The conservation of quantum information theory states information can neither be created nor destroyed. Stephen Hawking used this theory to explain how a black hole does not consume photons like a giant cosmic eraser. Outside the realm of quantum mechanics, we have the physical world of corporate offices. In this world, information is collected, curated, and consumed at an accelerated pace with each passing year. There is, however, one similarity between these two distinct realms: Data is never destroyed. We are a nation and a…
Operational technology (OT) networks have been around for decades, successfully managing industrial and manufacturing systems that monitor and control complex physical processes. These include everything from robots on a production line to the valves and pumps in oil and gas pipelines to the traffic management systems for trains. During this time, the underlying technology in OT networks has evolved from TDM to ATM to IP/MPLS and Segment Routing. Ensuring operational continuity is critical in OT networks because when an outage occurs, the potential consequences can…
Enterprise networks have evolved beyond just enabling the client-server apps of yesteryear. Your apps are no longer in your data centers, and your users are no longer in the office. Many infrastructure managers are wondering what that expensive WAN is really doing for them. It’s a fair question to ask in the era of cloud-centric hybrid workplaces. At the same time, as users have left the building, IoT and OT devices have proliferated. An enterprise WAN today is carrying less business application traffic and more…
Learn why IDS/IPS is not only relevant in the cloud but required for enterprises. As organizations moved to the cloud, many we’ve spoken with about securing workloads in public cloud asked an important question: since I don’t manage infrastructure anymore (well, mostly), do I still care about infrastructure-level security like IDS/IPS? The short answer is yes, you should. Here is why… As enterprises make the leap to the public cloud (AWS, Azure, Google Cloud Platform, and Oracle), some security problems fade (e.g., infrastructure patching, defending against…
Introduction Are you effectively managing the lifecycle of your IT assets? Achieving accurate and efficient lifecycle management requires a systematic approach—one that comprehensively tracks asset properties and their intricate relationships with both each other and the external world. This approach serves to harmonize the entire asset ecosystem, resulting in reduced operational costs, prolonged asset lifespan, and heightened situational awareness. The Importance of Systematic Lifecycle Management Effective asset management begins with the right tools. Unfortunately, traditional solutions often fall short, lacking the essential features, flexibility, and…
When it comes to global financial organizations, protecting multicloud environments from cyber threats is impossible without teamwork. Let’s explore the challenges of bringing together cybersecurity and cloud teams and how to overcome them. Accelerated multicloud transformations in the financial services industry is distributing sensitive data and assets across shared environments and pushing cloud and cybersecurity teams to work together more frequently. That’s creating complexity, as application owners with speed and agility in mind must work closer with cybersecurity teams that have a critical responsibility to…
Infinidat continues to enhance its award-winning enterprise storage solutions. Our announcement on September 20, 2023, adds a couple of significant capabilities to our InfiniBox SSA and Hybrid storage platforms. First, let’s talk about our capacity enhancements to our InfiniBox SSA II: We have doubled the capacity of our all-flash system. What does that mean and why is it important? It’s important because we are known for high performance at scale, doubling capacity while continuing to offer the best latency in enterprise workloads which is significant,…
Introduction It’s no secret that great engineers are difficult to find. As technology disciplines become increasingly siloed and advances continue at a rapid pace, talent acquisition is likely to remain challenging. From an engineer’s perspective, mastery is always temporary and learning emerging technologies is laborious. Meanwhile, business demands are pushing those same engineers to provide ever greater levels of service quality. Customers expect an interaction that is frictionless, secure, and rapid: an expectation that can only be met with the latest technologies. These demands require…
Agile Infrastructures bring hyper scale challenges Once narrowly defined as applications specifically built to run and scale on the cloud, the term “cloud native” has evolved to encompass any app built using cloud services. This broadening of the definition has led to the emergence of new terminology such as “hyper-scale” and “agile infrastructure” to describe cloud workloads designed to handle infinite scale – workloads built with containers, Kubernetes and serverless technologies. By design, hyper-scale applications are highly modular, with each component running in its own…
Public cloud providers have really begun to step up their game when it comes to security. Each provider offers a tool kit of cloud-native services to ensure that you’re able to adequately safeguard your applications and data that reside in their infrastructure. But as the industry begins to leverage services and storage from multiple cloud providers, building secure network connectivity that can transcend proprietary cloud networking constructs and work across multiple clouds can become increasingly challenging. In this article, we investigate the crucial factors and…