Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 33 - 45 of 45 white papers, page 3 of 3.
UD Pocket Saves the Day After Malware Cripple’s Hospital’s Mission-Critical PCs
IGEL Platinum Partner A2U had endpoints within the healthcare organization’s finance department up and running within a few hours following the potentially crippling cyberattack, thanks to the innovative micro thin client.

A2U, an IGEL Platinum Partner, recently experienced a situation where one of its large, regional healthcare clients was hit by a cyberattack. “Essentially, malware entered the client’s network via a computer and began replicating like wildfire,” recalls A2U Vice President of Sales, Robert Hammond.

During the cyberattack, a few hundred of the hospital’s PCs were affected. Among those were 30 endpoints within the finance department that the healthcare organization deemed mission critical due to the volume of daily transactions between patients, insurance companies, and state and county agencies for services rendered. “It was very painful from a business standpoint not to be able to conduct billing and receiving, not to mention payroll,” said Hammond.

Prior to this particular incident, A2U had received demo units of the IGEL UD Pocket, a revolutionary micro thin client that can transform x86-compatible PCs and laptops into IGEL OS-powered desktops.

“We had been having a discussion with this client about re-imaging their PCs, but their primary concern was maintaining the integrity of the data that was already on the hardware,” continued Hammond. “HIPAA and other regulations meant that they needed to preserve the data and keep it secure, and we thought that the IGEL UD Pocket could be the answer to this problem. We didn’t see why it wouldn’t work, but we needed to test our theory.”

When the malware attack hit, that opportunity came sooner, rather than later for A2U. “We plugged the UD Pocket into one of the affected machines and were able to bypass the local hard drive, installing the Linux-based IGEL OS on the system without impacting existing data,” said Hammond. “It was like we had created a ‘Linux bubble’ that protected the machine, yet created an environment that allowed end users to quickly return to productivity.”

Working with the hospital’s IT team, it only took a few hours for A2U to get the entire finance department back online. “They were able to start billing the very next day,” added Hammond.

Modernized Backup for Open VMs
Catalogic vProtect is an agentless enterprise backup solution for Open VM environments such as RedHat Virtualization, Nutanix Acropolis, Citrix XenServer, KVM, Oracle VM, PowerKVM, KVM for IBM z, oVirt, Proxmox and Xen. vProtect enables VM-level protection and can function as a standalone solution or integrate with enterprise backup software such as IBM Spectrum Protect, Veritas NetBackup or Dell-EMC Networker. It is easy to use and affordable.
Catalogic vProtect is an agentless enterprise backup solution for Open VM environments such as RedHat Virtualization, Nutanix Acropolis, Citrix XenServer, KVM, Oracle VM, PowerKVM, KVM for IBM z, oVirt, Proxmox and Xen.  vProtect enables VM-level protection and can function as a standalone solution or integrate with enterprise backup software such as IBM Spectrum Protect, Veritas NetBackup or Dell-EMC Networker. It is easy to use and affordable.
Modernized Backup for Nutanix Acropolis Hypervisor
Catalogic vProtect is an agentless enterprise backup solution for Nutanix Acropolis. vProtect enables VM-level protection with incremental backups, and can function as a standalone solution or integrate with enterprise backup software such as IBM Spectrum Protect, Veritas NetBackup or Dell-EMC Networker. It is easy to use and affordable. It also supports Open VM environments such as RedHat Virtualization, Citrix XenServer, KVM, Oracle VM, and Proxmox.
Catalogic vProtect is an agentless enterprise backup solution for Nutanix Acropolis. vProtect enables VM-level protection with incremental backups, and can function as a standalone solution or integrate with enterprise backup software such as IBM Spectrum Protect, Veritas NetBackup or Dell-EMC Networker. It is easy to use and affordable.  It also supports Open VM environments such as RedHat Virtualization, Citrix XenServer, KVM, Oracle VM, and Proxmox.
Understanding Windows Server Hyper-V Cluster Configuration, Performance and Security
The Windows Server Hyper-V Clusters are definitely an important option when trying to implement High Availability to critical workloads of a business. Guidelines on how to get started with things like deployment, network configurations to some of the industries best practices on performance, security, and storage management are something that any IT admin would not want to miss. Get started with reading this white paper that discusses the same through scenarios on a production field and helps yo
How do you increase the uptime of your critical workloads? How do you start setting up a Hyper-V Cluster in your organization? What are the Hyper-V design and networking configuration best practices? These are some of the questions you may have when you have large environments with many Hyper-V deployments. It is very essential for IT administrators to build disaster-ready Hyper-V Clusters rather than thinking about troubleshooting them in their production workloads. This whitepaper will help you in deploying a Hyper-V Cluster in your infrastructure by providing step-by-step configuration and consideration guides focussing on optimizing the performance and security of your setup.
VMware vSphere 6.7 Update 1 Upgrade and Security Configuration
Most businesses hugely invest in tackling the security vulnerabilities of their data centers. VMware vSphere 6.7 Upgrade 1 tackles it head-on with its functionalities that aligns with both the legacy and the modern technology capabilities. Read this white paper to know how you can maximize the security posture of vSphere workloads on production environments.
Security is a top concern when it comes to addressing data protection complexities for business-critical systems. VMware vSphere 6.7 Upgrade 1 can be the right fit for your data centers when it comes to resolving security vulnerabilities thereby helping you to take your IT infrastructure to the next level. While there are features that align with the legacy security standards, there are some of the best newly announced functionalities in vSphere 6.7 like Virtual TPM 2.0 and virtualization-based security capabilities that will help you enhance your current security measures for your production workloads. Get started with reading this white paper to know more on how you can implement a solution of this kind in your data centers.
vSphere Troubleshooting Guide
Troubleshooting complex virtualization technology is something all VMware users will have to face at some point. It requires an understanding of how various components fit together and finding a place to start is not easy. Thankfully, VMware vExpert Ryan Birk is here to help with this eBook preparing you for any problems you may encounter along the way.

This eBook explains how to identify problems with vSphere and how to solve them. Before we begin, we need to start off with an introduction to a few things that will make life easier. We’ll start with a troubleshooting methodology and how to gather logs. After that, we’ll break this eBook into the following sections: Installation, Virtual Machines, Networking, Storage, vCenter/ESXi and Clustering.

ESXi and vSphere problems arise from many different places, but they generally fall into one of these categories: Hardware issues, Resource contention, Network attacks, Software bugs, and Configuration problems.

A typical troubleshooting process contains several tasks: 1. Define the problem and gather information. 2. Identify what is causing the problem. 3. Fix the problem, implement a fix.

One of the first things you should try to do when experiencing a problem with a host, is try to reproduce the issue. If you can find a way to reproduce it, you have a great way to validate that the issue is resolved when you do fix it. It can be helpful as well to take a benchmark of your systems before they are implemented into a production environment. If you know HOW they should be running, it’s easier to pinpoint a problem.

You should decide if it’s best to work from a “Top Down” or “Bottom Up” approach to determine the root cause. Guest OS Level issues typically cause a large amount of problems. Let’s face it, some of the applications we use are not perfect. They get the job done but they utilize a lot of memory doing it.

In terms of virtual machine level issues, is it possible that you could have a limit or share value that’s misconfigured? At the ESXi Host Level, you could need additional resources. It’s hard to believe sometimes, but you might need another host to help with load!

Once you have identified the root cause, you should assess the impact of the problem on your day to day operations. When and what type of fix should you implement? A short-term one or a long-term solution? Assess the impact of your solution on daily operations. Short-term solution: Implement a quick workaround. Long-term solution: Reconfiguration of a virtual machine or host.

Now that the basics have been covered, download the eBook to discover how to put this theory into practice!

Implementing High Availability in a Linux Environment
This white paper explores how organizations can lower both CapEx and OpEx running high-availability applications in a Linux environment without sacrificing performance or security.
Using open source solutions can dramatically reduce capital expenditures, especially for software licensing fees. But most organizations also understand that open source software needs more “care and feeding” than commercial software—sometimes substantially more- potentially causing operating expenditures to increase well above any potential savings in CapEx. This white paper explores how organizations can lower both CapEx and OpEx running high-availability applications in a Linux environment without sacrificing performance or security.
How to Get the Most Out of Windows Admin Center
Windows Admin Center is the future of Windows and Windows Server management. Are you using it to its full potential? In this free eBook, Microsoft Cloud and Datacenter Management MVP, Eric Siron, has put together a 70+ page guide on what Windows Admin Center brings to the table, how to get started, and how to squeeze as much value out of this incredible free management tool from Microsoft. This eBook covers: - Installation - Getting Started - Full UI Analysis - Security - Managing Extensions

Each version of Windows and Windows Server showcases new technologies. The advent of PowerShell marked a substantial step forward in managing those features. However, the built-in graphical Windows management tools have largely stagnated - the same basic Microsoft Management Console (MMC) interfaces had remained since Windows Server 2000. Microsoft tried out multiple overhauls over the years to the built-in Server Manager console but gained little traction. Until Windows Admin Center.

WHAT IS WINDOWS ADMIN CENTER?
Windows Admin Center (WAC) represents a modern turn in Windows and Windows Server system management. From its home page, you establish a list of the networked Windows and Windows Server computers to manage. From there, you can connect to an individual system to control components such as hardware drivers. You can also use it to manage Windows roles, such as Hyper-V.

On the front-end, Windows Admin Center is presented through a sleek HTML 5 web interface. On the back-end, it leverages PowerShell extensively to control the systems within your network. The entire package runs on a single system, so you don’t need a complicated infrastructure to support it. In fact, you can run it locally on your Windows 10 workstation if you want. If you require more resiliency, you can run Windows Admin Center as a role on a Microsoft Failover Cluster.

WHY WOULD I USE WINDOWS ADMIN CENTER?
In the modern era of Windows management, we have shifted to a greater reliance on industrial-strength tools like PowerShell and Desired State Configuration. However, we still have servers that require individualized attention and infrequently utilized resources. WAC gives you a one-stop hub for dropping in on any system at any time and work with almost any of its facets.

ABOUT THIS EBOOK
This eBook has been written by Microsoft Cloud & Datacenter Management MVP Eric Siron. Eric has worked in IT since 1998, designing, deploying, and maintaining server, desktop, network, and storage systems. He has provided all levels of support for businesses ranging from single-user through enterprises with thousands of seats. He has achieved numerous Microsoft certifications and was a Microsoft Certified Trainer for four years. Eric is also a seasoned technology blogger and has amassed a significant following through his top-class work on the Altaro Hyper-V Dojo.

Reducing Data Center Infrastructure Costs with Software-Defined Storage
Download this white paper to learn how software-defined storage can help reduce data center infrastructure costs, including guidelines to help you structure your TCO analysis comparison.

With a software-based approach, IT organizations see a better return on their storage investment. DataCore’s software-defined storage provides improved resource utilization, seamless integration of new technologies, and reduced administrative time - all resulting in lower CAPEX and OPEX, yielding a superior TCO.

A survey of 363 DataCore customers found that over half of them (55%) achieved positive ROI within the first year of deployment, and 21% were able to reach positive ROI in less than 6 months.

Download this white paper to learn how software-defined storage can help reduce data center infrastructure costs, including guidelines to help you structure your TCO analysis comparison.

Compliance Management with HyperCloud Solution Brief
Govern with built-in intelligence, that enables you to proactively manage costs and organizational compliance.
Govern with built-in intelligence, that enables you to proactively manage costs and organizational compliance.

Track and monitor your AWS resources for compliance with HyperCloud’s Compliance & Security dashboard. This dashboard provides granular details on resources in use organization-wide and, the AWS configuration rules that apply. You can monitor these rules real-time – drill down to resources that are not compliant and trace them to the relevant account to resolve compliance issues immediately.

As DevOps launch new services on AWS, monitor and track them real-time to ensure they stay compliant with your organizational policies. Proactively monitor to minimize risks and remediate to always ensure cloud hygiene.
Why Network Verification Requires a Mathematical Model
Learn how verification can be used in key IT processes and workflows, why a mathematical model is required and how it works; as well as example use cases from the Forward Enterprise platform.
Network verification is a rapidly emerging technology that is a key part of Intent Based Networking (IBN). Verification can help avoid outages, facilitate compliance processes and accelerate change windows. Full-feature verification solutions require an underlying mathematical model of network behavior to analyze and reason about policy objectives and network designs. A mathematical model, as opposed to monitoring or testing live traffic, can perform exhaustive and definitive analysis of network implementations and behavior, including proving network isolation or security rules.

In this paper, we will describe how verification can be used in key IT processes and workflows, why a mathematical model is required and how it works, as well as example use cases from the Forward Enterprise platform. This will also clarify what requirements a mathematical model must meet and how to evaluate alternative products.
ESG Report: Verifying Network Intent with Forward Enterprise
This ESG Technical Review documents hands-on validation of Forward Enterprise, a solution developed by Forward Networks to help organizations save time and resources when verifying that their IT networks can deliver application traffic consistently in line with network and security policies. The review examines how Forward Enterprise can reduce network downtime, ensure compliance with policies, and minimize adverse impact of configuration changes on network behavior.
ESG research recently uncovered that 66% of organizations view their IT environments as more or significantly more complex than they were two years ago. The complexity will most likely increase, since 46% of organizations anticipate their network infrastructure spending to exceed that of 2018 as they upgrade and expand their networks.

Large enterprise and service provider networks consist of multiple device types—routers, switches, firewalls, and load balancers—with proprietary operating systems (OS) and different configuration rules. As organizations support more applications and users, their networks will grow and become more complex, making it more difficult to verify and manage correctly implemented policies across the entire network. Organizations have also begun to integrate public cloud services with their on-premises networks, adding further network complexity to manage end-to-end policies.

With increasing network complexity, organizations cannot easily confirm that their networks are operating as intended when they implement network and security policies. Moreover, when considering a fix to a service-impact issue or a network update, determining how it may impact other applications negatively or introduce service-affecting issues becomes difficult. To assess adherence to policies or the impact of any network change, organizations have typically relied on disparate tools and material—network topology diagrams, device inventories, vendor-dependent management systems, command line (CLI) commands, and utilities such as “ping” and “traceroute.” The combination of these tools cannot provide a reliable and holistic assessment of network behavior efficiently.

Organizations need a vendor-agnostic solution that enables network operations to automate the verification of network implementations against intended policies and requirements, regardless of the number and types of devices, operating systems, traffic rules, and policies that exist. The solution must represent the topology of the entire network or subsets of devices (e.g., in a region) quickly and efficiently. It should verify network implementations from prior points in time, as well as proposed network changes prior to implementation. Finally, the solution must also enable organizations to quickly detect issues that affect application delivery or violate compliance requirements.
Restoring Order to Virtualization Chaos
Get Tighter Control of a Mixed VM Environment and Meet Your Data Protection SLAs Is virtualization bringing you the promised benefits of increased IT agility and reduced operating costs, or is virtualization just adding more chaos and complexity? Getting a grip on the prismatic environment of virtualized platforms – whether on-premises, in-cloud, or in some hybrid combination – is key to realizing virtualization’s benefits. To truly achieve better IT productivity, reduce costs, and meet ever mo
Get Tighter Control of a Mixed VM Environment and Meet Your Data Protection SLAs

Is virtualization bringing you the promised benefits of increased IT agility and reduced operating costs, or is virtualization just adding more chaos and complexity? Getting a grip on the prismatic environment of virtualized platforms – whether on-premises, in-cloud, or in some hybrid combination – is key to realizing virtualization’s benefits. To truly achieve better IT productivity, reduce costs, and meet ever more stringent service level agreements (SLAs), you need to create order out of virtualization chaos.

We’ll examine ways in which IT executives can more effectively manage a hybrid virtual machine (VM) environment, and more importantly, how to deliver consistent data protection and recovery across all virtualized platforms. The goal is to control complexity and meet your SLAs, regardless of VM container. In so doing, you will control your VMs, instead of allowing their chaos to control you!
top25