JetStream Software Presents the Economic Advantages of Cloud DR for VM Environments at Cloud Field Day
In a recent article, David Marshall takes a look at JetStream Software’s recent presentation at Cloud Field Day. The session explored the economic advantages of using cloud disaster recovery (DR) for virtual machine (VM) environments. JetStream Software showcased how their solution can help organizations leverage the cloud to improve their disaster recovery strategies, reduce costs, and enhance overall resilience. Read more at VMblog!
Read More:
Evolving API Landscape and Ensuring Secure Transitions With the Help of Noname Security
In this LinkedIn post, Lars Trøen reflects on his experience as a remote delegate at Security Field Day. He highlights the importance of API security in the rapidly evolving landscape of application programming interfaces (APIs). Trøen discusses the challenges faced in adapting to changing API standards and emphasizes the significance of making informed decisions and prioritizing web application security. Trøen also highlights the services offered by Noname Security, such as monitoring API calls and providing API testing, to facilitate smooth and secure API transitions.
Read More:
Evolving API Landscape and Ensuring Secure Transitions With the Help of Noname Security
Grokking a Cosmos’ Worth of Logs
In this thought-provoking article, Alex Neihaus expresses his skepticism towards the concept of “big data” and highlights the challenges of managing and extracting actionable insights from massive amounts of operational logging data. He references Cribl’s product, Stream, showcased at Security Field Day, which intelligently eliminates data noise and selectively ingests log data into any destination. By reducing unnecessary data, Stream not only offers cost savings but also enhances the quality and accuracy of analysis, allowing organizations to focus on the most relevant security information within their logging data.
Read More:
Grokking a Cosmos’ Worth of Logs
Cisco Rolls Out Industrial Ethernet Catalyst Switches for the Most Rugged Outdoor Deployments
Outdoor industrial environments can be harsh to enterprise switching and wireless equipment that are most suited to work in controlled indoor settings. That’s why Cisco has launched a new set of weather-proof industrial ethernet switches that are built to provide speedy connectivity in the most unfriendly locations. Read about the Cisco Catalyst IE9300 Rugged Series at Gestalt IT or watch the demo here at the website.
Read More:
Cisco Rolls Out Industrial Ethernet Catalyst Switches for the Most Rugged Outdoor Deployments
Edge to Cloud (To Edge) on the Biggest Stage on Earth
In the latest from The Tech Arena, Allyson Klein and Carl Moberg of Avassa discuss the complexities of delivering live broadcast media on a global scale. They bring up the transformation happening in the production side of the broadcast chain, highlighting the challenges of real-time video processing and the need for specialized infrastructure. They also share their thoughts on the future of production infrastructure, including the potential for cloud-based solutions and the importance of considering the specific requirements of each production scenario.
Read More:
Edge to Cloud (To Edge) on the Biggest Stage on Earth
Drilling Down Into the Invisible Parts of the Network With ThousandEyes
Uninterrupted visibility is no longer a privilege, but an absolute essential in today’s digital scene. ThousandEyes eliminates obscurity, bringing transparency and observability into the most complex IT environments, thus unlocking accelerated innovation. Read about the platform’s new capabilities at Gestalt IT, or watch the presentation on the website.
Read More:
Drilling Down Into the Invisible Parts of the Network With ThousandEyes
You Are Your APIs
In this article, Alex Neihaus discusses the emerging category of API security products and the potential security vulnerabilities posed by APIs. He highlights Noname Security’s product, which was outlined at Security Field Day 9. Alex is impressed with the capabilities of Noname’s API security solution, including its ability to analyze network traffic and categorize APIs based on public domain names. The post emphasizes the importance of API security in protecting businesses and encourages readers to consider adding API security to their security product arsenal.
Read More:
StorPool – Storage Delivery With Commodity Hardware the Right Way!
In this Gestalt IT Tech Note, Chris Childerhose discusses how StorPool is disrupting the storage scene with its software-defined storage solution. The platform overcomes the challenges faced by IT teams by allowing the use of any hardware while managing it homogeneously. With broad compatibility and being a fully-managed storage solution, StorPool aims to meet the needs of various sectors, including private/public clouds and managed service providers. Its unique architecture, data integrity, scalability, and hardware-agnostic approach set it apart in the storage market, offering cost savings and simplifying datacenter design. Rear more in this article, sponsored by StorPool Storage!
Read More:
StorPool – Storage Delivery With Commodity Hardware the Right Way!
Tech Field Day – Storage Field Day 25
Chris Childerhose posted about his experience as a Storage Field Day delegate and also mentions that he had the opportunity to write a blog post about StorPool Storage, emphasizing the value of delivering storage with commodity hardware. Check out his sponsored post at Gestalt IT for more!
Read More:
Tech Field Day – Storage Field Day 25
Login…rinse…repeat
In this LinkedIn post, Alex Neihaus discusses the challenges faced by cloud infrastructure architects, engineers, and developers when it comes to managing access to hosts and databases. He highlights the convenience of storing credentials in insecure locations and the need for a more secure solution. Alex introduces HashiCorp Boundary, a cloud-native infrastructure access management tool presented at Security Field Day that combines scalable proxying and cloud-native network constructs to solve these challenges. He emphasizes its secure and auditable nature, as well as its open-source architecture, which allows for internal examination and trust in enterprise environments.
Read More:
Secrets Are Difficult to Keep
HashiCorp is revolutionizing secrets management with their new offering, HCP Vault Secrets, as highlighted in Karen Lopez’s LinkedIn article. This solution provides organizations with a secure and flexible platform for storing, generating, and accessing sensitive information like API keys and passwords. With features such as tokenization, dynamic secrets, role-based access, and centralized management, Vault Secrets ensures the confidentiality and integrity of secrets across clouds and environments, while also offering auditing and compliance monitoring capabilities.
Read More:
Easy, Verified M&A With Forward Networks
Forward Networks can ease the process of integrating networks after a merger or acquisition, regardless of the platforms or deployments. The company builds a digital twin of an environment and collects information to model the network and provide comparison capabilities between points in time, ensuring better observability and pinpointing changes in the environment. Forward Networks supports data collection from all major cloud providers and most network security device manufacturers, which ensures path observability from end to end in multi-cloud, hybrid cloud, cloud-only, and on-premises-only deployments, while its Network Query Engine allows for positive or negative verification of intent. In this article, sponsored by Forward Networks, Remington Loose provides a look at this unique aspect of their solution.
Read More:
Easy, Verified M&A With Forward Networks
Meraki in the Enterprise ASTERISK
In this article, Sam Clements discusses the evolution of Meraki and its suitability for enterprise deployment. He highlights that over the years, Meraki has addressed various concerns, such as external antennas, firmware update controls, RF profiles, high gain antennas, and operating temperature. He also notes that with the integration of the Catalyst portfolio, Meraki now offers monitoring and insights for Catalyst 9800 WLCs through the dashboard, hinting at a potential future for configuration capabilities. Clements suggests that those who may have previously had reservations about Meraki should reconsider, as the platform continues to evolve and align with enterprise requirements.
Read More:
Meraki in the Enterprise ASTERISK
Out-Of-Band Management for Day 0, Day 1 and Day 2 Operations With Opengear Smart OOB
Opengear’s Smart Out-of-Band (OOB) solution is expanding and capable of serving customers for everyday use cases instead of just emergency scenarios. Opengear initially focused on console server access and sideline OOB management, providing features like Lighthouse software that offers centralized management for all Opengear appliances and deployed resources. The company’s Smart OOB provides reliable connectivity and a management plane for deployment, automation, and troubleshooting, and their enhancement, Routed Management Fabric, creates an overlay that enables routed IP access based on industry standards for people outside the serial space. Learn more by reading this article on Gestalt IT.
Read More:
Out-Of-Band Management for Day 0, Day 1 and Day 2 Operations With Opengear Smart OOB
MFD9 – Arista Lights Up Their Session With AGNI
At Mobility Field Day 9, Arista presented their Cognitive Campus architecture, including Arista Guardian for Network Identity (AGNI), which offers a cloud NAC solution that provides all the features of a modern architecture while maintaining scalability and security with multi-vendor support. Arista also announced UPSK, which can isolate clients or mark a shared resource, and a WIPS solution that uses different frames to force a target client to disconnect from an unauthorized WPA3 SSID using the multi-function radio integrated into all the Arista access points. Read this article by Mohammad Ali to learn more.
Read More:
MFD9 – Arista Lights Up Their Session With AGNI
Infusing Automation in EveryDay Networking Tasks With BackBox
Tech Field Day Extra at Cisco Live included a presentation from BackBox, which demonstrated its differentiated automation platform that simplifies day-to-day networking use cases involving upgrades, network configurations, and more. Additional features include 2300 pre-built scripts, hundreds of pre-configured automation blocks, hyperintelligent automation, and a rollback option in case of a failed update. This article from Gestalt IT goes into more detail on the BackBox solution.
Read More:
Infusing Automation in EveryDay Networking Tasks With BackBox
Cisco Introduce a Directional WIFI 6E Low Power Indoor (LPI) Access Point
Cisco introduced the Catalyst 9166D1 access point that delivers the required performance for high-density environments with its internal directional antenna feature, unlike the omnidirectional antenna access point provided by current regulation policies for Wi-Fi 6e deployment. The access point gives the same coverage pattern as previous products using a 6 dBi directional antenna but with fewer bulky cables and accessories, providing a more aesthetically pleasing solution for WLAN installations. Read this article by Mario Gingras to learn more!
Read More:
Cisco Introduce a Directional WIFI 6E Low Power Indoor (LPI) Access Point
Announcements From Cisco Live
In this episode of the Gestalt IT Rundown, Stephen Foskett and Jeff Ton discuss significant developments in the IT sector, including the recent Cisco Live event, which unveiled several new solutions for network management, Secure Service Edge, observability, and Panoptica, which offers end-to-end lifecycle protection for cloud native applications.
Read More:
Safe and Sound at Security Field Day 9
Security Field Day 9 promises to showcase how security companies and teams are addressing ever-evolving cybersecurity threats to keep users safe. A lineup of prominent security companies will present their innovative solutions to reduce security risks, ensuring a better and secure user experience. Broadcasting live on June 28 and 29, we will see presentations from Commvault, HashiCorp, NetAlly, Cisco, Cribl, and Noname Security, highlighting their approach to enhancing data security and protection focused on critical areas such as backups and disaster recovery, multi-cloud defense, and Data Loss Prevention (DLP). Learn more about Security Field Day in this video featuring Tom Hollingsworth!
Read More:
Safe and Sound at Security Field Day 9
Is the Topic of Security “dry as Dust?”
In preparation for Security Field Day, Alex Neihaus refutes the notion that enterprise security is a dry and boring topic, emphasizing its criticality as the existential risk in enterprise computing. Alex promises to provide updates on what he sees and learns at Security Field Day, which can be followed on his blog and Twitter page.
Read More: