Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 11 of 11 white papers, page 1 of 1.
Examining the Effectiveness of Digital Twins in Network Modeling
A 451 Research survey examined the prevalence and effectiveness of shared data models and “digital twins” in network modeling from the perspectives of cloud, network, and security operations, examining how approaches to data sharing impacted each role and the interaction between these job functions. The survey responses illustrate the effectiveness of digital twins and indicate the relative digital maturity of each job function, showing where there is potential to improve efficiency.
A 451 Research survey examined the prevalence and effectiveness of shared data models and “digital twins” in network modeling from the perspectives of cloud, network, and security operations, examining how approaches to data sharing impacted each role and the interaction between these job functions.

The survey responses illustrate the effectiveness of digital twins and indicate the relative digital maturity of each job function, showing where there is potential to improve efficiency.
2022 US Password Practices Report
To raise awareness about the scale of the problem of weak passwords, Keeper Security, the leading provider of zero-trust and zero-knowledge cybersecurity software, is sharing findings about Americans’ password habits and practices. By raising awareness of the personal finances and data put at risk every day by weak, duplicate, and shared passwords, we hope to reduce the risk of cybercrime and promote better password practices among Americans.

Online passwords are used for many critical aspects of our lives. They are needed when we communicate, work, transact and travel. We use them to access our most sensitive data, from banking to health records. Digital passwords are the keys to our lives. Yet we are surprisingly negligent about password protection, from our choice of passwords to the means we use to remember them, and troublingly, our willingness to share sensitive passwords with others.
Keeper Security’s survey of 4,000+ respondents in the US and UK unearthed negligent attitudes toward password protection, in which passwords are being shared with spouses, written down on bits of paper, changed too often, and forgotten over 50 times per year! The result: nearly half of our 2,000 US survey respondents had been hacked at least once, with an average of $378 stolen per cyberattack. The consequences of poor password protection can be disastrous in an era of growing online crime and identity theft. A hacked password can result in ransacked bank accounts, obliterated credit ratings, damaged personal lives and severed business relationships.

Our findings show a troubling disconnect between the value people attach to their passwords and the means they use to protect them. In the US, people would rather see a dentist than lose their passwords, yet safe selection, storage, and management of passwords were found to be severely lacking in this study.

It is of great concern to see passwords being shared and duplicated across multiple platforms. It’s equally concerning to see the use of overly simple passwords, relying on publicly-available data, such as names and birthdays. This will remain an acute challenge as we continue to use a range of devices and platforms to access the internet. The impact of poor password protection was evidenced by the number of people in the survey reporting they’ve personally fallen victim to a cyberattack, resulting in financial loss and compromised social media profiles.

The ROI of a Network Digital Twin
A network digital twin is a digital model of the network that makes network data accessible and actionable to ensure the network behaves as expected and is secure. NetOps, SecOps, and CloudOps teams use this data to drastically reduce time spent diagnosing problems, leading to a more agile, reliable, and secure network. Read this eBook for more details on the financial return on aligning your team, simplifying troubleshooting, and avoiding outages by using a network digital twin.

Contents

  • What is a network digital twin?
  • Outages are expensive and preventable
  • A network digital twin saves time and money
  • Time is money
  • General use cases
    • Workflow automation
    • Inventory management
    • Automated compliance/audit
    • Change management
  • Network security use cases
    • Security posture verification
    • Incident response
    • Vulnerability management
  • Multi-cloud use cases
    • Continuous multi-cloud security audit
    • Service assurance
    • End-to-end visibility
  • Network operations use cases
    • Path verification/analysis
    • Outage prevention
    • Troubleshooting
Connecticut Orthopaedics Transforms Endpoint Management and Security with IGEL
Teaming with IGEL allowed Connecticut Orthopaedics to manage the security and deployment of its Windows OS-based endpoints more efficiently and gain better visibility.
Connecticut Orthopaedics significantly improved its endpoint management and security by adopting IGEL’s solution. This allowed the healthcare provider to move Windows into a VDI environment, replacing Windows at the endpoint with IGEL OS for over 700 daily users with diverse needs. The transition to IGEL was initiated in April 2023 and fully deployed by August 2023. It was a smooth transition, thanks to the support from IGEL and the diligent work of the healthcare provider’s IT team. IGEL’s Preventative Security Model provided a secure, manageable, and scalable platform, enabling a stronger Zero Trust framework and streamlined endpoint management. The deployment included over 650 endpoints running IGEL OS. This transition has led to minimal end-user feedback, indicating a seamless change. It has allowed the healthcare provider to gain real-time analytics across its endpoints, enhancing its operational efficiency and security posture.

Zero Trust and Enterprise Data Backup
Cyberattacks and ransomware target backup data in 93% of incidents, while existing Zero Trust frameworks often overlook backup and recovery security. Zero Trust Data Resilience (ZTDR), developed by Numberline Security and Veeam, extends Zero Trust principles to data backup. The ZTDR framework includes segmentation, multiple data resilience zones, and immutable backup storage. This white paper offers practical steps for implementing ZTDR, which improves data protection, reduces security risk

Cyberattacks and ransomware target backup data in 93% of incidents. Despite being primary targets for ransomware and data exfiltration, existing Zero Trust frameworks often overlook the security of data backup and recovery systems.
 
Zero Trust Data Resilience (ZTDR) is an innovative model that extends Zero Trust principles to data backup and recovery. Developed through a collaboration between Numberline Security and Veeam, ZTDR builds on the Cybersecurity and Infrastructure Security Agency's (CISA) Zero Trust Maturity Model (ZTMM).  
 
This framework provides a practical guide for IT and security teams to improve data protection, reduce security risk, and enhance an organization's cyber resilience.
 
The primary principles of ZTDR include:

  • Segmentation — Separation of Backup Software and Backup Storage to enforce least-privilege access, as well as to minimize the attack surface and blast radius.
  • Multiple data resilience zones or security domains to comply with the 3-2-1 Backup Rule and to ensure multi-layered security.
  • Immutable Backup Storage to protect backup data from modifications and deletions. Zero Access to Root and OS, protecting against external attackers and compromised administrators, is a must-have as part of true immutability. 

The white paper "Zero Trust and Enterprise Data Backup" details these principles and offers practical steps for implementation. 
 
What You'll Learn:

  • Security Enhancement: Core Zero Trust principles applied to data backup.
  • Implementation: Best practices for infrastructure segmentation and resilience zones.
  • Applications: Case studies on mitigating ransomware and cyber threats. 

Download the white paper and start your journey towards Zero Trust Data Resilience.

Understanding the VergeIO Architecture
Facing challenges with your virtualized infrastructure? The search for the right solution can be overwhelming, with VMware's complexities and costs, lackluster alternatives, and the escalating expenses of the Public Cloud. VergeIO's ultraconverged infrastructure (UCI) offers a streamlined, efficient approach that simplifies IT and cuts upfront and ongoing costs.
What You'll Learn:
  • Why on-premises data centers still relevant, and how can they be more cost-effective
  • How VergeOS integrates server virtualization, networking, and storage into a single unified code base, surpassing traditional HCI while supporting external storage.
  • The three pillars of UCI are a unified code base, three-dimensional scaling, and virtual data centers.
  • How VergeOS’s common sense, per server, licensing model saves you money.
  • How VergeIO’s multi-layered approach to ransomware resiliency and data protection provides the fastest recovery options with the least data loss.
The State of SaaS Data Resilience in 2024
The State of SaaS Data Protection in 2024 report highlights critical gaps in safeguarding cloud-based apps and data. Key findings: 61% of breaches originate from SaaS apps, 90% of businesses can't recover encrypted SaaS data within an hour, and leaders may underestimate SaaS usage. Get actionable tips to minimize vulnerability and ensure rapid backup and restore of SaaS data to avoid disruption.

The State of SaaS Data Protection in 2024 report reveals critical gaps in how businesses safeguard their cloud-based applications and data. Our research highlights:

Key highlights:

  • SaaS apps are a major vector for cyberattacks, with 61% of breaches originating via these platforms
  • 90% of businesses cannot recover encrypted SaaS data within an hour, leading to costly downtime
  • Business leaders may be unaware of the true scope of SaaS usage in their organizations, suggesting potential gaps in data protection
  • Underestimating SaaS usage and lack proper protection for critical systems like SSO and IAM
  • How the shared responsibility model places responsibility for data protection and recovery on customers

The report also provides tips for businesses seeking to minimize their vulnerability to cyberattacks—including the ability to backup and restore SaaS data rapidly to avoid business disruption.

Download the full report to understand the evolving threat landscape and learn how to strengthen your organization's SaaS data protection strategy.

Product Review: ExaGrid EX189
An independent review of ExaGrid’s newest and largest Tiered Backup Storage appliance: the ExaGrid EX189.

Enterprises facing rapidly growing backup demands and ever shrinking windows of opportunity need to rethink their data protection strategies. ExaGrid is the ideal solution as the Tiered Backup Storage systems deliver a smart scale-out solution, and the latest EX189 model takes density into the stratosphere with an industry-leading 12PB of raw backup capacity in 64U of rack space.

ExaGrid’s EX appliances are a natural choice for enterprise data backup and disaster recovery as they deliver an easily deployed, highly flexible and high performing scale-out storage solution. Their innovative data protection features keep ransomware attacks at bay and ExaGrid’s flagship EX189 appliance offers a huge backup capacity that defies belief.

Coretek Teams with IGEL to Transform VDI Deployment for a Defense Contractor
IGEL’s industry leadership has made it an integral part of Coretek’s on-premises VDI offering. This offering uses Nutanix in combination with Citrix VDI to deliver secure end-user access to virtual applications and desktops.

A defense contractor with whom Coretek has had a long-standing relationship spanning nearly two decades had attempted to migrate to a virtual desktop infrastructure (VDI) environment twice with another technology services provider without success. Impressed by Coretek’s success with VDI implementations in healthcare and other industries, the defense contractor turned to the solution provider for help.

Coretek's VDI offering has evolved significantly over the years to better support today's power users. Due to its industry leadership, IGEL OS is currently the standard for new customer VDI rollouts at Coretek. One of the things that the Coretek team appreciates most about IGEL OS is its high level of configurability, as well as IGEL’s commitment to staying current with trends in the EUC space by aligning IGEL OS with a broad ecosystem of leading vendors, including those providing unified communications and collaboration (UCC) applications and tools. In this particular case, IGEL OS, in combination with new Dell endpoint hardware, enabled Coretek to restore performance following a significant shift in the customer’s usage of its UCC tools.

The customer is currently utilizing high-performance VDI desktops, leveraging IGEL OS at the endpoint, to design defense equipment and support connectivity and collaboration through video conferencing. IGEL’s Preventative Security Model™ supports Zero Trust security approaches and partners with leading Secure Access Service Edge (SASE) vendors to complement and reinforce these solutions from a security standpoint.

Infographic: IGEL Preventative Security Model
Learn why the Preventative Security Model™ is at the center of your IT strategy for Now & Next
IGEL Preventative Security Model™ delivers a holistic solution for a secure digital workspace in unison with leading partner technologies. This infographic demonstrates how with IGEL OS at its core, the Preventative Security Model removes the endpoint vulnerabilities that are frequently exploited by bad actors, dramatically reducing the risk of cyberattacks and consequent disruption to business operations.
Florence Bank Teams with COCC and IGEL to Pivot from a Traditional to a Virtualized Desktop
The combination of COCC's iWorkstation and IGEL OS enables the community bank to connect its remote and hybrid workforces to VMware Horizon desktops while enhancing security, improving efficiencies, and reducing costs.
Florence Bank’s decision to adopt the COCC’s iWorkstation and IGEL has enabled the community bank to quickly modernize its IT infrastructure.

Since deploying COCC’s iWorkstation offering and IGEL OS within its virtual desktop infrastructure (VDI) environment, Florence Bank has streamlined its IT operations and improved the security of its endpoints.

IGEL’s Preventative Security Model, for example, provides a secure, manageable, and scalable platform, enabling a stronger Zero Trust framework and streamlined endpoint management.

The combination of the COCC iWorkstation and IGEL OS has also allowed Florence Bank to repurpose its aging hardware, in many cases extending its hardware refresh cycles by an additional five years, saving upwards of $100,000 to $150,000 in the process and enabling the community bank to take a phased approach when upgrading its desktop infrastructure.