Category Archives: Cloud Servers

Managing SAP on Power Systems with Cloud technologies delivers superior IT economics – Video



08-02-2012 14:51 An ideal and cost-effective platform for SAP solutions, IBM Power Systems combine optimizing architecture and virtualization capability to redefine SAP performance without exceeding IT budgets. Leveraging dynamic resource allocation and the ability to deploy SAP servers in a cloud, POWER7 can boost hardware utilization by more than 50% and cut energy consumption up to 75%. Read the ITG paper about running SAP on Power Systems here (ibm.co

See original here:

Managing SAP on Power Systems with Cloud technologies delivers superior IT economics - Video

Dell #1 in Hyperscale Servers (Steve Cumings) – Video



20-02-2012 09:22 DCS' Steve Cumings shares how Dell is #1 in hyperscale (cloud) servers, according to IDC data. dell.com/poweredgec dell.com/dcs

Go here to see the original:

Dell #1 in Hyperscale Servers (Steve Cumings) - Video

RootAxcess – Getting Started – Video



29-02-2012 22:02 This shows you the 3 easy steps to get started using the RootAxcess Cloud.

Original post:

RootAxcess - Getting Started - Video

How to Create a Terraria Server 1.1.2 (All Links Provided) – Video



29-02-2012 06:58 Follow me on Twitter!: twitter.com Find me on Facebook: http://www.facebook.com Donate Here: monstrx360gaming.blogspot.com Tshock3.7.0: cloud.github.com LogMeIn Hamachi [Download Unmanaged] : secure.logmein.com Any questions? Leave them below!

Original post:

How to Create a Terraria Server 1.1.2 (All Links Provided) - Video

ScaleXtreme Cloud-Based Patch Management Open for New Customers

SAN MATEO, Calif.--(BUSINESS WIRE)--

ScaleXtreme, the leading provider of server automation products for the distributed data center, has opened access to its recently launched cloud-based patch management automation solution for use in public cloud machines, virtual machines and physical servers. Anyone can now signup for ScaleXtreme and begin scanning their servers for operating system vulnerabilities. Customers enjoy the ability to schedule, deploy and automate patches for multiple machines in the enterprise or hosted at a public cloud provider. Patches for Windows 2003, Windows 2008, CentOS, Debian and Ubuntu are available immediately.

We worked closely with select early adopters to ensure the product works great and are now pleased to open this remarkable scanning and patching functionality to anyone with a ScaleXtreme account, said ScaleXtreme CEO and Co-Founder Nand Mulchandani. The demand for patch management from our community amazed us, dramatically exceeding our expectations.

The product enables customers to deploy patches on the fly or on a specific schedule, such as during periods of planned maintenance, making the experience easy for both systems administrators and IT managers. Patching is one of many server operations radically simplified by ScaleXtremes cloud-based automation engine, which allows customers to automate all of their routine server management tasks through a single framework.

Customers have come to expect the same security features they enjoy inside their firewall to be available in the public cloud, said Mulchandani. Effective patch management helps people safely begin to bring long-running, stateful servers into the public cloud, where they can be managed like any other server in the enterprise. No other security or systems management product that we know of can operate across physical servers, virtual machines and the public cloud in this fashion.

ScaleXtreme offers free patch scanning for all public cloud machines, virtual servers and physical servers through its free ScaleXtreme Xpress product. For more information, visit http://www.scalextreme.com/solutions/patch.

Additional ScaleXtreme Resources:

About ScaleXtreme

ScaleXtreme provides powerful, cloud-based server automation products for the modern distributed data center. Built from the ground up to be simple, scalable and social, IT gets a single unified automation platform to build and control physical, virtual and public cloud servers. For more information, visit http://www.scalextreme.com.

Read more here:

ScaleXtreme Cloud-Based Patch Management Open for New Customers

Ericsson joins OpenStack cloud infrastructure community

Ericsson has joined OpenStack as part of its plan to serve operators that want to become cloud computing providers.

OpenStack is an open source community that develops software for private and public clouds. The Swedish telecommunications vendor will contribute to help develop OpenStack to support carrier-grade services and applications.

The services and applications include a number of areas, according to Andrs Vajda, cloud management driver at Ericsson's Cloud Program. One of those areas is fault management, which is completely missing from OpenStack today. Ericsson is also planning to develop proper support for VMware, including the ability to migrate virtual machines between hosts, Vajda said.

The company will most likely contribute to help improve OpenStack's networking features, as well.

"There will always be a trade-off between what goes back into OpenStack, and what we use as an add-on on top. That is still not worked out completely internally," Vajda said.

At Mobile World Congress, Ericsson is demonstrating an upcoming management tool for OpenStack-based clouds. The demonstration uses a test bed consisting of three data centres, distributed across different continents. The tool is used to create and connect virtual data centres at each of the three physical locations, and join them together to form a distributed virtual private cloud.

The tool can also automate the deployment of cloud services or applications, and Ericsson has integrated an automated service-level agreement (SLA) resolution, as well. Along with technology from Telcordia, which Ericsson has acquired, the management tool will feed into Ericsson's recently announced Network-enabled Cloud concept.

"There are two main differentiating factors for operators compared to other cloud providers. One, they have a trusted relationship with their enterprise customers and the second one is their control of the network," Vajda said.

Ericsson's concept will allow operators to provision a cloud service and configure the network resources needed at the same time. That is something Amazon or other big public cloud providers can't do, according to Vajda.

The next step in Ericsson's cloud concept will be to start moving data centres out into the network. Many components in today's operator networks run on hardened Intel-based servers. Spare capacity on those servers is a tremendous resource that can be used for cloud services, according to Vajda.

Read the rest here:

Ericsson joins OpenStack cloud infrastructure community

BeyondTrust Launches PowerBroker Servers Windows Edition

CARLSBAD, Calif.--(BUSINESS WIRE)--

BeyondTrust, the leading provider of privilege delegation and authorization management solutions, today announced the industrys first privileged identity management (PIM) solution for Microsoft Windows-based Servers. The companys PowerBroker Servers Windows Edition delivers full protection from potential misuse or abuse outside the job responsibilities and specified tasks of users.

Historically, Microsoft has delivered closed user interfaces and complex management protocols making it incredibly challenging for enterprises to implement the least privilege approach, said John Mutch, CEO at BeyondTrust. PowerBroker Servers Windows Edition helps organizations overcome this obstacle by providing effective least privilege capabilities for Microsoft environments to minimize the risk of rogue administrators and to fulfill compliance driven auditing requirements.

PowerBroker Servers Windows Edition leverages Microsoft PowerShell, the emerging standard for contemporary Windows server administration, improving both security and auditing within organizations by enabling responsibility for key administrative tasks to be safely assigned to the appropriate people without disclosing the full administrative password. This provides the full power of administrative access for tasks such as adding administrator accounts and managing Microsoft Exchange mailboxes, while delivering full protection from potential misuse or abuse outside the specified job responsibilities, such as stopping services, erasing disks or doing more subtle damage.

The industry is driving organizations to embrace PowerShell methodology, but the trick is leveraging it to implement well-accepted security principles, said Brian Mehlman, director, program management at BeyondTrust. While its true that PowerShell features a native security model, the reality is that a monolithic approach to security represents vulnerability in and of itself. PowerBroker Servers Windows Edition introduces a rich feature-set, enabling policy controls to minimize the risk of rogue administrators by delivering the fine-grain controls companies need to get the most from the PowerShell technology.

PowerBroker Servers Windows Edition provides augmented event logs, logging all actions that were performed with elevated privilege as well as by whom they were performed. This audit trail, combined with the safe partitioning of full administrative privilege, provides an extremely secure means of controlling administrative access to Microsoft-based servers and applications, meeting compliance driven auditing requirements for regulated industries that require restricting access to computing resources based on an individuals responsibility, such as PCI.

The beauty of the Beyond Trust approach is in its elegance, said Don Jones, one of the world's leading experts on the Microsoft business technology platform. By intercepting all PowerShell traffic, BeyondTrust becomes a security gate. The solution can be configured with detailed Windows server and application permissions and it also creates the most detailed-possible log of all administrative activity.

For more information about PowerBroker Servers Windows Edition and the rest of the PowerBroker solutions visit http://www.beyondtrust.com.

About BeyondTrust

Founded in 1985, BeyondTrust is the global leader in privilege authorization management, access control and security solutions for physical, virtual, cloud and infrastructure computing environments. The companys products mitigate insider threats and secure the perimeter within across the enterprise, empowering IT governance to strengthen security, improve productivity, drive compliance and reduce expense.

Visit link:

BeyondTrust Launches PowerBroker Servers Windows Edition

IBM SmartCloud Virtualized Server Recovery – Video



24-02-2012 09:57 Visit http://www.ibm.com to learn more. Watch this video to see how IBM can help you improve recovery times for applications running on both virtualizaed and non-virtualized servers. IBM SmartCloud Virtualized Server Recovery lets you leverage the cloud for faster and more cost effective recovery of your applications in the event of a disaster.

Read more from the original source:

IBM SmartCloud Virtualized Server Recovery - Video

[NEC Report from MWC2012] NEC-Cloud-Marketplace – Video



27-02-2012 09:30 NEC Cloud Marketplace is one single access point for all the cloud services: Common environment to deliver Value Added Service for customers.

Read the original here:

[NEC Report from MWC2012] NEC-Cloud-Marketplace - Video

RSA and Zscaler Teaming Up to Deliver Trusted Access for Cloud Computing

SAN FRANCISCO, Feb. 28, 2012 /PRNewswire/ -- RSA® CONFERENCE --

News Summary:

RSA and Zscaler are collaborating to develop a new cloud-based solution to help secure access and identities in the cloud Cloud-based solution to integrate RSA's Cloud Trust Authority, RSA®'s Adaptive Authentication and Zscaler's Cloud Security service

Full Story:

RSA, The Security Division of EMC (NYSE: EMC - News) and Zscaler today announced they are jointly developing a cloud-based solution to assert continuous trust in identities accessing any web application or cloud service.  The solution is designed to help enable organizations to apply policy and control to identities even outside corporate networks, and simplify the challenge of managing user credentials associated with multiple cloud applications and web services.  The integration of risk-based authentication and identity federation from RSA's Cloud Trust Authority and RSA® Adaptive Authentication solutions along with the inline web security capabilities of Zscaler's Cloud Security service would enable a ubiquitous service for continuous, risk-aware identification of users accessing the Internet.

The solution will include strong user authentication, identity federation, and dynamic risk assessment based on device identification, user behavioral profiling, and vulnerability detection.  The combined service being developed will be engineered to help organizations mitigate the risks of data theft, service abuse, and other threats that stem from insufficient authentication, stolen credentials or compromised user devices and accounts.  By monitoring the behavior of authenticated users and environmental conditions, the developed service will create a dynamic risk profile that can be used by web applications to minimize the potential of access from compromised accounts, bots, and malware, while still ensuring a positive, simple user experience.

Analyst Quote

Phillip Hochmuth, IDC Analyst

"Enterprises are shifting mission-critical applications and data into the cloud, and users are becoming more mobile than ever.  As a result more and more access to enterprise resources is occurring from outside corporate networks, using devices not controlled by the enterprise IT teams.  Attackers know that they can often steal corporate data more easily by compromising user accounts, sessions and endpoints, rather than attacking the enterprise servers or SaaS applications directly.  Zscaler and RSA are developing the industry's only solution to this growing risk by integrating dynamic, behavior–based authentication with a global web security platform that protects users and data across all applications and web destinations."

RSA Executive Quote

Art Coviello, Executive Vice President, EMC Corporation and Executive Chairman, RSA

"Tight integration between trusted authentication and web security technology delivered as a cloud service will offer much needed defense to counter increasingly sophisticated threats in mobile and cloud environments. RSA provides risk-aware authentication which, when combined with Zscaler's Cloud Security service, will help enable continuous identity assurance and policy enforcement in the cloud." 

Zscaler Executive Quote

Jay Chaudhry, President and CEO, Zscaler

"Trust is no longer about simply identifying the user. With more devices accessing more applications and data from more locations, trust must be established and enforced dynamically. Through this development partnership with RSA, Zscaler will enhance security for our customers and the cloud services they depend upon, by continually and dynamically establishing trust." 

Joint Go-To-Market Initiatives

In addition to development of the cloud service to provide inline identity-awareness, both companies will also work together to jointly market and sell the combined solution.  

RSA and Zscaler are showing a proof of concept of this capability in their booths at the RSA® Conference. RSA will also demonstrate a beta version of the RSA® Cloud Trust Authority federation service.

Security and Compliance in the Post-PC World

Mobility and Cloud Computing change not only how and where organizations access information and applications but also how to manage ensuring trusted access, policy enforcement and even governance.  Ensuring and managing this trust becomes more complex as more and more IT services and sensitive information are accessed and consumed via devices, networks and applications that live entirely outside of corporate IT's direct control.  RSA outlines five key criteria that are essential to delivering security and compliance for this remote, hyper-extended world.

1. Authentication must move to the cloud.  To address increased mobility of end users, authentication itself must be delivered from the cloud regardless of user location.

2. Enterprise identity management must extend to the cloud.  Identity information confined within the enterprise must extend to the cloud rather than create multiple independent silos of identities. 

3. Trust must be constantly verified. Trust is the key component throughout the user session and must go beyond authentication at login to more confidently detect and prevent session compromise.

4. Security must be risk-based.  Risk-based controls and analytics need to adapt to the risk levels that exist as users travel to remote locations, utilize remote networks and access a broader variety of cloud and web-based applications.

5. Leverage an ecosystem.  Providing trust, visibility and control will require an ecosystem versus any single vendor solution.  Security must be built into the Internet directly across all devices and access methods wherever the user and information reside.  This requires an ecosystem of vendors working in concert.

Additional Resources

About RSA

RSA, The Security Division of EMC is the premier provider of security, risk and compliance management solutions for business acceleration. RSA helps the world's leading organizations solve their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance and securing virtual and cloud environments.

Combining business-critical controls in identity assurance, encryption & key management, SIEM, Data Loss Prevention, Continuous Network Monitoring, and Fraud Protection with industry leading eGRC capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform and the data that is generated. For more information, please visit http://www.EMC.com/RSA.

About Zscaler

Through a multi-tenant, globally-deployed infrastructure, Zscaler enforces business policy, mitigates risk, and provides twice the functionality at a fraction of the cost of current solutions. It enables organizations to provide the right access to the right users, from any place and on any device - while empowering the end-user with a rich Internet experience. For more information, visit us http://www.zscaler.com.

RSA and EMC are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries.  All other company and product names may be trademarks of their respective owners.

This release contains "forward-looking statements" as defined under the Federal Securities Laws.  Actual results could differ materially from those projected in the forward-looking statements as a result of certain risk factors, including but not limited to: (i) adverse changes in general economic or market conditions; (ii) delays or reductions in information technology spending; (iii) the relative and varying rates of product price and component cost declines and the volume and mixture of product and services revenues; (iv) competitive factors, including but not limited to pricing pressures and new product introductions; (v) component and product quality and availability; (vi) fluctuations in VMware, Inc.'s operating results and risks associated with trading of VMware stock; (vii) the transition to new products, the uncertainty of customer acceptance of new product offerings and rapid technological and market change; (viii) risks associated with managing the growth of our business, including risks associated with acquisitions and investments and the challenges and costs of integration, restructuring and achieving anticipated synergies; (ix) the ability to attract and retain highly qualified employees; (x) insufficient, excess or obsolete inventory; (xi) fluctuating currency exchange rates; (xii) threats and other disruptions to our secure data centers or networks; (xiii) our ability to protect our proprietary technology; (xiv) war or acts of terrorism; and (xv) other one-time events and other important factors disclosed previously and from time to time in the filings of EMC Corporation, the parent company of RSA, with the U.S. Securities and Exchange Commission.  EMC and RSA disclaim any obligation to update any such forward-looking statements after the date of this release.

Continue reading here:

RSA and Zscaler Teaming Up to Deliver Trusted Access for Cloud Computing