Micro segmentation is the latest hot topic within the industry, based upon achieving a truly secure enterprise environment. As many modern breaches have proved, a perimeter-centric network security strategy for enterprise data centers is no longer adequate!Read More
I love Grand Designs, and am a big fan of Kevin Mc”Cloud”, but so often we watch the same challenges to any build on that show: slow construction (at least a year) and over-spend… but then it probably wouldn’t make a great television programme if the process always came in under budget and in a sixteenth of the time!
The challenges in Grand Designs aren’t any different to those in the IT world.Read More
OK, so everyone can agree that there has been a major shift in the way infrastructure is set up. The days of giant resource sucking data centres are up; with their endless racks of physical servers replaced by the virtualised idiom: virtual machines residing on a single host in which resources and power are efficiently and dynamically distributed, based on a business’ actual requirements. But whilst this is all very well for systems that are up and running, what about the actual build process for deploying virtual machines (VM)?Read More
Having recently attended VMWorld 2014 in Barcelona I was amazed at the volume of interest in VMWare's NSX platform. The official NSX launch has been much anticipated by the faithful and boy, we weren't let down! Besides the official keynote launch, there were dozens of workshops and hands on labs to get everyone started.Read More
It certainly does if you're in Enterprise IT.
I seem to be spending quite a lot of my time at the moment talking to customers about why it is so important to ensure that their IT infrastructures are “right sized”. We should call this the Goldilocks approach - not too much, not too little, but just right!Read More
I have long been of the opinion that the only way for cloud-like technologies, and ultimately the cloud market to really become viable to the enterprise is for cloud service providers to enable the mobility of workloads between one another. This may sound absurd as I am basically suggesting that customers would be able to move workloads to competitors unhindered. This goes against everything I.T. as for years vendors have always tried to keep things proprietary to prevent customers from easily adopting change, especially to competitors.Read More
System Virtualisation and the Software Defined Data Centre (SDDC) have lead to radical changes in how we design and implement security in our environments.
When designing a new environment, we need to consider the different paths of traffic that will need securing. These will be our North to South traffic: client to server, and East to West Traffic: server to server.
As with every design, it will be driven by the customer’s requirement, however this blog will hopefully provide some food for thought.Read More
With the birth of the virtualised environment, we are no longer restricted by the number of physical servers in our racks, so the number of servers can grow significantly and at a greater rate than before. In a virtualised environment, machines are deployed, moved or powered down frequently. In such a dynamic environment, keeping on top of the IP addresses, DNS records and Virtual machine IDs is very important. If manual intervention is required for all of these tasks, this will undoubtedly slow down the process, cutting into the benefits of a virtualised environment.Read More
In the technology driven world we live in, there is always a ‘new’ emerging technology that is the hot topic usually with a catchy acronym to back it up; one such topic is SDS – Software Defined Storage … What is it, and how does it fit in to the current IT landscape ?Read More
Software Defined Networks seems to be the big buzzword of the moment, well it certainly is in our office.
SDN brings core functions such as centralised control and automation to your virtualised networks, allowing new environments and networks to be spun up in a matter of minutes.
However with new technologies, there are always new security concerns.Read More