workloads
Why has Forrester’s Zero Trust Cybersecurity Framework become such a hot topic?
Let’s focus on the Zero Trust approach first. If your infrastructure was on the Internet, how would you design your organization’s cybersecurity framework? Authentication to confirm who logs into your infrastructure and multi factor authentication for your Admins? Would you encrypt everything? VPN…
3 Non-Negotiables for an Effective Data Center Security & Workload Protection Strategy
We know that big data is big business… And the use of on-premises and public cloud infrastructure is growing, according to the Cisco 2018 Security Capabilities Benchmark Study. In the 2017 study, 27 percent of security professionals said they are using off-premises private clouds, compared with 25 p…
Containers Hold an Agile Approach to Data Center Virtualization
According to the Merriam-Webster dictionary, container is a noun, and is defined as a receptacle for holding goods. Alternatively, it also means, a portable compartment in which freight is placed (as on a train or ship) for convenience of movement. In this blog, I’ll be talking about containers in t…
The Napkins Dialogues: Life of a Packet (Walk), Part 1
Lately I’ve been giving a lot of presentations about storage basics. I actually really enjoy it, because it makes me rethink some of the things that I took for granted, and it helps me understand some of the gaps in my own knowledge when questions arise. When you think of how we do certain thi…
#EngineersUnplugged S5|Ep10: Automation Demystified!
Welcome back to an amazing episode of Engineers Unplugged, featuring Alan Renouf (@alanrenouf) and Patrick Carmichael (@vmcarmichael) demystify automation in the modern data center in less than 10 minutes: built-in, scripts, workflow, and policy-based. Answers to your most answered questions about h…
3