Elevating the Zoom Experience With Juniper Networks’ Marvis
Juniper Networks has updated its AI assistant, Marvis, to include Zoom data and ChatGPT to improve its ability to respond to complex networking queries. Marvis combines AI, ML, and data science to expedite operations and optimize user experience. The AI-powered predictive observability offered by Marvis allows users to solve technical errors efficiently, as AI algorithms are trained on billions of datasets, enabling them to magnify nuances long before a problem becomes an anomaly that affects the user experience. Read about it at Gestalt IT or watch the demo on the website.
Read More:
Elevating the Zoom Experience With Juniper Networks’ Marvis
It’s Been a Year, Where Is Open Locate Now?
HPE Aruba Networking’s Open Locate offers a significant opportunity to leverage the potential of location services across industries and establish business insights. The tech uses remote GPS anchor points to improve the accuracy of location data, which will enable its use in critical areas such as worker safety, inventory management and asset tracking. However, the use and sharing of the data need to take into account privacy matters and consider carefully how to extract and transform the data to provide meaningful business value. Troy Martin, who attended Aruba Atmosphere in 2022 and 2023, considers the impact of Open Locate after a year.
Read More:
It’s Been a Year, Where Is Open Locate Now?
“So I Put the Directional Antenna IN the AP.”
Cisco’s Mobility Field Day 9 saw the unveiling of its 9166D1 directional antenna, which can substitute for traditional external antennas in almost any indoor application. The antenna design proves the company’s RF design skills, with additional features such as easier connectivity for Cat 6A patch cables. Fred Niehaus, TME at Cisco, highlighted the company’s 9166D1 as a simple, feasible solution for 6GHz and Wi-Fi 6 antennae, which eliminates the need for external antennae in most indoor applications and can be an affordable resource to resolve issues of connectivity, capacity and coverage. Read on for Field Day delegate John Kilpatrick’s thoughts on Cisco’s new access point design.
Read More:
“So I Put the Directional Antenna IN the AP.”
Cloud Field Day 17 Recap
Michael Levan gives an overview of Cloud Field Day 17, which included several innovative platforms useful for cloud computing and modernization. Platforms like HYCU, Morpheus Data, and RackN offer self-service and integration to aid in orchestration and provide better support. Zerto is a comprehensive VMware-based platform with backups based on detection and real-time alerting; Couchbase offers a vendor-agnostic NoSQL solution for cost optimization, and JetStream Software is an essential Disaster Recovery tool.
Read More:
JetStream Software at Cloud Field Day 17
In this article, Eric Wright reacts to the JetStream Software presentation from Cloud Field Day 17. JetStream Software showcased its disaster recovery (DR) solution for VMware, delivering a DBaaS platform that ensures extremely low recovery point objectives (RPO) and recovery time objectives (RTO). The architecture of the platform depends on JetStream Management Server appliance, IO filters, DR Replication Virtual Appliance, and object storage. Continuous failover facilitates near-zero RTO, whereas runbooks initiate recovery sequences scheduled on a manual, automated, or timely basis while allowing control to switch recovery site protection to an alternate site to minimize operational costs.
Read More:
JetStream Software at Cloud Field Day 17
Couchbase at Cloud Field Day 17
In this article, Eric Wright reacts to the Couchbase presentation from Cloud Field Day 17. Couchbase Capella is a promising database-as-a-service (DBaaS) platform for developers majorly focused on NoSQL. The platform targets performance and scalability needs while providing a flexible, unified and multi-tenant environment for all data services. Couchbase Capella is a cloud database platform for modern applications and showcases exceptional performance and functionality in a simple, fast, and affordable manner.
Read More:
Couchbase at Cloud Field Day 17
Zerto at Cloud Field Day 17
In this article, Eric Wright reacts to the Zerto presentation from Cloud Field Day 17. Zerto has launched version 10 of their platform which introduces several new features following their focus on ransomware resilience solutions. The product offers real-time discovery capabilities, a visualization tool named Zerto Analytics, a REST API documented with Swagger for interoperability, and a Vault to protect and store the company’s objects from ransomware threats, among many other functions. Zerto 10 is ideal for enterprises with significant VMware estates, as it tackles orchestration and automation to deliver self-service and manage hybrid clouds and modernize applications.
Read More:
Cloud NAC?
John Kilpatrick is skeptical of cloud NAC or “RADIUS in the cloud” solutions presented by Juniper and Arista at Mobility Field Day 9. These solutions aim to simplify RADIUS authentication, which has traditionally been complex. Kilpatrick wonders why anyone would adopt cloud NAC, as it involves placing a low-level resource farther from the user and reducing the control of platform dependencies, while also complicating learning and retaining one’s environment’s complexity.
Read More:
Fortinet Takes on Even Bigger Challenges With FortiAIOps V2.0
The world has moved on from training humans to code to teaching computers to do it themselves. Fortinet’s FortiAIOps v2.0 is a fine specimen of that. Powered by more advanced AI, the new version of FortiAIOps offers broad monitoring capabilities, deep analytics, and sophisticated troubleshooting tools. Read about it on Gestalt IT or watch the demo on the website.
Read More:
Fortinet Takes on Even Bigger Challenges With FortiAIOps V2.0
Excitement in the Air With Tech Field Day Extra at Cisco Live US 2023
Tech Field Day Extra returns to Cisco Live US 2023, featuring presentations from Cisco as well as Opengear and BackBox, streaming live on June 6 and 7. Tuesday begins with Opengear, followed by Cisco Enterprise, ThousandEyes, and Security. Wednesday features a presentation from BackBox and more presentations Cisco focused on IoT, Cloud and Compute, and Secure Policy. Check out the live stream on LinkedIn and the Tech Field Day website!
Read More:
Excitement in the Air With Tech Field Day Extra at Cisco Live US 2023
Morpheus Data at Cloud Field Day 17
In this article, Eric Wright reacts to the Morpheus Data presentation from Cloud Field Day 17. Morpheus Data is recognized as a leading platform for hybrid cloud management, proficient in the day-to-day orchestration the cloud for companies with VMware and public cloud IaaS infrastructure. The platform offers exceptional usability and operational simplicity to support developers, cloud administrators and operations teams with their distinct tasks and different environments, such as client/server, microservices-based applications on containerized environments. Morpheus Data focuses on lifecycle management, provides built-in templates and plugins and integrates monitoring tools to enable its clients to manage hybrid clouds and rebuild their applications in a cost-effective, efficient and secure way while enhancing agility with reduced cloud cost, rapid deployment, and faster provisioning.
Read More:
Morpheus Data at Cloud Field Day 17
RackN at Cloud Field Day 17
In this article, Eric Wright reacts to the RackN presentation from Cloud Field Day 17. RackN is a versatility platform with capabilities in distributed infrastructure orchestration, automation, and lifecycle. The company provides a solution for enterprise infrastructure management by focusing on resiliency and speed in operations that free up resources, reduce toil, and enable faster deployments. RackN leverages RackN Digital Rebar as a vendor-neutral infrastructure-as-code automation platform that enables IaC automation with reusable workflows and empowers developers to use their tool of choice, providing a highly reliable and consistent DevOps experience.
Read More:
HYCU and R-Cloud at Cloud Field Day 17
In this article, Eric Wright reacts to the HYCU presentation from Cloud Field Day 17. HYCU is aiming to tackle the significant risk and attack vectors present in an enterprise’s data protection. The explosion of data and increasing number of data-centric services being part of IT portfolios puts all data at risk for loss, data modifications, and ransomware. HYCU is leveraging its team’s diverse background and application-awareness approach to integrate partner products and apply data protection policies to simplify and optimize data protection across distribution systems and software as a service platforms. The company’s R-cloud platform further supports this effort by providing a low-code development structure for data protection solutions.
Read More:
HYCU and R-Cloud at Cloud Field Day 17
Defending Against the Widening Threat Landscape With Racktop BrickStor SP
Despite smaller businesses believing they are not significant targets for ransomware attacks, they are increasingly vulnerable with 62% of information security incidents targeting the top 2.1% of businesses, according to public records. RackTop’s BrickStor SP (Security Platform) provides easy and automatic cyberstorage solutions for SMBs and large organizations alike, not only encrypting data and creating a rolling snapshot of every file but also providing high-speed monitoring for unusual activity to detect data modifications such as those in ransomware attacks. BrickStor SP’s scalability makes it a fitting solution for any businesses, regardless of their size or net growth. This Gestalt IT Tech Note, sponsored by RackTop, gives Jody Lemoine’s perspective.
Read More:
Defending Against the Widening Threat Landscape With Racktop BrickStor SP
Active Defense Against Ransomware With RackTop Systems’ BrickStor SP
RackTop Systems’ BrickStor SP is an active cyberstorage solution safeguarding data assets against cybersecurity breaches. The software leverages a zero-trust architecture built on continuous validation before access grant. BrickStor SP’s data-centric zero-trust principle analyzes every user interaction for potential security alerts and provides real-time detection and quick response and recovery against threats such as insider theft and ransomware attacks through built-in encryption, policy-based key rotation and auditing, and user and entity behavior analysis. This article by Gerard Kavelines, sponsored by RackTop, explores BrickStor from the perspective of a network security expert.
Read More:
Active Defense Against Ransomware With RackTop Systems’ BrickStor SP
RackTop BrickStor – Protecting Data Against Ransomware
Data storage and security solutions provider, RackTop Systems, has introduced its BrickStor Security Platform (SP) that is designed to cover both insider and external threats to prevent ransomware attacks that have become prevalent in recent months. Karen Lopes explores their Data-Centric Zero Trust Policy approach in this sponsored article. It evaluates user behavior, account permissions, file activity, metadata about files and the user, and other features to protect unstructured data for SMB and NFS file shares, thereby enabling speedy detection and lock-out that saves money and time for the resumption of normal operations. The platform also identifies user behavior anomalies with User and Entity Behavior Analysis and, once detected, stops all access by that user that was the weak point.
Read More:
RackTop BrickStor - Protecting Data Against Ransomware
Analyzing Wi-Fi on Site With NetAlly CyberScope
As technology advances, network security for modern architectures must prioritize their legacy applications to support endless use cases while accommodating more dispersed and transitory users than ever with BYOD, utility management, digital signage, and the continuous expansion of new devices joining the network. NetAlly’s CyberScope offers sophisticated deep dive capabilities into device attributes, unauthorized endpoint discovery and easy-to-spot errors and failures allowing technicians to locate and analyze Wi-Fi site assessments on one all-in-one portable analyzer. Network managers can use CyberScope’s visibility to perform real-time security analysis, enabling them to stay updated and manage the network in a more efficient and secure manner with total visibility of the system. Read about it on Gestalt IT or watch NetAlly’s presentation of the solution on the website.
Read More:
Analyzing Wi-Fi on Site With NetAlly CyberScope
The Power of Expertise at Ventev
Tom Hollingsworth explores Ventev’s capabilities in wireless antennas and enclosures. The company has experts in IoT and industrial segments, and provides solutions for a variety of wireless challenges, including hostile environments. Ventev’s IoT solutions, such as the integrated enclosure solution that matches Aruba switches, include AC, DC power, and UPS, ensuring the network’s safety during power outages. The combination of expertise in research and data analysis, antenna designs, and power suggests that it may be worth consulting with Ventev for almost any wireless project.
Read More:
The Power of Expertise at Ventev
Identity-Centric and Data-Centric Security With RackTop BrickStor
RackTop Systems’ BrickStor is a comprehensive cyberstorage solution that helps organizations secure their digital assets from ransomware attacks with an identity-centric and data-centric approach. This sponsored article by Chris Grundemann explores the system’s zero trust architectures for the effective authorization of subject and resource ensuring only approved access is granted. BrickStor’s active security platform uniquely intersects identity and data-centric security with encryption, policy-based key rotation, auditing, and UEBA and SOAR capabilities to begin securing data from day one, over unstructured data.
Read More:
Identity-Centric and Data-Centric Security With RackTop BrickStor
Mako Networks – Security-First Networking at the Edge
At Edge Field Day, Mako Networks demonstrated their comprehensive set of network appliances and services that include security gateways, managed switches, and access points, to solve networking problems in the retail sector. Their Mako system, consisting of wireless and wired technology components, was designed from the ground up to comply with the widely-accepted PCI DSS Level 1 security standard, addressing the unique challenges of the retail, healthcare, and MNSP industry verticals and emphasizing the importance of organizations protecting customer data. Mako’s focus on security and serving the specific needs of these industries differentiates their product, making it a must-have solution for organizations with critical governance and compliance needs. This sponsored Tech Note by Carl Fugate explores the Mako offerings.
Read More: