and operations (I&O) leaders are beginning the process of laying out a strategy for how they intend to manage data at the edge. Although I&O leaders embrace infrastructure as a service (IaaS) cloud providers, they also realize that a significant part of the infrastructure services will remain on-premises, and would require edge storage data services. Gartner Hype Cycles provide a graphic representation of the maturity and adoption of technologies and applications, and how they are potentially relevant to solving real business problems and exploiting new opportunities. Gartner Hype Cycle methodology gives you a view of how a technology or application will evolve over time, providing a sound source of insight to manage its deployment within the context of your specific business goals. The latest Gartner Hype Cycle analyzed 31 emerging technologies and included a Priority Matrix that provides perspective on the edge computing innovations that will have a bigger impact, and those that might take longer to fully mature. “We are excited to be recognized in the 2023 Garter Hype Cycle for Edge Computing,” said Jason Van der Schyff, COO at SoftIron. “We believe at SoftIron to be well positioned to help our customers address and take advantage of the latest trends and developments in Edge Computing as reported in Gartner’s Hype Cycle.”

Read More

Hyper-Converged Infrastructure

Colohouse Launches Dedicated Server and Hosting Offering for Data Center and Cloud Customers

Business Wire | October 05, 2023

Colohouse, a prominent data center colocation, cloud, dedicated server and services provider, is merging TurnKey Internet’s hosting and dedicated server offering into the Colohouse brand and services portfolio. This strategic move comes from TurnKey Internet’s acquisition in 2021 to align with Colohouse’s broader compute, connectivity and cloud strategy. With the integration of dedicated servers and hosting services into its core brand portfolio, Colohouse aims to enhance its ability to meet the diverse needs of its growing customer base. Including TurnKey Internet’s servers and services is a testament to Colohouse’s dedication to delivering comprehensive and impactful solutions for its customers and prospects in key markets and edge locations. Colohouse will begin offering hosting services immediately available on www.colohouse.com Products: dedicated bare metal servers, enterprise series dedicated servers, cloud VPS servers, control panel offerings and licensing Colohouse’s dedicated servers will be available in these data centers: Miami, FL, Colorado Springs, CO, Chicago, IL, Orangeburg, NY, Albany, NY and Amsterdam, The Netherlands. Client Center: The support team will be available to assist customers 24/7/365 through a single support portal online, or via email and phone, as well as Live Chat through colohouse.com Compliance and security are a top priority for Colohouse’s customers. In fall of 2023, Colohouse will have its first combined SOC audit for all of its data center locations, including dedicated servers and hosting. This will be available for request on its website upon completion of the audit. When I accepted the job of CEO at Colohouse, my vision was, and still is, to build a single platform company that provides core infrastructure but also extends past just colocation, cloud, or bare metal. We recognize that businesses today require flexible options to address their IT infrastructure needs. This is a step for us to create an ecosystem within Colohouse that gives our customers room to test their applications instantly or have a solution for backups and migrations with the same provider. The same provider that knows the nuances of a customer's IT infrastructure, like colocation or cloud, can also advise or assist that same customer with alternative solutions that enhance their overall IT infrastructure, shared Jeremy Pease, CEO of Colohouse. Jeremy further added, “The customer journey and experience is our top priority. Consolidating the brands into Colohouse removes confusion about the breadth of our offerings. Our capability to provide colocation, cloud, and hosting services supports our customers’ growing demand for infrastructure that can be optimized for cost, performance and security. This move also consolidates our internal functions, which will continue to improve the customer experience at all levels.” All products are currently available on colohouse.com. TurnKey Internet customers will not be impacted by transitioning from the TurnKey Internet to Colohouse. All Colohouse and TurnKey Internet customers will continue to receive the industry's best service and support. Colohouse will be launching its first-ever “Black Friday Sale” for all dedicated servers and hosting solutions. TurnKey Internet’s customers have incorporated this annual sale in their project planning and budget cycles to take advantage of the price breaks. The sale will begin in mid-November on colohouse.com. About Colohouse Colohouse provides a digital foundation that connects our customers with impactful technology solutions and services. Our managed data center and cloud infrastructure paired with key edge locations and reliable connectivity allow our customers to confidently scale their application and data while optimizing for cost, performance, and security. To learn more about Colohouse, please visit: https://colohouse.com/.

Read More

Hyper-Converged Infrastructure

Tenable Completes Acquisition of Ermetic

GlobeNewswire | October 03, 2023

Tenable® Holdings, Inc., the Exposure Management company, today announced it has closed its acquisition of Ermetic, Ltd. (“Ermetic”), an innovative cloud-native application protection platform (CNAPP) company, and a leading provider of cloud infrastructure entitlement management (CIEM). The acquisition combines two cybersecurity innovators and marks an important milestone in Tenable’s mission to shift organizations to proactive security. The combination of Tenable and Ermetic offerings will add capabilities to both the Tenable One Exposure Management Platform and the Tenable Cloud Security solution to deliver market-leading contextual risk visibility, prioritization and remediation across infrastructure and identities, both on-premises and in the cloud. With unified CNAPP, iron-clad CSPM protection, and industry-leading CIEM, security teams receive the context and prioritization guidance to make efficient and accurate remediation decisions. Security teams will no longer need to be cloud security experts to understand where the most urgent risks exist and what to do about them. Tenable and Ermetic together will help organizations address some of the most difficult challenges in cybersecurity today: Simplifying security management to meet the increasing demands of cloud infrastructure growth Reducing the risk caused by an explosion in volume of user and machine identities in the cloud Understanding the complex relationships and risks across all assets and identities The unique combination of Tenable and Ermetic will give customers tightly integrated CNAPP capabilities for cloud environments, delivered through an elegant user experience that minimizes complexity and speeds adoption, said Amit Yoran, chairman and chief executive officer, Tenable. We’re delivering unparalleled insights into identities and access, which are absolutely critical to securing cloud environments. And with the integration of insights from Tenable One, customers can also consolidate, simplify and reduce costs. The Tenable One Exposure Management Platform enables customers to gain a more complete, accurate and actionable view of their attack surface. Exposure management shifts preventive security from securing technology silos to applying contextual risk intelligence to protect the business. The acquisition of Ermetic accelerates this shift for Tenable customers, adding a depth of cloud security expertise and capabilities that provide context to prioritize risk and simplify remediation. Ermetic adds analytical strength to ExposureAI, more contextual relationships and deep data insights to make Tenable One an even more effective platform for preventive security. Ermetic will also expand and augment Tenable Cloud Security, which enables security teams to continuously assess the security posture of cloud environments, offering full visibility and helping to prioritize efforts based on business risk. About Tenable Tenable® is the Exposure Management company. Approximately 43,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include approximately 60 percent of the Fortune 500, approximately 40 percent of the Global 2000, and large government agencies. Learn more at tenable.com.

Read More

Storage Management

SoftIron Recognized as a Sample Vendor in Gartner Hype Cycle for Edge Computing

GlobeNewswire | October 25, 2023

SoftIron, the worldwide leader in private cloud infrastructure, today announced it has been named as a Sample Vendor for the “Gartner Hype Cycle for Edge Computing, 2023.” Gartner Hype Cycle provides a view of how a technology or application will evolve over time, providing a sound source of insight to manage its deployment within the context of your specific business goals. The five phases of a Hype cycle are innovation trigger, Peak of Inflated Expectations, Trough of Disillusionment, Slope of Enlightenment and the Plateau of Productivity. SoftIron is recognized in the Gartner report as a Sample Vendor for Edge Storage and the report defines the technology as those that enable the creation, analysis, processing and delivery of data services at, or close to, the location where the data is generated or consumed, rather than in a centralized environment. Gartner predicts that infrastructure and operations (I&O) leaders are beginning the process of laying out a strategy for how they intend to manage data at the edge. Although I&O leaders embrace infrastructure as a service (IaaS) cloud providers, they also realize that a significant part of the infrastructure services will remain on-premises, and would require edge storage data services. Gartner Hype Cycles provide a graphic representation of the maturity and adoption of technologies and applications, and how they are potentially relevant to solving real business problems and exploiting new opportunities. Gartner Hype Cycle methodology gives you a view of how a technology or application will evolve over time, providing a sound source of insight to manage its deployment within the context of your specific business goals. The latest Gartner Hype Cycle analyzed 31 emerging technologies and included a Priority Matrix that provides perspective on the edge computing innovations that will have a bigger impact, and those that might take longer to fully mature. “We are excited to be recognized in the 2023 Garter Hype Cycle for Edge Computing,” said Jason Van der Schyff, COO at SoftIron. “We believe at SoftIron to be well positioned to help our customers address and take advantage of the latest trends and developments in Edge Computing as reported in Gartner’s Hype Cycle.”

Read More

Hyper-Converged Infrastructure

Colohouse Launches Dedicated Server and Hosting Offering for Data Center and Cloud Customers

Business Wire | October 05, 2023

Colohouse, a prominent data center colocation, cloud, dedicated server and services provider, is merging TurnKey Internet’s hosting and dedicated server offering into the Colohouse brand and services portfolio. This strategic move comes from TurnKey Internet’s acquisition in 2021 to align with Colohouse’s broader compute, connectivity and cloud strategy. With the integration of dedicated servers and hosting services into its core brand portfolio, Colohouse aims to enhance its ability to meet the diverse needs of its growing customer base. Including TurnKey Internet’s servers and services is a testament to Colohouse’s dedication to delivering comprehensive and impactful solutions for its customers and prospects in key markets and edge locations. Colohouse will begin offering hosting services immediately available on www.colohouse.com Products: dedicated bare metal servers, enterprise series dedicated servers, cloud VPS servers, control panel offerings and licensing Colohouse’s dedicated servers will be available in these data centers: Miami, FL, Colorado Springs, CO, Chicago, IL, Orangeburg, NY, Albany, NY and Amsterdam, The Netherlands. Client Center: The support team will be available to assist customers 24/7/365 through a single support portal online, or via email and phone, as well as Live Chat through colohouse.com Compliance and security are a top priority for Colohouse’s customers. In fall of 2023, Colohouse will have its first combined SOC audit for all of its data center locations, including dedicated servers and hosting. This will be available for request on its website upon completion of the audit. When I accepted the job of CEO at Colohouse, my vision was, and still is, to build a single platform company that provides core infrastructure but also extends past just colocation, cloud, or bare metal. We recognize that businesses today require flexible options to address their IT infrastructure needs. This is a step for us to create an ecosystem within Colohouse that gives our customers room to test their applications instantly or have a solution for backups and migrations with the same provider. The same provider that knows the nuances of a customer's IT infrastructure, like colocation or cloud, can also advise or assist that same customer with alternative solutions that enhance their overall IT infrastructure, shared Jeremy Pease, CEO of Colohouse. Jeremy further added, “The customer journey and experience is our top priority. Consolidating the brands into Colohouse removes confusion about the breadth of our offerings. Our capability to provide colocation, cloud, and hosting services supports our customers’ growing demand for infrastructure that can be optimized for cost, performance and security. This move also consolidates our internal functions, which will continue to improve the customer experience at all levels.” All products are currently available on colohouse.com. TurnKey Internet customers will not be impacted by transitioning from the TurnKey Internet to Colohouse. All Colohouse and TurnKey Internet customers will continue to receive the industry's best service and support. Colohouse will be launching its first-ever “Black Friday Sale” for all dedicated servers and hosting solutions. TurnKey Internet’s customers have incorporated this annual sale in their project planning and budget cycles to take advantage of the price breaks. The sale will begin in mid-November on colohouse.com. About Colohouse Colohouse provides a digital foundation that connects our customers with impactful technology solutions and services. Our managed data center and cloud infrastructure paired with key edge locations and reliable connectivity allow our customers to confidently scale their application and data while optimizing for cost, performance, and security. To learn more about Colohouse, please visit: https://colohouse.com/.

Read More

Hyper-Converged Infrastructure

Tenable Completes Acquisition of Ermetic

GlobeNewswire | October 03, 2023

Tenable® Holdings, Inc., the Exposure Management company, today announced it has closed its acquisition of Ermetic, Ltd. (“Ermetic”), an innovative cloud-native application protection platform (CNAPP) company, and a leading provider of cloud infrastructure entitlement management (CIEM). The acquisition combines two cybersecurity innovators and marks an important milestone in Tenable’s mission to shift organizations to proactive security. The combination of Tenable and Ermetic offerings will add capabilities to both the Tenable One Exposure Management Platform and the Tenable Cloud Security solution to deliver market-leading contextual risk visibility, prioritization and remediation across infrastructure and identities, both on-premises and in the cloud. With unified CNAPP, iron-clad CSPM protection, and industry-leading CIEM, security teams receive the context and prioritization guidance to make efficient and accurate remediation decisions. Security teams will no longer need to be cloud security experts to understand where the most urgent risks exist and what to do about them. Tenable and Ermetic together will help organizations address some of the most difficult challenges in cybersecurity today: Simplifying security management to meet the increasing demands of cloud infrastructure growth Reducing the risk caused by an explosion in volume of user and machine identities in the cloud Understanding the complex relationships and risks across all assets and identities The unique combination of Tenable and Ermetic will give customers tightly integrated CNAPP capabilities for cloud environments, delivered through an elegant user experience that minimizes complexity and speeds adoption, said Amit Yoran, chairman and chief executive officer, Tenable. We’re delivering unparalleled insights into identities and access, which are absolutely critical to securing cloud environments. And with the integration of insights from Tenable One, customers can also consolidate, simplify and reduce costs. The Tenable One Exposure Management Platform enables customers to gain a more complete, accurate and actionable view of their attack surface. Exposure management shifts preventive security from securing technology silos to applying contextual risk intelligence to protect the business. The acquisition of Ermetic accelerates this shift for Tenable customers, adding a depth of cloud security expertise and capabilities that provide context to prioritize risk and simplify remediation. Ermetic adds analytical strength to ExposureAI, more contextual relationships and deep data insights to make Tenable One an even more effective platform for preventive security. Ermetic will also expand and augment Tenable Cloud Security, which enables security teams to continuously assess the security posture of cloud environments, offering full visibility and helping to prioritize efforts based on business risk. About Tenable Tenable® is the Exposure Management company. Approximately 43,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include approximately 60 percent of the Fortune 500, approximately 40 percent of the Global 2000, and large government agencies. Learn more at tenable.com.

Read More

Events