As IT professionals working within Large Enterprise environments and Data Centres we are constantly bombarded with new industry terminology. This can sometimes be a way of grouping similar concepts and approaches but when terminology takes hold then we are often guilty of “washing” every approach with the same detergent (so to speak). “Cloud” has probably been the most recent prevalent example of this but now we are increasingly met with the world of “Software Defined”. Software Defined Data Centre, Software Defined Networks, Software Defined Storage and Software Defined WAN – essentially insert your own word and hey presto it’s now Software Defined.Read More
We’re in an age where new competing technologies and architectures are constantly challenging the way we have delivered IT for years. We’ve all been exposed in some manner to “SDx” - Software Defined everything!
At Gyrocom we embrace the SDE (Software Defined Enterprise) and the associated benefits: vendor agnostic hardware and software driven intelligence. From the five key components that form the SDE (Compute, Networking, Storage, Automation & Management), my primary focus is on HCI (Hyper-converged Infrastructure) which is the consolidation of Compute and Storage into a single chassis.Read More
A lot has been written about how today’s I.T. Infrastructure security models are broken. The days of securing the perimeter and trusting everything and everybody inside are gone. To make such a statement may seem bold, but you only have to look to a recent Forrester survey* identifying the top three corporate security breaches as (1) the loss/theft of corporate assets; (2) inadvertent misuse by an insider and (3) external attacks targeting corporate systems, to understand that such a statement is far from bold and in fact a matter organisations should start to consider more seriously.Read More
System Virtualisation and the Software Defined Data Centre (SDDC) have lead to radical changes in how we design and implement security in our environments.
When designing a new environment, we need to consider the different paths of traffic that will need securing. These will be our North to South traffic: client to server, and East to West Traffic: server to server.
As with every design, it will be driven by the customer’s requirement, however this blog will hopefully provide some food for thought.Read More