Catchpoint BGP Monitoring

Catchpoint’s BGP Monitoring helps organizations track their networks and ensure they function at optimal levels. BGP is a complicated routing protocol used to provide information to several organizations on the web in terms of their routing peers, and each has an assigned Autonomous System Number (ASN). By monitoring such information, Catchpoint uses data center, ISP, and public route collectors to examine BGP performance, offering an overview of maintenance and usage costs, and displays charts and train tracks diagrams to highlight any issues. Catchpoint’s BGP dashboards provide useful, actionable, and straightforward information that is beneficial to clients. This article, sponsored by Catchpoint, is a follow-up to Peter Welcher’s previous discussion of their Networking Field Day presentation.


Multi-Cloud Security Requires Multi-Cloud Observability With Forward Networks

Network observability, which includes real-time contextual data for in-depth analysis towards securing resilient networks in today’s rapidly evolving digital world, is crucial for businesses. However, lack of a unified visibility solution across various cloud platforms makes observability harder to achieve in multi-cloud environments. Forward Networks took a proactive approach and deployed cloud digital twin observability into major cloud platforms, extending their cutting-edge digital twin technology to increase multi-cloud observability and security. The company’s solutions offer deep observability and enhance security through tools like Path, Posture, and Blast Radius. This article by Chris Grundemann, sponsored by Forward Networks, provides more insight following their appearance at Cloud Field Day 16.


Mako Networks – a World-Class PCI-Certified Network-As-A-Service Ecosystem

Mako Networks presented its own hardware and software as a service for retail edge at the recent Edge Field Day event, and this sponsored article by Ben Young dives deep into this concept. The company has made strides in the distributed retail enterprise business in North America and Europe, thanks to its all-in-one ecosystem. Mako technology is PCI-certified, making it a no-brainer choice for organizations that require ready compliance at the network layer, centralized management, and bulk configuration functionality.


Defending Against the Widening Threat Landscape With Racktop BrickStor SP

Despite smaller businesses believing they are not significant targets for ransomware attacks, they are increasingly vulnerable with 62% of information security incidents targeting the top 2.1% of businesses, according to public records. RackTop’s BrickStor SP (Security Platform) provides easy and automatic cyberstorage solutions for SMBs and large organizations alike, not only encrypting data and creating a rolling snapshot of every file but also providing high-speed monitoring for unusual activity to detect data modifications such as those in ransomware attacks. BrickStor SP’s scalability makes it a fitting solution for any businesses, regardless of their size or net growth. This Gestalt IT Tech Note, sponsored by RackTop, gives Jody Lemoine’s perspective.


Active Defense Against Ransomware With RackTop Systems’ BrickStor SP

RackTop Systems’ BrickStor SP is an active cyberstorage solution safeguarding data assets against cybersecurity breaches. The software leverages a zero-trust architecture built on continuous validation before access grant. BrickStor SP’s data-centric zero-trust principle analyzes every user interaction for potential security alerts and provides real-time detection and quick response and recovery against threats such as insider theft and ransomware attacks through built-in encryption, policy-based key rotation and auditing, and user and entity behavior analysis. This article by Gerard Kavelines, sponsored by RackTop, explores BrickStor from the perspective of a network security expert.


RackTop BrickStor – Protecting Data Against Ransomware

Data storage and security solutions provider, RackTop Systems, has introduced its BrickStor Security Platform (SP) that is designed to cover both insider and external threats to prevent ransomware attacks that have become prevalent in recent months. Karen Lopes explores their Data-Centric Zero Trust Policy approach in this sponsored article. It evaluates user behavior, account permissions, file activity, metadata about files and the user, and other features to protect unstructured data for SMB and NFS file shares, thereby enabling speedy detection and lock-out that saves money and time for the resumption of normal operations. The platform also identifies user behavior anomalies with User and Entity Behavior Analysis and, once detected, stops all access by that user that was the weak point.


The Power of Expertise at Ventev

Tom Hollingsworth explores Ventev’s capabilities in wireless antennas and enclosures. The company has experts in IoT and industrial segments, and provides solutions for a variety of wireless challenges, including hostile environments. Ventev’s IoT solutions, such as the integrated enclosure solution that matches Aruba switches, include AC, DC power, and UPS, ensuring the network’s safety during power outages. The combination of expertise in research and data analysis, antenna designs, and power suggests that it may be worth consulting with Ventev for almost any wireless project.


Identity-Centric and Data-Centric Security With RackTop BrickStor

RackTop Systems’ BrickStor is a comprehensive cyberstorage solution that helps organizations secure their digital assets from ransomware attacks with an identity-centric and data-centric approach. This sponsored article by Chris Grundemann explores the system’s zero trust architectures for the effective authorization of subject and resource ensuring only approved access is granted. BrickStor’s active security platform uniquely intersects identity and data-centric security with encryption, policy-based key rotation, auditing, and UEBA and SOAR capabilities to begin securing data from day one, over unstructured data.


Mako Networks – Security-First Networking at the Edge

At Edge Field Day, Mako Networks demonstrated their comprehensive set of network appliances and services that include security gateways, managed switches, and access points, to solve networking problems in the retail sector. Their Mako system, consisting of wireless and wired technology components, was designed from the ground up to comply with the widely-accepted PCI DSS Level 1 security standard, addressing the unique challenges of the retail, healthcare, and MNSP industry verticals and emphasizing the importance of organizations protecting customer data. Mako’s focus on security and serving the specific needs of these industries differentiates their product, making it a must-have solution for organizations with critical governance and compliance needs. This sponsored Tech Note by Carl Fugate explores the Mako offerings.


Catchpoint Excels at Internet Resilience

Catchpoint is a solution focused on monitoring the entire Internet stack, including applications and network traffic, with the goal of providing the best internet resilience. It offers the most global monitoring points for its customers to leverage, allowing candid reporting on external perceptions of performance as well as the hard Network performance data points. By providing comprehensive monitoring strategy, Catchpoint enables predictive insights, contingency planning, and continuous improvement over time, ensuring that users receive the best possible experience through the digital service delivery chain. Read more in this Gestalt IT article by Peter Welcher, sponsored by Catchpoint.


Composing a Harmonized Infrastructure With Solidigm and Supermicro

As data center workloads become more intensive, storage struggles to keep pace with CPU and memory in terms of speed and density increases. Composable infrastructure, like that offered by Solidigm, serves as an answer by presenting resources as and when they are needed, specifically the D5-P5430 Solidigm data center SSD. It’s a storage device that communicates via NVMe over PCIe gen 4.0 and is available in a U.2, E1.S, and E3.S form factor, with Solidigm using Enterprise Datacenter Standard Form Factor (EDSFF), a design that provides better density options than standard drive form factors while also being front-loading and hot-pluggable. This sponsored article by Andy Banta looks deeper at the Solidigm P5430 SSD family.


Solidigm and Supermicro Help Organizations Achieve Three Goals of Infrastructure Sustainability

Solidigm and Supermicro have collaborated on E3.S EDSFF SSDs to provide high-density NVMe QLC SSDs. Solidigm’s D5-P5430, which uses E3.S, EDSFF, and U.2 form factors, provides up to 30.72 TB per single SSD. The collaboration helps enterprises like hyperscalers and xSPs that need capacity-oriented storage to achieve three sustainability objectives, which include scaling storage density and reducing energy consumption. This sponsored article by Max Mortillaro explores the use case for the new P5430 SSD family.


Scale Computing Removes Problems at the Edge

“Scale Computing’s approach of removing the burden of routine tasks and fault remediation from customers is widely liked.” In this article presented by Scale Computing, Alastair Cooke discusses how Scale Computing is solving problems at the edge. Read his full thoughts on the Gestalt IT website, and watch Scale Computing’s full presentation from Edge Field Day on the Tech Field Day YouTube channel.


Achieving Dynamic Provisioning and Control at the Edge With Scale Computing

“Organizations that seek an edge infrastructure provider with seasoned experience deploying fleets of equipment across edge environments should seriously consider Scale Computing’s offerings.” In this article presented by Scale Computing, Allyson Klein writes about the success of Scale Computing’s deployment of edge solutions. Read her full thoughts on the Gestalt IT website.


Scaling the Edge With Zero Touch Provisioning and Scale Computing

Brian Chambers has this to say in his latest article on Gestalt IT’s website. “Scale Computing’s Zero Touch Provisioning and Sc//HyperCore solution appear to be great building blocks that organizations can place at the foundation of this new chapter.” Check out his full thoughts on Gestaltit.com


Micron Authenta: A Safety Seal for the Digital Age

Brian Knudtson reviewed Micron’s Authenta, which provides automatic, silicon-level integrity for a zero trust architecture. This article on Gestalt IT, sponsored by Micron, provides a review of Authenta following their presentation at Security Field Day in November 2022. Learn more about Micron Authenta by reading Brian’s article and watch their presentation videos on the Tech Field Day website!


118: GreyBeards Talks Cloud-Native Object Storage With Greg DiFraia, Scality and Stephen Bacon, HPE

In one of the latest GreyBeards On Storage Podcasts, Ray Lucchesi and Keith Townsend talk with HPE’s Stephen Bacon and Scality’s Greg DiFraia to talk about their joint partnership to release ARTESCA: a new cloud native object storage solution. The Scality-HPE solution ARTESCA was announced at a Tech Field Day Exclusive event last month where Ray was a delegate. On the podcast they discuss the direction of the IT world, edge solutions, and of course ARTESCA! Head over to the GreyBeards On Storage page to listen to the full, enlightening conversation


StorPool Review – Part 1 – Installation & Configuration

While attending Storage Field Day in 2019 as a delegate, Chris Evans had the chance to see StorPool present and was impressed with the their software. Chris just wrote the first part of a deep dive on StorPool and “how the distributed storage architecture works, how it performs and how it integrates into an on-premises public cloud strategy.” In Part 1, he takes an in-depth look into the underlying architecture and the concepts of the software as a whole. Be sure to check out the deep dive from Chris as well as the videos from StorPool’s multiple presentations on our website!


Kubernetes Persistent Storage Managed Well

Chin-Fah Heoh first saw StorPool back at Storage Field Day as a delegate more than a year ago and has followed their progress closely since then. In his blog, StorageGaga, he explores what he says are the many advantages of StorPool Storage and their market offering, including its expansion into managing Kubernetes services. Check out Chin-Fah’s full analysis of StorPool’s Kubernetes prowess on his blog.