Our community is talking about the new Dell Technologies. Join the discussion in the Dell EMC Community Network:
This is an optional hotfix for 8.0 MR1 vWorkspace Connection Broker.
This release provides support for the following -
Hyper-V Catalyst Components support for fast provisioning virtual machines on remote SMB3 shares.
Download the hotfix here - https://support.software.dell.com/download-install-detail/5171908/5171908?prodjid=1-7GCB8-423
OpenStack has been selected to be a mentoring organization for Google Summer of Code 2014. Thanks to the hard work of many contributors we could join GSoC for the first time. For those who haven’ t heard about it, GSoC is a full-time internship supported by Google that offers students worldwide a stipend to start contributing with coding tasks to an open source organization. This is a great experience for both parts, as it generates a flow of new people with fresh ideas in the organization and allows students to learn and taste how is to work on a real world software development environment. Read more.
Apigee: API Security: the DevOps and CSO Perspectives (webcast & podcast)
APIs accelerate agility, empower developers, and enable innovative business strategies. But how do you ensure the security of your API architecture as you expose your corporate data to mobile apps, developers, and partners? Does your API security framework enable DevOps agility and a scalable security model for IT? Read more.
Apigee: Big Data Predictive Analytics in Action: Healthcare/Medicare
For healthcare payers, the Affordable Care Act can be a double-edged sword. The law, which was enacted to improve health care affordability and quality, enforces more stringent reporting rules that require payers (insurers) to monitor quality of care, performance metrics, and member satisfaction. But high performance and quality can earn healthcare payers a coveted five-star rating on their Medicare Advantage products. Not surprisingly, there’ s a big incentive to improve this rating, and maintain a high one. Predictive analytics can play a very important role in this. Read more.
Chef: DevOps for developers w/Chef. Part II – DevOps in a nutshell
DevOps is a modern way of developing software by aligning the goals, processes and tools of development and operations with one another., see “ DevOps for Developers” , 2012. Core facets of DevOps include measurement, metrics and monitoring, improving the flow of features in a holistic approach as well as improving and accelerating delivery, e.g. with automation to gain fast feedback. Automation is important! But simplify your process first prior to automation. This helps to reduce variations in the process. Variations impede successful automation. Read more.
Puppet Labs: Scaling Puppet workflows at Spotify
Erik Dalen talks about Scaling Puppet workflows at Spotify at Puppet Camp Amsterdam 2014. Watch the video.
Puppet Labs: Writing better Puppet code with Gerrit and Jenkins
Maxim Burgerhout talks about " Writing better Puppet code with Gerrit and Jenkins" at Puppet Camp Amsterdam 2014. Watch the video.
Vagrant: Feature Preview: Vagrant Share
A primary goal of Vagrant is not only to provide easy-to-use development environments, but also to make it easy to share and collaborate on these environments. With Vagrant 1.5, we're introducing a feature that will allow you to share your running Vagrant environment with anyone, on any network connected to the internet. Read more.
CERN: Our Cloud in Havana
At CERN, we started our production cloud service on Grizzly in July 2013. The previous OpenStack clouds had been pre-production environments with a fixed lifetime (i.e. they were available for use with an end date to be announced where the users would move to the new version via re-creating instances with tools such as Puppet or snapshot/upload instances). With the Grizzly release, we made the service available with an agreement to upgrade in place rather than build anew. This blog details our experiences. Read more.
Dell: OpenStack Summit Atlanta 2014: Please vote for our presentations!
OpenStack community members are invited to vote on presentations to be presented at the OpenStack Summit, May 12-16, in Atlanta. Please vote for Dell's submissions. Read more.
eNovance: Next OpenStack Release? It’s now time to vote for talks
Next spring again, the community is going to design our future OpenStack release. Together, developers, users and companies are building and sharing thoughts about ‘How OpenStack is going to be most scalable – the most efficient – the most Open Source Cloud that ever existed?’ eNovance is proud to be part of this community project and to be an active contributor to the code. Read more.
eNovance: Use the new asyncio module and Trollius in OpenStack
Asynchronous programming is hard. In the past, the Nova project used Tornado, then Twisted and it is now using eventlet which also became the defacto standard in OpenStack. Eventlet is not perfect, we will explain why we consider that eventlet has major flaws. We will then introduce the asyncio module of Python 3.4, how we plan to use it in OpenStack, to finish with the current status of this integration. Read more.
eNovance: Status of the OpenStack port to Python 3
Python 3 has been around for about 5 years, and we have excellent reasons to make sure OpenStack runs well on it. Unfortunately, this is not the case. In this article, we’ll see what works, what doesn’t, and what you can do to help. Note that we are targetting the latest released version, Python 3.3. Read more.
Inktank: Multisite Storage with Inktank Ceph Enterprise
Support for multi-site operations is one of the most sought after Ceph features. If you’re an enterprise, you may want to store your data in multiple locations to ensure business continuity in the case of a regional outage. If you’re a service provider deploying a public object storage service, multiple sites can help provide the lowest possible latency to your users. We recommend a few different approaches for multi-site operation with Inktank Ceph Enterprise, each with their own characteristics and applicable use cases. This document discusses these options and explains the use cases they serve best. Read more.
Jamie Lennox: Client Session Objects
Keystoneclient has recently introduced a Session object. The concept was discussed and generally accepted at the Hong Kong Summit that keystoneclient as the root of authentication (and arguably security) should be responsible for transport (HTTP) and authentication across all the clients. The majority of the functionality in this post is written and up for review but has not yet been committed. I write this in an attempt to show the direction of clients as there is currently a lot of talk around projects such as the OpenStack-SDK. Read more.
Mirantis: Awesome Proposals for the Spring OpenStack Summit
Mirantis (and our friends at Cloudscaling) has submitted a variety of great session abstracts, from my discussion on updating the OpenStack Mission Statement to disrupt large player competitive barriers and keep the stack open for innovation to Randy Bias’ walkthrough of hybrid cloud landmines to avoid when architecting applications. Below, we’ve summarized each talk and provided a link to its page on the voting site. You get to shape the OpenStack Summit agenda by voting up the sessions that you’d like to see. Read more.
Mirantis: Mirantis Spring OpenStack Summit Proposals, Part 2
On Friday we brought you part 1, a selection of proposals Mirantis is putting forward for the Spring OpenStack Summit in Atlanta, along with a complete list of titles. Today we wanted to share more details on some of those additional titles. Read more.
Mirantis: Building test environments with OpenStack
According to last October’s OpenStack user survey, QA test environments are one of the top ten workloads running on OpenStack clouds. In this post, I’ll describe how staging environments are built, and explore ways that OpenStack can make this process easier and more efficient. Read more.
Mirantis: Trusted Cloud computing with Intel TXT: The challenge
In today’s connected environments, attacks on compute infrastructure are ubiquitous. Major players have been compromised by hackers and malware, with damages inflicted both to their reputation and their business. Protecting the infrastructure from external and internal threats is an important part of operating production grade cloud environments. Read more.
Opensource.com: Crowdsourcing the OpenStack Summit agenda
The OpenStack Foundation recently launched their voting tool for rating presentation proposals for the OpenStack Summit in Atlanta, May 12-16. While the chairs for each track make the final decisions about which presentation topics make the cut, voting is a great way for the community to get involved and participate in the agenda-setting process. Listing all the talks would be difficult, but in keeping with the theme of our Beginners in Open Source Week, here are a few that might appeal to beginners. Read more.
Piston: Piston OpenStack 3.0: One Step Closer to Every Server in the World
From day one, my co-founders and I set out to deliver the world an enterprise-grade OpenStack software that was secure, free of vendor lock-in, and easy to use. And with this week’s launch of Piston OpenStack 3.0, we continue to make good on that promise. Read more.
Rackspace: Inside My Home Rackspace Private Cloud, OpenStack Lab, Part 3: Installing A High Availability Rackspace Private Cloud With Chef Cookbooks
In the first two posts I covered the basics: what hardware is involved and the basic network services that form the basis of my Rackspace Private Cloud install. In this post, I set up Rackspace Private Cloud to give an OpenStack environment consisting of highly available Controllers running as a pair with services such as the OpenStack APIs, Neutron, Glance and Keystone and three compute servers allowing me flexibility to do some testing. Read more.
Rackspace: Software Defined Networks in the Havana Release of OpenStack
Software Defined Networks (SDN) are a key technology in enabling users of cloud environments to build a wide variety of virtual environments. The OpenStack network project, Neutron, has been growing at a rapid pace to the point that the OpenStack user can build virtual machines (VM) into various flexible network implementations. This can present a challenge to OpenStack administrators who may not have a clear understanding of the technologies that OpenStack uses to create these virtual networks. This is the first in a series of articles that will look closely how OpenStack Neutron implements these virtual networks. Through the course of these articles we will look in detail how virtual networks are created in Neutron, how data in different networks in kept separate and security features built into the security group functionality. Read more.
Rackspace: Software Defined Networks in the Havana Release of Openstack – Part 2
In the first article in this series we looked at a simple OpenStack setup with one controller node, one compute node and one network node. Two tenants had been created with two simple networks. In this article we will turn our attention to the network paths for each of the three VMs that were created. The diagrams in the first article will be useful in understanding this discussion. Read more.
Rackspace: Advancing The Open Cloud Movement
OpenStack continues to grow and reach impressive milestones, confirming that our commitment to an open standards-based cloud was the right technological and philosophical choice for Rackspace and our customers. This week, we’re expanding upon that openness by joining a new open project – Pivotal’s Cloud Foundry Foundation. The goal of Cloud Foundry is to create portability across Infrastructure-as-a-Service (IaaS) technologies, including OpenStack, AWS and Vmware. Read more.
Rackspace: Taking OpenStack For A Spin: Using The Rackspace Private Cloud Sandbox
Late last year, we released Rackspace Private Cloud (RPC) 4.2.1, which is based on the Havana release of the OpenStack cloud platform. Along with this RPC release, Rackspace also made available version 1.0 of the Rackspace Private Cloud Sandbox, a virtual appliance that runs an all-in-one single node RPC VM that allows anyone to quickly spin up a small OpenStack environment for test and demonstration purposes. This virtual appliance is distributed as an OVA package and can be imported and used in Oracle VM VirtualBox, VMware Fusion, VMware Player or VMware Workstation. The Sandbox was a direct result of your feedback. You said you wanted to be able to experiment with RPC or to demonstrate the OpenStack Horizon dashboard to colleagues or managers; however, you did not want to have to spend time installing a Chef server and running through a full RPC install for these tasks. So in response, the RPC Product team created the RPC Sandbox so you can get a small OpenStack-based cloud environment up and running in minutes on your laptop or workstation. Read more.
Red Hat: OpenStack Summit Session Voting Closes Soon – Your Vote Counts!
With the voting polls open for the past week, the OpenStack Foundation is collecting votes for all sessions at this Spring’s OpenStack Summit in Atlanta. Red Hat is doing its part to contribute as many innovative and useful session to the agenda. With a variety of sessions submitted, from low-level discussions on network routing and storage, all the way through real-world success stories that share experiences and lessons learned with deploying an OpenStack cloud, we’ve got a great lineup to offer you. Read more.
SUSE: SUSE Cloud 3 Now Available, Based on OpenStack Havana Release
SUSE today announced the general availability of SUSE Cloud 3, the next version of the original enterprise-ready OpenStack distribution for building Infrastructure-as-a-Service private clouds. SUSE Cloud 3 provides customers with greater flexibility to cost effectively deploy private clouds with existing virtualized data centers by delivering full support for VMware vSphere® through integration with VMware vCenter Server™. Read more.
SwiftStack: Great Swift Sessions to Vote-up for OpenStack Summit Atlanta 2014
The polls are now open for you and your friends to exercise the power of the vote. The Icehouse release in May ’14 will be the biggest ever in terms of new capabilities for OpenStack Object Storage. So it is only fitting that a such large number of sessions are in the running for inclusion in the OpenStack Summit in Atlanta this May. Sessions are proportional to the popularity and buzz of OpenStack Swift. Read more.
TelekomCloud DevOps team: Ceph Performance Analysis: fio and RBD
With this blog post we want to share insights into how the Platform Engineering team for the Business Marketplace at Deutsche Telekom AG analyzed a Ceph performance issue. Ceph is used for both block storage and object stroage in our cloud production platform.
XLCloud: How we plan to manage autoscaling using the new notification alarming service of Ceilometer
In this post, I'd like to describe how we plan to use the new alarming capabilities offered in Heat and Ceilometer to be notified of stack state changes resulting from an autoscaling operation. Indeed, with Icehouse, it will be possible to specify an new type of alarm whereby you can associate a user-land defined webhook with an autoscaling notification. Read more.
Cloudera: Apache Hadoop 2.3.0 is Released (HDFS Caching FTW!)
Hadoop 2.3.0 includes hundreds of new fixes and features, but none more important than HDFS caching. The Apache Hadoop community has voted to release Hadoop 2.3.0, which includes (among many other things) iIn-memory caching for HDFS, including centralized administration and management, groundwork for future support of heterogeneous storage in HDFS and simplified distribution of MapReduce binaries via the YARN Distributed Cache. Read more.
Some users are using the MSRA (Microsoft Remote Assistance) in their infrastructure to connect remotely to client nodes. We think that’s pretty great- MSRA allows you to be flexible with the user like VNC, but secure and safe like Remote Desktop; it’s really the best of both worlds. The problem is that after the admin configures the K1000 Machine Action in General Configuration it may not always work…
To offer Remote Assistance to users you should configure the appropriate GPO in your domain controller, to allow a specific user or group to offer the assistance.
To set that up:
Select “Allow helpers to remotely control the computer” then select Helpers. Select the domain group that will be able to offer Remote Assistance.
You can now use Machine actions from your K1000 or K2000 to connect to another machine and share the session! Something like this might work well for most of you:
Name: Windows Vista/7/8/2008/2012 Initiated Command Line:
MRSA %WINDIR%\system32\msra.exe /offerRA KACE_HOST_IP
Microsoft has more details on the GPO, command line, security, and anything else you may need- but the info above is enough to get most of you going. We hope that you found this information helpful. For other suggestions like this, be sure to visit ITNinja.com, blog.kace.com and the Dell KACE Support Knowledge Base.
As the cost of electricity is continuing to rise, power companies are offering rebate opportunities for organizations who take a “green” and energy efficient approach to managing their business. So why have so many organizations been slow to adopt power management initiatives?
The main reason is that power settings management is a burdensome task and the actual return on investment is not always so easy to calculate. Organizations also need users’ machines available for patches, software installation, and remote access, which often results in desktops and laptops being left running after work hours, wasting energy and money.Still, organizations today are more focused than ever on their environmental impact. They want to save money, as well as energy. But first they need to know: Can the challenges of implementing power management be overcome? What are the potential cost savings? And what should they look for in a tool to help? This white paper explains it all.
Download By the Numbers: Lowering Energy Costs at the Desktop and learn how to overcome the challenges of power management.
6 March 2014, 3:00 PM CET
Please join for an OpenStack overview webcast, featuring Cloud Computing Strategist John Rhoton, Mirantis CMO and Co-Founder Boris Renski, and Mirantis expert Nick Chase:
Sign up today!
About the presenters
Boris Renski | CMO and Co-Founder, Mirantis
Boris is responsible for helping define Mirantis' strategic vision and executing on it in the martketplace across the OpenStack ecosystem and beyond. He has also held executive and leadership roles in a range of technology companies over the last 15 years, and serves on the Board of Directors for the OpenStack Foundation.
John Rhoton | Cloud Computing Strategist
John is a technology strategist, specialized in consulting to global enterprise customers with a focus on public, private, and hybrid cloud computing. He speaks regularly at industry events on emerging technologies such as mobility, social networking, and virtualization. He is the author of 7 books, including Cloud Computing Explained (2009), Cloud Computing Architected (2011), and Cloud Computing Protected (2013).
Nick Chase | Technical Product Marketing, Mirantis
With 20+ years' experience as a developer and author, Nick has written several books and hundreds of articles as an IBM developerWorks Certified Master Author. He also founded NoTooMi.com and has done Web application development for companies such as Alcatel-Lucent, Sun Microsystems, Oracle, and the Tampa Bay Buccaneers.
SharePoint 2013 makes great advances in data storage with its new “shredded storage” feature, which helps slow storage growth from file versions. Yet those file BLOBs are still stored in SQL Server, exacerbating SharePoint performance demands.
What is shredded storage?
Shredded Storage in brief can be viewed as an extension of the MS-FSSHTTP work to provide more efficient transfer of files between client and server. Shredded Storage, effectively distributes a single BLOB, or monolithic stream, across multiple partitions. When a user updates a file, only the partition that corresponds to the change is updated. The net result is smoother IO patterns, and more efficient utilization of storage when using historical version.
Why do we need it?
All the trends in SharePoint storage, collaboration and clients add up to more storage demands on SQL content databases. And we know SQL content databases, out of the box, work best at smaller sizes.
But we know you want to empower users with rich content and collaboration experiences, and that usually means more storage. Remote BLOB Storage, or RBS, lets you shift your content BLOBs (binary large objects) outside of SQL to file systems, SANs, or NAS devices. At Dell Software, our shredded storage compatible RBS solution, Storage Maximizer for SharePoint, helps you manage RBS with an easy rules-based engine to identify content to move outside SQL.
What are the best practices for configuring SharePoint shredded storage with/without RBS enabled?
Shredded storage and RBS together give you more options for performance tuning your storage subsystems. We’ve been conducting extensive research in our Dell laboratory on SharePoint 2013 storage performance with shredded storage and RBS turned on and off. As a note, for those on SharePoint 2010, we conducted testing that show RBS boosting file throughput over 50%.
For our tests, we ran file uploads and downloads across a broad range of file sizes using a Dell Software internal performance metrics generator. A performance metrics generator uploads and downloads small, medium and large files to a SharePoint 2013 site by varying the shred size and minimum RBS size, and then records the time taken to perform each operation. Our mid-level results are noted below:
It should be noted that these numbers will vary from one environment to another. Different hardware environments could give different results. On the whole we found that a shred size of around 1250 KB and minimum RBS size of around 1MB gives better performance results.
Get your hands on the full published Dell Software research and recommendations on ideal shred and blob sizes for optimum performance in this technical brief.
We’re continuing our research into innovative new technologies to enhance SharePoint 2013. We look forward to helping you transform your SharePoint.
As many current customers who own one or more of our Compellent Storage Center array solutions knows, Dell's Enterprise Solution Group does quite a bit of testing around their storage products. For several years - with our EqualLogic Peer Storage array solutions - we have been very open about providing important information that customers and partners can - and should - use as part of their SAN planning process. Dell TechCenter has been the "Go To" site for whitepapers, configuration guides, and other great technical content about Dell Storage products.
Today, we are applying that same policy towards some of our Storage Center products. As of today, you can now view the list of tested components for our Compellent Storage Center arrays. This list, previously only available to existing Compellent customers via the Customer Portal, and Dell sales partners via the Partner Portal, is now available on Dell TechCenter.
So, what kind of information can you find in the Compatibility Matrix?
At a high level, you can find the following:
Why is this list important?
While Dell supports any standards based SAN component, we can't test all of them...there are just too many HBAs, CNA, switches, operating systems, etc. So, by building your SAN with components that Dell has specifically listed - i.e. components we have specifically tested - you can be assured that your SAN will have a greater chance of successful implementation and that Dell will have the knowledge and experience to provide top-notch support...not that we don't already do this.
Is this a Support List?
No! Dell's Storage Center array solutions are built around industry standards. As long as a SAN component adheres to these standards, it should work fine. Dell will provide support to any Compellent customer, whether the SAN consists of only listed components or not. That being said, experience with unlisted components can be limited. We may not know how to optimize the component for best performance, we may have to work with the vendor to resolve some issues, and there may be those rare times where there is a true compatibility issue that either Dell or the component vendor will need to address in a future product update, BUT Dell's CoPilot support team is top notch and always provides the best care possible to their customers...and they will do so for all of our customers...fear not!
If you have any questions, or recommendations, please feel free to comment on this blog post or on the document WIKI page...I will review all of your comments and respond in a timely fashion.
The Compellent Compatibility Matrix is available for your enjoyment!
By Todd Peterson, senior product marketing manager, Identity and Access Management, Dell Software
We are pleased to announce that the Info Security Products Guide, the industry's leading information security research and advisory guide, recognized three of Dell’s Identity and Access Management solutions in the 2014 Global Excellence Awards last night, at RSA. In the Products and Services Excellence category, Dell™ One Identity Manager-Data Governance Edition took the Gold award for Best Security Service (New or Updated version), while Dell™ One Identity Cloud Access Manager earned a Bronze award for Cloud Security, and ChangeAuditor also took the Bronze for Compliance.
Further recognition for our IAM portfolio came from the Bronze award presented in the Best Deployments (USA) category for the Dell KACE customer case study, "Dell Helps Pepperdine University Secure Devices against “Drive-by” Malware." Pepperdine deployed Dell KACE Endpoint Systems Management Appliances to reduce vulnerability to “drive-by” downloads of information stealers, extortion-ware and spambots from mobile devices used to access the university’s network. The school also used Dell KACE K1000 Systems Management Appliance to perform device discovery and inventory of hardware and software to enable asset tracking and compliance reporting, and the Dell KACE K2000 Deployment Appliance to improve patching. In addition to these awards, Dell also was a grand trophy winner.
All of these solutions are part of our comprehensive Connected Security product portfolio, and the industry recognition reflected in these awards is testament to our best-in-breed solutions’ success at solving our customers’ pain points. Our holistic Connected Security approach protects against threats both known and unknown, from all perimeters of the corporate network ─ inside out , and outside in. It embeds security into the fabric of software, and governs access to every application and protects every device.
We know attackers are looking to worm their way into the network any place they can find a disconnect in the security perimeter, and that’s why our Connected Security solutions not only protect from the data to the endpoint to the cloud, they also provide deeper insights and stronger predictive analytics to quickly foil security threats, regardless of the direction from which they attack.
Hi Community, here is my compilation of the most interesting technical blog posts written by members of the Microsoft MVP Community. The number of MVPs is growing well, I hope you enjoy their posts. @all MVPs If you'd like me to add your blog posts to my weekly compilation, please send me an email (email@example.com) or reach out to me via Twitter (@FloKlaffenbach). Thanks!
Download Now Microsoft #WindowsAzure Symbol/Icon Set #sysctr #MVPBUZZ by James van den Berg
We Need Your Opinion On This Strategy, Vision, Management Issue … by Didier van Hoye
Connecting to Azure with MPLS by Damian Flynn
Lync 2013 client logging by Jaap Wesselius
Download Now Microsoft #WindowsAzure Symbol/Icon Set #sysctr #MVPBUZZ by James van den Berg
Connecting to Azure with MPLS by Damian Flynn
Upload a Virtual Machine to Windows Azure by Lai Yoong Seng
#HyperV Network Virtualization technical details and Gateway Architecture #SCVMM #Cloud #SDN by James van den Berg
OpenStack Havana 2013.2.2 Hyper-V compute installer released! by Alessandro Pilotti
#PSTip How to prevent rogue DHCP servers in Hyper-V by Shay Levy
#PSTip How to prevent a VM from becoming a Router by Shay Levy
Script To Convert Hyper-V Virtual Machine From VHD To VHDX by Aidan Finn
New Lync Server 2013 White Papers Released by John Policelli
Office 365 und Office 2013 Vergleich in German by Kerstin Rachfahl
Hierarchical Address Book Functionality Added to Office 365 by John Policelli
Himmlische-IT Podcast Folge 31: Office 365 das umfassende Handbuch in German by Kerstin Rachfahl
#PSTip How to enable Web Deploy automatic backups using PowerShell by Shay Levy
#PSTip How to get the number of IIS current client connections by Shay Levy
#Microsoft Windows #PowerShell Networking Guide for #ITPRO #MVPBUZZ by James van den Berg
FRIDAY FUN: THE MEASURE OF A FOLDER by Jeffery Hicks
ADD LOGON AS SERVICE RIGHT WITH POWERSHELL by Jeffery Hicks
System Center Configuration Manager
How to remove machines from ConfigMgr Collection by David O'Brien
Enable Deduplication with Powershell for ConfigMgr exclusions by David O'Brien
System Center Orchestrator
Orchestrator – Delete Collection Rule activity by David O'Brien
How Do I Create My Own Desired State Configuration (DSC) Resource? by Damian Flynn
Where Do I Add the Code for My Desired State Configuration (DSC) Module? by Damian Flynn
Windows Server 2012 R2 Products and Edition Comparison by Lai Yoong Seng
Windows Server Failover Clustering: Why Cluster Quorum Matters by Aidan Finn
KB2913766 bringt neue PowerShell CmdLets für Storage Enclosure in German by Carsten Rachfahl
[table id=3 /]
There is a new security landscape these days, made possible by increasing use of BYOD, cloud, and the Internet and distributed networks. Companies can do business faster and employees have a lot more flexibility for getting their work done, but, in exchange for these benefits, IT has to ensure network security while carefully steering around all the new unknown threats proliferated by today’s time-saving technologies. This task is even further complicated by the fact that IT doesn’t control most of the devices used to access the company’s network. This new wave of IT threats attacks from both inside and outside of the network, launched by a range of sources ─ everything from external hackers and malware that sneaks in via the many different mobile devices used for network access, to malicious attacks from insiders with privileged access to totally accidental actions by an ordinary user. Whether intentional or accidental, these unknown threats can do serious damage to the network and leave the organization with a huge price to pay in terms of lost business and fines for non-compliance.
A recent survey conducted for Dell by Vanson Bourne polled 1,440 IT decision-makers in 10 countries across both private and public sectors. We wanted to see how aware organizations around the world are of these new threats, and how well they are prepared to deal with them. The results are disturbing in the face of the new security landscape through which organizations of all sizes are now picking their way. Ninety-three percent of respondents said their organizations allow personal devices for work, and 73 percent said they currently use cloud (90 percent in the United States), so they are definitely vulnerable to the unknown threats that can infiltrate their networks through those sources. But, while almost two-thirds said they had dealt with a security breach within the last 12 months, only 18 percent consider predicting and detecting unknown threats a top security concern.
Dell offers assistance in combatting unknown threats with the recent release of Privileged Governance Solution, which we are showcasing at this week’s RSA. Dell’s Privileged Governance Solution integrates our solutions for privileged management, and identity governance and administration to strengthen access governance for privileged users ─ those with the most powerful access to an organization’s most critical systems and information ─ as well as everyday users. Our modular, integrated solution automates the process for provisioning, managing and governing access to all system data for both groups of users within a single console, securing unmanaged privileged accounts and impeding both internal and external attackers’ ability of to exploit them.
On another positive note, we are pleased to note that a number of Dell security products are finalists for the 2014 Info Security Products Guide global awards, and the SC Magazine awards. In the Info Security Products Guide’s Products and Services Excellence Categories, Dell finalists are Dell™ One Identity Manager - Data Governance Edition (Best Security Service - new or updated version), and Dell™ One Identity Cloud Access Manager (Cloud Security). The Dell™ SonicWALL SuperMassive E10800 is a finalist for Awesome Product of the Year.
The SC Magazine finalists are Dell™ SonicWALL Mobility Solutions - SRA Series (Best Mobile Security Solution); Dell™ SonicWALL SRA 7.0 Web Application Firewall (Best Web Application Firewall); Dell™ One Identity Manager (Best Identity Management Solution); and Dell™ SecureWorks Managed Security Services (Best Managed Security Service).
We think these award nominations help confirm that we are on the right path. The need for tight security inside and outside all of an organization’s perimeters is not going to go away. At Dell, we create security solutions that address the challenges that pain our customers the most. Our Connected Security approach embeds security into the very fabric of software, governing access to every application and protecting every device, both inside and outside the corporate network. Our comprehensive set of solutions protects organizations from the inside out and the outside in ─ from the data to the endpoint to the cloud ─ and by connecting these capabilities, we take security one step further to provide deeper insights and stronger predictive analytics so that fast strategic action can be taken to thwart all threats ─ known and unknown.