Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 17 - 32 of 65 white papers, page 2 of 5.
PCI DSS Compliance
IT security has always been a major concern for businesses that accept online credit card payments. They hold sensitive information that malicious hackers are after: cardholder data and customer information. This is why businesses are legally obliged to build PCI DSS compliant IT infrastructures.

IT security has always been a major concern for businesses that accept online credit card payments. They hold sensitive information that malicious hackers are after: cardholder data. This is why such businesses are legally obliged to build IT systems and networks that are PCI DSS compliant.

What Is PCI DSS?
PCI DSS is a security standard developed by the PCI Security Standards Council. Designed for businesses that do online transactions and hold customers’ payment records, it helps them build and maintain secure IT systems and networks, ensuring the privacy and security of their customers’ credit-card details and cardholder data.

The set of standards defined in the PCI DSS are the minimum required level of computer systems security that must be in place when processing credit-card data. These standards apply to merchants, processors, financial institutions, service providers, and any other entity that store, process, or transmit credit-card and cardholder information.

Why Businesses Need to Be PCI DSS Compliant
The challenges of building and maintaining a PCI DSS–compliant network are many and depend on several factors—for example, the type of software used, the network setup, and the procedures in place. If organizations that process credit-card payments and store cardholder details fail to build PCI DSS–compliant networks and computer systems, they risk being fined up to $500,000 per month—or even worse, having their trading licence revoked.

This white paper explains how using Parallels Remote Application Server (RAS) can help organizations build scalable PCI DSS–compliant networks and also save on costs and administration overheads.

PrinterLogic and IGEL Enable Healthcare Organizations to Deliver Better Patient Outcomes
Healthcare professionals need to print effortlessly and reliably to nearby or appropriate printers within virtual environments, and PrinterLogic and IGEL can help make that an easy, reliable process—all while efficiently maintaining the protection of confidential patient information.

Many organizations have turned to virtualizing user endpoints to help reduce capital and operational expenses while increasing security. This is especially true within healthcare, where hospitals, clinics, and urgent care centers seek to offer the best possible patient outcomes while adhering to a variety of mandated patient security and information privacy requirements.

With the movement of desktops and applications into the secure data center or cloud, the need for reliable printing of documents, some very sensitive in nature, remains a constant that can be challenging when desktops are virtual but the printing process remains physical. Directing print jobs to the correct printer with the correct physical access rights in the correct location while ensuring compliance with key healthcare mandates like the General Data Protection Regulation (GDPR) and the Healthcare Insurance Portability and Accountability Act (HIPAA) is critical.

Healthcare IT needs to keep pace with these requirements and the ongoing printing demands of healthcare. Medical professionals need to print effortlessly and reliably to nearby or appropriate printers within virtual environments, and PrinterLogic and IGEL can help make that an easy, reliable process—all while efficiently maintaining the protection of confidential patient information. By combining PrinterLogic’s enterprise print management software with centrally managed direct IP printing and IGEL’s software-defined thin client endpoint management, healthcare organizations can:

  • Reduce capital and operational costs
  • Support virtual desktop infrastructure (VDI) and electronic medical records (EMR) systems effectively
  • Centralize and simplify print management
  • Add an essential layer of security from the target printer all the way to the network edge
UD Pocket Saves the Day After Malware Cripple’s Hospital’s Mission-Critical PCs
IGEL Platinum Partner A2U had endpoints within the healthcare organization’s finance department up and running within a few hours following the potentially crippling cyberattack, thanks to the innovative micro thin client.

A2U, an IGEL Platinum Partner, recently experienced a situation where one of its large, regional healthcare clients was hit by a cyberattack. “Essentially, malware entered the client’s network via a computer and began replicating like wildfire,” recalls A2U Vice President of Sales, Robert Hammond.

During the cyberattack, a few hundred of the hospital’s PCs were affected. Among those were 30 endpoints within the finance department that the healthcare organization deemed mission critical due to the volume of daily transactions between patients, insurance companies, and state and county agencies for services rendered. “It was very painful from a business standpoint not to be able to conduct billing and receiving, not to mention payroll,” said Hammond.

Prior to this particular incident, A2U had received demo units of the IGEL UD Pocket, a revolutionary micro thin client that can transform x86-compatible PCs and laptops into IGEL OS-powered desktops.

“We had been having a discussion with this client about re-imaging their PCs, but their primary concern was maintaining the integrity of the data that was already on the hardware,” continued Hammond. “HIPAA and other regulations meant that they needed to preserve the data and keep it secure, and we thought that the IGEL UD Pocket could be the answer to this problem. We didn’t see why it wouldn’t work, but we needed to test our theory.”

When the malware attack hit, that opportunity came sooner, rather than later for A2U. “We plugged the UD Pocket into one of the affected machines and were able to bypass the local hard drive, installing the Linux-based IGEL OS on the system without impacting existing data,” said Hammond. “It was like we had created a ‘Linux bubble’ that protected the machine, yet created an environment that allowed end users to quickly return to productivity.”

Working with the hospital’s IT team, it only took a few hours for A2U to get the entire finance department back online. “They were able to start billing the very next day,” added Hammond.

DPX: The Backup Alternative You’ve Been Waiting For
Catalogic DPX is a pleasantly affordable backup solution that focuses on the most important aspects of data backup and recovery: Easy administration, world class reliability, fast backup and recovery with minimal system impact and a first-class support team. DPX delivers on key data protection use cases, including rapid recovery and DR, ransomware protection, cloud integration, tape or tape replacement, bare metal recovery and remote office backup.
Catalogic DPX is a pleasantly affordable backup solution that focuses on the most important aspects of data backup and recovery: Easy administration, world class reliability, fast backup and recovery with minimal system impact and a first-class support team. DPX delivers on key data protection use cases, including rapid recovery and DR, ransomware protection, cloud integration, tape or tape replacement, bare metal recovery and remote office backup.
Data Protection and File Sharing for the Mobile Workforce
Critical data is increasingly created, stored and shared outside the data center. It lives on laptops, tablets, mobile devices and cloud services. This data is subject to many threats: malware, ransomware, hacking, device failure, loss or theft, and human error. Catalogic KODO provides a unified solution to these challenges with easy, automated protection of endpoints (laptops, mobile devices) and cloud services (Office 365, Box), along with organizational file sharing and synchronization.
Critical data is increasingly created, stored and shared outside the data center. It lives on laptops, tablets, mobile devices and cloud services. This data is subject to many threats: malware, ransomware, hacking, device failure, loss or theft, and human error.

Catalogic KODO provides a unified solution to these challenges with easy, automated protection of endpoints (laptops, mobile devices) and cloud services (Office 365, Box), along with organizational file sharing and synchronization.
Catalogic Software-Defined Secondary Storage Appliance
The Catalogic software-defined secondary-storage appliance is architected and optimized to work seamlessly with Catalogic’s data protection product DPX, with Catalogic/Storware vProtect, and with future Catalogic products. Backup nodes are deployed on a bare metal server or as virtual appliances to create a cost-effective yet robust second-tier storage solution. The backup repository offers data reduction and replication. Backup data can be archived off to tape for long-term retention.
The Catalogic software-defined secondary-storage appliance is architected and optimized to work seamlessly with Catalogic’s data protection product DPX, with Catalogic/Storware vProtect, and with future Catalogic products.

Backup nodes are deployed on a bare metal server or as virtual appliances to create a cost-effective yet robust second-tier storage solution. The backup repository offers data reduction and replication. Backup data can be archived off to tape for long-term retention.
Gartner Market Guide for IT Infrastructure Monitoring Tools
With the onset of more modular and cloud-centric architectures, many organizations with disparate monitoring tools are reassessing their monitoring landscape. According to Gartner, hybrid IT (especially with IaaS subscription) enterprises must adopt more holistic IT infrastructure monitoring tools (ITIM) to gain visibility into their IT landscapes.

With the onset of more modular and cloud-centric architectures, many organizations with disparate monitoring tools are reassessing their monitoring landscape. According to Gartner, hybrid IT (especially with IaaS subscription) enterprises must adopt more holistic IT infrastructure monitoring tools (ITIM) to gain visibility into their IT landscapes.

The guide provides insight into the IT infrastructure monitoring tool market and providers as well as key findings and recommendations.

Get the 2018 Gartner Market Guide for IT Infrastructure Monitoring Tools to see:

  • The ITIM market definition, direction and analysis
  • A list of representative ITIM vendors
  • Recommendations for adoption of ITIM platforms

Key Findings Include:

  • ITIM tools are helping organizations simplify and unify monitoring across domains within a single tool, eliminating the problems of multitool integration.
  • ITIM tools are allowing infrastructure and operations (I&O) leaders to scale across hybrid infrastructures and emerging architectures (such as containers and microservices).
  • Metrics and data acquired by ITIM tools are being used to derive context enabling visibility for non-IT teams (for example, line of business [LOB] and app owners) to help achieve optimization targets.
Futurum Research: Digital Transformation - 9 Key Insights
In this report, Futurum Research Founder and Principal Analyst Daniel Newman and Senior Analyst Fred McClimans discuss how digital transformation is an ongoing process of leveraging digital technologies to build flexibility, agility and adaptability into business processes. Discover the nine critical data points that measure the current state of digital transformation in the enterprise to uncover new opportunities, improve business agility, and achieve successful cloud migration.
In this report, Futurum Research Founder and Principal Analyst Daniel Newman and Senior Analyst Fred McClimans discuss how digital transformation is an ongoing process of leveraging digital technologies to build flexibility, agility and adaptability into business processes. Discover the nine critical data points that measure the current state of digital transformation in the enterprise to uncover new opportunities, improve business agility, and achieve successful cloud migration.
Digital Workspace Disasters and How to Beat Them
Desktop DR - the recovery of individual desktop systems from a disaster or system failure - has long been a challenge. Part of the problem is that there are so many desktops, storing so much valuable data and - unlike servers - with so many different end user configurations and too little central control. Imaging everyone would be a huge task, generating huge amounts of backup data.
Desktop DR - the recovery of individual desktop systems from a disaster or system failure - has long been a challenge. Part of the problem is that there are so many desktops, storing so much valuable data and - unlike servers - with so many different end user configurations and too little central control. Imaging everyone would be a huge task, generating huge amounts of backup data. And even if those problems could be overcome with the use of software agents, plus de-deduplication to take common files such as the operating system out of the backup window, restoring damaged systems could still mean days of software reinstallation and reconfiguration. Yet at the same time, most organizations have a strategic need to deploy and provision new desktop systems, and to be able to migrate existing ones to new platforms. Again, these are tasks that benefit from reducing both duplication and the need to reconfigure the resulting installation. The parallels with desktop DR should be clear. We often write about the importance of an integrated approach to investing in backup and recovery. By bringing together business needs that have a shared technical foundation, we can, for example, gain incremental benefits from backup, such as improved data visibility and governance, or we can gain DR capabilities from an investment in systems and data management. So it is with desktop DR and user workspace management. Both of these are growing in importance as organizations’ desktop estates grow more complex. Not only are we adding more ways to work online, such as virtual PCs, more applications, and more layers of middleware, but the resulting systems face more risks and threats and are subject to higher regulatory and legal requirements. Increasingly then, both desktop DR and UWM will be not just valuable, but essential. Getting one as an incremental bonus from the other therefore not only strengthens the business case for that investment proposal, it is a win-win scenario in its own right.
Reducing Data Center Infrastructure Costs with Software-Defined Storage
Download this white paper to learn how software-defined storage can help reduce data center infrastructure costs, including guidelines to help you structure your TCO analysis comparison.

With a software-based approach, IT organizations see a better return on their storage investment. DataCore’s software-defined storage provides improved resource utilization, seamless integration of new technologies, and reduced administrative time - all resulting in lower CAPEX and OPEX, yielding a superior TCO.

A survey of 363 DataCore customers found that over half of them (55%) achieved positive ROI within the first year of deployment, and 21% were able to reach positive ROI in less than 6 months.

Download this white paper to learn how software-defined storage can help reduce data center infrastructure costs, including guidelines to help you structure your TCO analysis comparison.

Preserve Proven Business Continuity Practices Despite Inevitable Changes in Your Data Storage
Download this solution brief and get insights on how to avoid spending time and money reinventing BC/DR plans every time your storage infrastructure changes.
Nothing in Business Continuity circles ranks higher in importance than risk reduction. Yet the risk of major disruptions to business continuity practices looms ever larger today, mostly due to the troubling dependencies on the location, topology and suppliers of data storage.

Download this solution brief and get insights on how to avoid spending time and money reinventing BC/DR plans every time your storage infrastructure changes. 
How Data Temperature Drives Data Placement Decisions and What to Do About It
In this white paper, learn (1) how the relative proportion of hot, warm, and cooler data changes over time, (2) new machine learning (ML) techniques that sense the cooling temperature of data throughout its half-life, and (3) the role of artificial intelligence (AI) in migrating data to the most cost-effective tier.

The emphasis on fast flash technology concentrates much attention on hot, frequently accessed data. However, budget pressures preclude consuming such premium-priced capacity when the access frequency diminishes. Yet many organizations do just that, unable to migrate effectively to lower cost secondary storage on a regular basis.
In this white paper, explore:

•    How the relative proportion of hot, warm, and cooler data changes over time
•    New machine learning (ML) techniques that sense the cooling temperature of data throughout its half-life
•    The role of artificial intelligence (AI) in migrating data to the most cost-effective tier.

Lift and Shift Backup and Disaster Recovery Scenario for Google Cloud: Step by Step Guide
There are many new challenges, and reasons, to migrate workloads to the cloud. Especially for public cloud, like Google Cloud Platform. Whether it is for backup, disaster recovery, or production in the cloud, you should be able to leverage the cloud platform to solve your technology challenges. In this step-by-step guide, we outline how GCP is positioned to be one of the easiest cloud platforms for app development. And, the critical role data protection as-as-service (DPaaS) can play.

There are many new challenges, and reasons, to migrate workloads to the cloud.

For example, here are four of the most popular:

  • Analytics and Machine learning (ML) are everywhere. Once you have your data in a cloud platform like Google Cloud Platform, you can leverage their APIs to run analytics and ML on everything.
  • Kubernetes is powerful and scalable, but transitioning legacy apps to Kubernetes can be daunting.
  • SAP HANA is a secret weapon. With high mem instances in the double digit TeraBytes migrating SAP to a cloud platform is easier than ever.
  • Serverless is the future for application development. With CloudSQL, Big Query, and all the other serverless solutions, cloud platforms like GCP are well positioned to be the easiest platform for app development.

Whether it is for backup, disaster recovery, or production in the cloud, you should be able to leverage the cloud platform to solve your technology challenges. In this step-by-step guide, we outline how GCP is positioned to be one of the easiest cloud platforms for app development. And, the critical role data protection as-as-service (DPaaS) can play.

Data Protection Overview and Best Practices
This white paper works through data protection processes and best practices using the Tintri VMstore. Tintri technology is differentiated by its level of abstraction—the ability to take every action on individual virtual machines. Hypervisor administrators and staff members associated with architecting, deploying and administering a data protection and disaster recovery solution will want to dig into this document to understand how Tintri can save them the majority of their management effort an

This white paper works through data protection processes and best practices using the Tintri VMstore. Tintri technology is differentiated by its level of abstraction—the ability to take every action on individual virtual machines.  In this paper, you’ll:

  • Learn how that greatly increases the precision and efficiency of snapshots for data protection
  • Explore the ability to move between recovery points
  • Analyze the behavior of individual virtual machines
  • Predict the need for additional capacity and performance for data protection

If you’re focused on building a successful data protection solution, this document targets key best practices and known challenges. Hypervisor administrators and staff members associated with architecting, deploying and administering a data protection and disaster recovery solution will want to dig into this document to understand how Tintri can save them a great deal of their management effort and greatly reduce operating expense.

Frost & Sullivan Best Practices in Storage Management 2019
This analyst report examines the differentiation of Tintri Global Center in storage management, resulting in receiving this award for product leadership in 2019. Businesses need planning tools to help them handle data growth, new workloads, decommissioning old hardware, and more. The Tintri platform provides both the daily management tasks required to streamline storage management, as well as the forward-looking insights to help businesses plan accordingly. Today Tintri technology is different
This analyst report examines the differentiation of Tintri Global Center in storage management, resulting in receiving this award for product leadership in 2019.  Businesses need planning tools to help them handle data growth, new workloads, decommissioning old hardware, and more. The Tintri platform provides both the daily management tasks required to streamline storage management, as well as the forward-looking insights to help businesses plan accordingly.  Today Tintri technology is differentiated by its level of abstraction—the ability to take every action on individual virtual machines.  Hypervisor administrators and staff members associated with architecting, deploying and managing virtual machines will want to dig into this document to understand how Tintri can save them the majority of their management effort and greatly reduce operating expense.
How to seamlessly and securely transition to hybrid cloud
Find out how to optimize your hybrid cloud workload through system hardening, incident detection, active defense and mitigation, quarantining and more. Plus, learn how to ensure protection and performance in your environment through an ideal hybrid cloud workload protection solution.

With digital transformation a constantly evolving reality for the modern organization, businesses are called upon to manage complex workloads across multiple public and private clouds—in addition to their on-premises systems.

The upside of the hybrid cloud strategy is that businesses can benefit from both lowered costs and dramatically increased agility and flexibility. The problem, however, is maintaining a secure environment through challenges like data security, regulatory compliance, external threats to the service provider, rogue IT usage and issues related to lack of visibility into the provider’s infrastructure.

Find out how to optimize your hybrid cloud workload through system hardening, incident detection, active defense and mitigation, quarantining and more. Plus, learn how to ensure protection and performance in your environment through an ideal hybrid cloud workload protection solution that:


•    Provides the necessary level of protection for different workloads
•    Delivers an essential set of technologies
•    Is structured as a comprehensive, multi-layered solution
•    Avoids performance degradation for services or users
•    Supports compliance by satisfying a range of regulation requirements
•    Enforces consistent security policies through all parts of hybrid infrastructure
•    Enables ongoing audit by integrating state of security reports
•    Takes account of continuous infrastructure changes

top25