Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 16 of 20 white papers, page 1 of 2.
Ease of Management and Flexibility Lead to Long-Term Relationship for IGEL at Texas Credit Union
Randolph-Brooks Federal Credit Union was looking for a more powerful endpoint computing solution to deliver e-mail and core financial applications through its Citrix-based infrastructure to its end-users, and IGEL’s Universal Desktop thin clients and Universal Management Suite (UMS) software fit the bill.

Randolph-Brooks Federal Credit Union is more than just a bank. It is a financial cooperative intent on helping its members save time, save money and earn money. Over the years, the credit union has grown from providing financial resources to military service members and their families to serving hundreds of thousands of members across Texas and around the world. RBFCU has a presence in three major market areas — Austin, Dallas and San Antonio — and has more than 55 branches dedicated to serving members and the community.

First and foremost, RBFCU is people. It’s the more than 1,800 employees who serve members’ needs each day. It’s the senior team and Board of Directors that guide the credit union’s growth. It’s the members who give their support and loyalty to the credit union each day.

To help its employees provide the credit union’s members with the highest levels of services and support, Randolph-Brooks Federal Credit Union relies on IGEL’s endpoint computing solutions.

Austin Solution Provider Powers DaaS Offering with IGEL and Parallels
In 2014, Austin-based Trinsic Technologies introduced Anytime Cloud. Anytime Cloud is a Desktop-as-a-Service (DaaS) solution designed to help SMB clients improve the end user computing experience and streamline business operations. Through Anytime Cloud, customers gain access to the latest cloud and virtualization technologies using IGEL thin clients with Parallels, a virtual application and desktop delivery software application.

Headquartered in Austin, Texas, Trinsic Technologies is a technology solutions provider focused on delivering managed IT and cloud solutions to SMBs since 2005.

In 2014, Trinsic introduced Anytime Cloud, a Desktop-as-a-Service (DaaS) designed to help SMB clients improve the end user computing experience and streamline business operations. To support Anytime Cloud, the solution provider was looking for a desktop delivery and endpoint management solution that would fulfill a variety of different end user needs and requirements across the multiple industries it serves. Trinsic also wanted a solution that provided ease of management and robust security features for clients operating within regulated industries such as healthcare and financial services.

The solution provider selected the IGEL Universal Desktop (UD) thin clients, the IGEL Universal Desktop Converter (UDC), the IGEL OS and the IGEL Universal Management Suite. As a result, some of the key benefits Trinsic has experienced include ease of management and configuration, security and data protection, improved resource allocation and cost savings.

Secure Printing Using ThinPrint, Citrix and IGEL: Solution Guide
This solution guide outlines some of the regulatory issues any business faces when it prints sensitive material. It discusses how a Citrix-IGEL-ThinPrint bundled solution meets regulation criteria such as HIPAA standards and the EU’s soon-to-be-enacted General Data Protection Regulations without diminishing user convenience and productivity.

Print data is generally unencrypted and almost always contains personal, proprietary or sensitive information. Even a simple print request sent from an employee may potentially pose a high security risk for an organization if not adequately monitored and managed. To put it bluntly, the printing processes that are repeated countless times every day at many organizations are great ways for proprietary data to end up in the wrong hands.

Mitigating this risk, however, should not impact the workforce flexibility and productivity print-anywhere capabilities deliver. Organizations seek to adopt print solutions that satisfy government-mandated regulations for protecting end users and that protect proprietary organizational data — all while providing a first-class desktop and application experience for users.

This solution guide outlines some of the regulatory issues any business faces when it prints sensitive material. It discusses how a Citrix-IGEL-ThinPrint bundled solution meets regulation criteria such as HIPAA standards and the EU’s soon-to-be-enacted General Data Protection Regulations without diminishing user convenience and productivity.

Finally, this guide provides high-level directions and recommendations for the deployment of the bundled solution.

PrinterLogic and IGEL Enable Healthcare Organizations to Deliver Better Patient Outcomes
Healthcare professionals need to print effortlessly and reliably to nearby or appropriate printers within virtual environments, and PrinterLogic and IGEL can help make that an easy, reliable process—all while efficiently maintaining the protection of confidential patient information.

Many organizations have turned to virtualizing user endpoints to help reduce capital and operational expenses while increasing security. This is especially true within healthcare, where hospitals, clinics, and urgent care centers seek to offer the best possible patient outcomes while adhering to a variety of mandated patient security and information privacy requirements.

With the movement of desktops and applications into the secure data center or cloud, the need for reliable printing of documents, some very sensitive in nature, remains a constant that can be challenging when desktops are virtual but the printing process remains physical. Directing print jobs to the correct printer with the correct physical access rights in the correct location while ensuring compliance with key healthcare mandates like the General Data Protection Regulation (GDPR) and the Healthcare Insurance Portability and Accountability Act (HIPAA) is critical.

Healthcare IT needs to keep pace with these requirements and the ongoing printing demands of healthcare. Medical professionals need to print effortlessly and reliably to nearby or appropriate printers within virtual environments, and PrinterLogic and IGEL can help make that an easy, reliable process—all while efficiently maintaining the protection of confidential patient information. By combining PrinterLogic’s enterprise print management software with centrally managed direct IP printing and IGEL’s software-defined thin client endpoint management, healthcare organizations can:

  • Reduce capital and operational costs
  • Support virtual desktop infrastructure (VDI) and electronic medical records (EMR) systems effectively
  • Centralize and simplify print management
  • Add an essential layer of security from the target printer all the way to the network edge
UD Pocket Saves the Day After Malware Cripple’s Hospital’s Mission-Critical PCs
IGEL Platinum Partner A2U had endpoints within the healthcare organization’s finance department up and running within a few hours following the potentially crippling cyberattack, thanks to the innovative micro thin client.

A2U, an IGEL Platinum Partner, recently experienced a situation where one of its large, regional healthcare clients was hit by a cyberattack. “Essentially, malware entered the client’s network via a computer and began replicating like wildfire,” recalls A2U Vice President of Sales, Robert Hammond.

During the cyberattack, a few hundred of the hospital’s PCs were affected. Among those were 30 endpoints within the finance department that the healthcare organization deemed mission critical due to the volume of daily transactions between patients, insurance companies, and state and county agencies for services rendered. “It was very painful from a business standpoint not to be able to conduct billing and receiving, not to mention payroll,” said Hammond.

Prior to this particular incident, A2U had received demo units of the IGEL UD Pocket, a revolutionary micro thin client that can transform x86-compatible PCs and laptops into IGEL OS-powered desktops.

“We had been having a discussion with this client about re-imaging their PCs, but their primary concern was maintaining the integrity of the data that was already on the hardware,” continued Hammond. “HIPAA and other regulations meant that they needed to preserve the data and keep it secure, and we thought that the IGEL UD Pocket could be the answer to this problem. We didn’t see why it wouldn’t work, but we needed to test our theory.”

When the malware attack hit, that opportunity came sooner, rather than later for A2U. “We plugged the UD Pocket into one of the affected machines and were able to bypass the local hard drive, installing the Linux-based IGEL OS on the system without impacting existing data,” said Hammond. “It was like we had created a ‘Linux bubble’ that protected the machine, yet created an environment that allowed end users to quickly return to productivity.”

Working with the hospital’s IT team, it only took a few hours for A2U to get the entire finance department back online. “They were able to start billing the very next day,” added Hammond.

Controlling Cloud Costs without Sacrificing Availability or Performance
This white paper is to help prevent cloud services sticker shock from occurring ever again and to help make your cloud investments more effective.
After signing up with a cloud service provider, you receive a bill that causes sticker shock. There are unexpected and seemingly excessive charges, and those responsible seem unable to explain how this could have happened. The situation is critical because the amount threatens to bust the budget unless cost-saving changes are made immediately. The objective of this white paper is to help prevent cloud services sticker shock from occurring ever again.
Office 365 / Microsoft 365: The Essential Companion Guide
Office 365 and Microsoft 365 contain truly powerful applications that can significantly boost productivity in the workplace. However, there’s a lot on offer so we’ve put together a comprehensive companion guide to ensure you get the most out of your investment! This free 85-page eBook, written by Microsoft Certified Trainer Paul Schnackenburg, covers everything from basic descriptions, to installation, migration, use-cases, and best practices for all features within the Office/Microsoft 365 sui

Welcome to this free eBook on Office 365 and Microsoft 365 brought to you by Altaro Software. We’re going to show you how to get the most out of these powerful cloud packages and improve your business. This book follows an informal reference format providing an overview of the most powerful applications of each platform’s feature set in addition to links directing to supporting information and further reading if you want to dig further into a specific topic. The intended audience for this book is administrators and IT staff who are either preparing to migrate to Office/Microsoft 365 or who have already migrated and who need to get the lay of the land. If you’re a developer looking to create applications and services on top of the Microsoft 365 platform, this book is not for you. If you’re a business decision-maker, rather than a technical implementer, this book will give you a good introduction to what you can expect when your organization has been migrated to the cloud and ways you can adopt various services in Microsoft 365 to improve the efficiency of your business.

THE BASICS

We’ll cover the differences (and why one might be more appropriate for you than the other) in more detail later but to start off let’s just clarify what each software package encompasses in a nutshell. Office 365 (from now on referred to as O365) 7 is an email collaboration and a host of other services provided as a Software as a Service (SaaS) whereas Microsoft 365 (M365) is Office 365 plus Azure Active Directory Premium, Intune – cloud-based management of devices and security and Windows 10 Enterprise. Both are per user-based subscription services that require no (or very little) infrastructure deployments on-premises.

The SysAdmin Guide to Azure Infrastructure as a Service
If you're used to on-premises infrastructures, cloud platforms can seem daunting. But it doesn't need to be. This eBook written by the veteran IT consultant and trainer Paul Schnackenburg, covers all aspects of setting up and maintaining a high-performing Azure IaaS environment, including: • VM sizing and deployment • Migration • Storage and networking • Security and identity • Infrastructure as code and more!

The cloud computing era is well and truly upon us, and knowing how to take advantage of the benefits of this computing paradigm while maintaining security, manageability, and cost control are vital skills for any IT professional in 2020 and beyond. And its importance is only getting greater.

In this eBook, we’re going to focus on Infrastructure as a Service (IaaS) on Microsoft’s Azure platform - learning how to create VMs, size them correctly, manage storage, networking, and security, along with backup best practices. You’ll also learn how to operate groups of VMs, deploy resources based on templates, managing security and automate your infrastructure. If you currently have VMs in your own datacenter and are looking to migrate to Azure, we’ll also teach you that.

If you’re new to the cloud (or have experience with AWS/GCP but not Azure), this book will cover the basics as well as more advanced skills. Given how fast things change in the cloud, we’ll cover the why (as well as the how) so that as features and interfaces are updated, you’ll have the theoretical knowledge to effectively adapt and know how to proceed.

You’ll benefit most from this book if you actively follow along with the tutorials. We will be going through terms and definitions as we go – learning by doing has always been my preferred way of education. If you don’t have access to an Azure subscription, you can sign up for a free trial with Microsoft. This will give you 30 days 6 to use $200 USD worth of Azure resources, along with 12 months of free resources. Note that most of these “12 months” services aren’t related to IaaS VMs (apart from a few SSD based virtual disks and a small VM that you can run for 750 hours a month) so be sure to get everything covered on the IaaS side before your trial expires. There are also another 25 services that have free tiers “forever”.

Now you know what’s in store, let’s get started!

Exploring AIOps: Cluster Analysis for Events
AIOps, i.e., artificial intelligence for IT operations, has become the latest strategy du jour in the IT operations management space to help address and better manage the growing complexity and extreme scale of modern IT environments. AIOps enables some unique and new capabilities on this front, though it is quite a bit more complicated than the panacea that it is made out to be. However, the underlying AI and machine learning (ML) concepts do help complement, supplement and, in particular cases
AIOps, i.e., artificial intelligence for IT operations, has become the latest strategy du jour in the IT operations management space to help address and better manage the growing complexity and extreme scale of modern IT environments. AIOps enables some unique and new capabilities on this front, though it is quite a bit more complicated than the panacea that it is made out to be. However, the underlying AI and machine learning (ML) concepts do help complement, supplement and, in particular cases, even supplant more traditional approaches to handling typical IT Ops scenarios at scale.

An AIOps platform has to ingest and deal with multiple types of data to develop a comprehensive understanding of the state of the managed domain(s) and to better discern the push and pull of diverse trends in the environment, both overt and subtle, that may destabilize critical business outcomes. In this white paper, we will take a look at an AIOps approach to handling one of the fundamental data types: events.
CloudCasa - Kubernetes and Cloud Database Protection as a Service
CloudCasa™ was built to address data protection for Kubernetes and cloud native infrastructure, and to bridge the data management and protection gap between DevOps and IT Operations. CloudCasa is a simple, scalable and cloud-native BaaS solution built using Kubernetes for protecting Kubernetes and cloud databases. CloudCasa removes the complexity of managing traditional backup infrastructure, and it provides the same level of application-consistent data protection and disaster recovery that IT O

CloudCasa supports all major Kubernetes managed cloud services and distributions, provided they are based on Kubernetes 1.13 or above. Supported cloud services include Amazon EKS, DigitalOcean, Google GKE, IBM Cloud Kubernetes Service, and Microsoft AKS. Supported Kubernetes distributions include Kubernetes.io, Red Hat OpenShift, SUSE Rancher, and VMware Tanzu Kubernetes Grid. Multiple worker node architectures are supported, including x86-64, ARM, and S390x.

With CloudCasa, managing data protection in complex hybrid cloud or multi-cloud environments is as easy as managing it for a single cluster. Just add your multiple clusters and cloud databases to CloudCasa, and you can manage backups across them using common policies, schedules, and retention times. And you can see and manage all your backups in a single easy-to-use GUI.

Top 10 Reasons for Using CloudCasa:

  1. Backup as a service
  2. Intuitive UI
  3. Multi-Cluster Management
  4. Cloud database protection
  5. Free Backup Storage
  6. Secure Backups
  7. Account Compromise Protection
  8. Cloud Provider Outage Protection
  9. Centralized Catalog and Reporting
  10. Backups are Monitored

With CloudCasa, we have your back based on Catalogic Software’s many years of experience in enterprise data protection and disaster recovery. Our goal is to do all the hard work for you to backup and protect your multi-cloud, multi-cluster, cloud native databases and applications so you can realize the operational efficiency and speed of development advantages of containers and cloud native applications.

Choose Your Own Cloud Adventure with Veeam and AWS E-Book
Get this interactive Choose Your Own Cloud Adventure E-Book to learn how Veeam and AWS can help you fight ransomware, data sprawl, rising cloud costs, unforeseen data loss and make you a hero!

IDC research shows that the top three trigger events leading to a need for cloud services are: growing data, constrained IT budgets and the rise of digital transformation initiatives. The shift to public cloud providers like AWS offers many advantages for organizations but does not come without risks and vulnerabilities when it comes to data.

Get this interactive Choose Your Own Cloud Adventure E-Book to learn how Veeam and AWS can help you fight ransomware, data sprawl, rising cloud costs, unforeseen data loss and make you a hero!

AWS Data Backup for Dummies
Read this ultimate guide to AWS data backup and learn about the threats facing your data and what happens when things go wrong, how to take risk head on and build an AWS data backup and recovery plan, and the 10 cloud data points you must remember for a winning strategy.

So it turns out that data doesn’t protect itself. And despite providing what might be the most secure and reliable compute platform the Universe has ever seen, Amazon Web Services (AWS) can’t guarantee that you’ll never lose data either. To understand why that is, you’ll need to face your worst nightmares while visualizing all the horrifying things that can go wrong, and then boldly adopt some best‑practice solutions as you map out a plan to protect yourself.

Read this ultimate guide to AWS data backup and learn about the threats facing your data and what happens when things go wrong, how to take risk head on and build an AWS data backup and recovery plan, and the 10 cloud data points you must remember for a winning strategy.

Kubernetes Data Protection Without Tears
Catalogic Software is a modern data protection company providing innovative backup and recovery solutions including its flagship DPX product, enabling IT organizations to protect, secure and leverage their data. Catalogic’s CloudCasa offers cloud data protection, backup, and disaster recovery as a service for Kubernetes applications and cloud data services.
Catalogic Software is a modern data protection company providing innovative backup and recovery solutions including its flagship DPX product, enabling IT organizations to protect, secure and leverage their data. Catalogic’s CloudCasa offers cloud data protection, backup, and disaster recovery as a service for Kubernetes applications and cloud data services.

Download to learn more about

•    The Need to Protect Kubernetes Infrastructure
•    Why Use Container Cloud Services?
•    Holes in Enterprise Kubernetes Management Software
•    Why SaaS Container Data Protection?
•    Data Protection for Cloud-Native Applications and Infrastructure

The Evolution of Data Protection Cloud Strategies
This latest eBook, The Evolution of Data Protection Cloud Strategies give us an understanding of the current state of cloud data management and protection.

In this day and age, IT organizations are still learning about and adapting their cloud infrastructure. Many enterprises are either accelerating their move to the cloud or adopting cloud-native services and next-generation applications. Despite the benefits, there are still concerns around complexity, security, and management.

To help understand these concerns, Zerto sponsored new ESG research, which delves into these areas. Download the latest eBook, The Evolution of Data Protection Cloud Strategies to get an understanding of the following:

  • The current state of cloud data management and protection
  • An overview of critical concerns and challenges IT organizations will face
  • Backup and disaster recovery best practices for applications running in the cloud
  • Why and how to effectively protect your SaaS application data
Maximizing Monitoring With Automation
Since the 2015 merger, various teams within the now combined Springer Nature IT department—such as the network, SysAdmin, and infrastructure teams—from different countries and with different backgrounds, methodologies, and vendors—had to collaborate and consolidate. Learn how Springer Nature’s embracement of technology and customization allowed them to employ ways to work smarter, not harder—or more costly—to support various IT teams across the organization.

Since the 2015 merger, various teams within the now combined Springer Nature IT department—such as the network, SysAdmin, and infrastructure teams—from different countries and with different backgrounds, methodologies, and vendors—had to collaborate and consolidate.

Springer Nature was already using SolarWinds® solutions upon Senior Systems Monitoring Analyst Dave Morris’s arrival at the company. He recalls, “It was a smaller SolarWinds environment then, and we’ve since grown it. After the merger, many other legacy products were very niche, and we couldn’t justify the cost of maintaining them as they were no longer suitable for the needs of the company and team. We decided to focus on SolarWinds, and because we utilize so many SolarWinds modules and we keep growing it as we go, the environment—and the benefit we receive from SolarWinds—continues to build.”

Though the Springer Nature IT infrastructure is now immense, it’s managed by a team of two: Morris and Software Engineer Consultant Liam Miller. Together, they comprise the global systems monitoring team for the entire Springer Nature business. As proponents for SolarWinds and in introducing SolarWinds products to the internal IT teams, it has been a process of building a team’s confidence in what the solutions could deliver as they get used to newer ways of working and scalability.

See It, Fix It, Manage It: Ensuring Hybrid and Multi-cloud Applications Are Reliable and Secure
Most enterprises are moving to hybrid or multi-cloud architectures. Operating these environments requires IT teams to rethink their approach to monitoring and reporting on applications and environments. Cloud services differ in functions which makes achieving and maintaining a consistent configuration difficult but not impossible. A significant portion of companies plan to utilize third-party products, reducing some of the variability in feature capabilities across clouds to simplify management.

The author of this Pathfinder report is Mike Fratto, a Senior Research Analyst on the Applied Infrastructure & DevOps team at 451 Research, a part of S&P Global Market Intelligence. Pathfinder reports navigate decision-makers through the issues surrounding a specific technology or business case, explore the business value of adoption, and recommend the range of considerations and concrete next steps in the decision-making process.

This report explores the following topics:

  • the growth of already commonplace cloud usage for mission-critical applications
  • the importance of cloud governance
  • the top cloud security concerns for enterprises
  • the adoption of third-party tools for cloud management
  • the steps IT teams should take to make their cloud environments more secure and reliable