TechXperts Red Hat OpenShift Enterprise Workshop on 7th May in London

Join TechXperts for a FREE Technical Workshop on Tuesday 7th May, at Red Hat’s London office.

In this hands-on, technical workshop you will get the unique opportunity to explore Red Hat OpenShift Enterprise – the new Platform-as-a-Service (PaaS) solution that allows you to easily build, run, and manage applications in the cloud.

  • Learn about Red Hat OpenShift Enterprise. Discover how to automate IT processes to streamline application service delivery, increase developer efficiency, and use your application infrastructure more effectively.
  • See the technology in action, with a Red Hat Solutions Architect demonstrating advanced features, such as Scalability, Monitoring and Deployment.
  • Share your thoughts and ideas. Find out what others think about the new technology, and talk through your ideas with a Red Hat Solutions Architect.

This is the first of two workshops within the current TechXperts series, focusing on Red Hat’s cloud computing solutions.

Places are limited, so learn more and register now to avoid disappointment.

TechXperts Red Hat Satellite Workshop

TechXperts brings together IT professionals to interact with leading technology vendors.

Tape No Longer a Reliable Option for IT Managers Seeking to Eliminate Single Point of Failure

Acronis Survey shows that Organizations Adopt Cloud for Secure Data Protection As Tape Failure Rates Reach 75 Percent

According to a recent survey from Acronis, conducted by Redmond Magazine, 59 percent of organisations recognise the dangers of Acronis Survey shows that Organizations Adopt Cloud for Secure Data Protection As Tape Failure Rates Reach 75 Percentmaintaining just one form of backup, and many are looking to the cloud to eliminate a single point of failure. In fact, nearly a quarter already back up to the cloud as a secure off-site solution.

It’s no surprise that organisations are seeking more secure data protection option, as 75 percent of survey respondents experienced tape failure in the last year, and 22 percent see phasing out of legacy backups as a future challenge. IT departments see the cloud as a highly beneficial off-site storage solution to resolve such issues, with 43 percent of survey respondents cited the extra layer of data protection as the primary benefit of cloud, while 24 percent were most attracted to the underlying cost savings.

“Organisations no longer have to incur the risk of a tape failure when staging to cloud can provide the simple added layer of protection that organisations need. Old tape options are still used by many organisations despite the high failure rates, and it is fast losing its reputation as an effective  technology with tolerance for downtime reaching near-zero and the velocity of critical data is only increasing. Forward looking IT organisations should be thinking ‘cloud first’ when assessing effective recovery strategies,” commented Scott Crenshaw, Acronis senior vice president of strategy and CMO.

In order to avoid a system relying on a single point of failure and ensure data protection, Acronis recommends organisations adopt a 3-2-1 backup strategy: Keep three copies of data, one primary and two backups; store backups on two types of media; and keep one copy of data off-site. The cloud clearly plays an essential role in the 3-2-1 strategy as a highly secure and cost-effective off-site storage solution, and cloud backup adoption is quickly gaining ground. Now, organisations must focus on integrating personal devices into their backup strategy to ensure availability, accessibility and protection of data, regardless of where it resides.

But, in order to develop a truly comprehensive data protection strategy, companies must also incorporate personal device backup and protection. Bring-your-own-device (BYOD) remains an obstacle for IT departments, and a quarter see personal device integration as their biggest backup and data recovery challenge. While the cloud is becoming an increasingly viable form of off-site backup, 65 percent of organizations admit to not backing up personal devices to the cloud.

“Protecting personal devices cannot be a grey area in a data protection strategy that is only tested and maintained for data on desktop or corporate laptops. Legacy backup and recovery policies simply won’t stretch to meet today’s always-on demands. CEO’s are some of the biggest users of the personal iPad for business use – they need to be sure their data is safe.”

To view Acronis’ survey infographic, visit: http://www.acronis.com/promo/cloud/.

Related Webinar Alert:Acronis_Webinar

If you are looking for a backup and recovery solution specifically for virtual machines in VMware vSphere environments, then we would suggest that you register for a webinar on Thursday 21st February at 10:00 GMT.  Find out more and register herehttp://bit.ly/UC939T

To request a call back for more information on Acronis solutions including where you can purchase from, contact us today

You can follow Technology4Business on LinkedinTwitter and Facebook, where we’ll keep you up to date on the latest blog posts on Technology to help keep your IT Infrastructure and Network secure, safe and always connected.

Join TechXperts for a Red Hat Enterprise Linux Technical Workshop in London on February 15th

We have exciting news of an event for business users of Red Hat Enterprise Linux.  You are invited to join TechXperts for a FREE Technical Workshop on Friday 15th February, at Red Hat’s London office.

In this hands-on, technical session you will explore the new features within Red Hat Enterprise Linux 6.3, and discover how to leverage them to get more from your Linux infrastructure.

  • Learn how to use emerging features, such as High-Availability, clustering, and the new in-built virtualization and cloud support capabilities.
  • Play with the technology in a demo environment, with a Red Hat Solutions Architect on-hand to guide you through the process. Learn how to use Linux Containers and how to configure Cgroups.
  • Collaborate with other Red Hat users. Get their take on the new features, and find out how they plan to leverage them within their own organisations.
Red Hat TechXperts Technical Workshop

Red Hat TechXperts Technical Workshop

This is the third series of TechXperts workshops, designed to bring together Linux users to exchange ideas and interact with new Red Hat Technologies.

As always, places are limited and we expect attendance to be high, so learn more and register now by visiting: http://tinyurl.com/akt8wsc

For more information on Red Hat and other technology solutions for business and public sector organisations, including where you can purchase from, contact us today

You can follow Technology4Business on LinkedinTwitter and Facebook, where we’ll keep you up to date on our  latest blog posts on Technology to help keep your IT Infrastructure and Network secure, safe and always connected.

WEBINAR: Rethinking Identity and Access Governance in a World of Change and Complexity

Organisations and the environments they operate in are more complex than ever and they are also experiencing unprecedented change. Budgets are shrinking, cloud computing and SaaS present compelling options, attacks are on the rise and regulations continue to impact operations.

It is more critical than ever to understand Identity and Access strategythe access your users have and what they are doing with the access they have been granted. Knowing who has access to what, why they have the access, when they got the access, etc. are all required, but this information resides in the business rather than IT.

Discover how empowering your users to manage and review their access can help you mitigate risk, ensure compliance and reduce overall costs.

KuppingerCole´s Principal Analyst Martin Kuppinger will give you an overview on the criteria to look after before deciding on your future Identity and Access strategy. As the second speaker in this webinar, Jörn Dierks from NetIQ will describe some Best Practices and how Identity and Access Governance solutions from NetIQ have been implemented.

Register today to join this webinar to learn more about this topic.

Date: 31st January 2013, 14:00 GMT

Speakers:
Martin Kuppinger (KuppingerCole)
Jörn Dierks (NetIQ)

For more information about the Identity and Access Governance solutions from NetIQ and other technology solutions for business and public sector organisations, including where you can purchase from, contact us today

You can follow Technology4Business on Linkedin, Twitter and Facebook, where we’ll keep you up to date on our latest blog posts on Technology to help keep your IT Infrastructure and Network secure, safe and always connected.

Kerio Gives Customers Access to a Scalable and Headache Free Email Experience with Kerio Connect 8

 

Kerio

Kerio Technologies have launched a new cloud service infrastructure for its partners and customers.

Although Kerio previously enabled its channel partners to host Kerio Connect on their own hardware using the SaaS model, this marks Kerio’s first major push into true, hosted infrastructure services. The first Kerio Cloud offering will be the company’s flagship product, Kerio Connect 8, a messaging (email) and calendaring server.

Unlike cloud email solutions such as Microsoft Office 365 or Google Apps, Kerio offers its customers a private cloud experience, which in turn allows them more control over their own data.

“Pundits have touted cloud services and predicted the demise Scott Schreiman CEO Kerio Technologiesof on-premise solutions for a few years now,” said Scott Schreiman, CEO, Kerio Technologies. “While customer data suggests that onsite servers are still very popular, we think Kerio Cloud is the most secure and flexible solution for the IT guy that is looking for an alternative, but is still evaluating the cloud. Our private cloud not only eliminates the need for partners to carry the hardware burden, it allows them to focus their energy on adding value instead of worrying about the availability of email services.”

The way it works: Kerio Cloud is a hosted infrastructure service that allows Kerio partners to resell Kerio “Software as a Service” to their end customers, eliminating the need to purchase and maintain their own server environments. Kerio will provide its partners with private virtual machines running Kerio Connect 8 in the cloud with some basic configuration. The Kerio partner will take it from thereWalter Huff Huff Technologies, acting as the primary administrator and support contact for their clients.

“We have long offered Kerio Connect as an alternative to Exchange and Google Apps,” said Walter Huff, president of Huff Technologies, a Kerio preferred partner in Jacksonville, Florida. “As email has moved to the cloud, I was anxious to participate in the Kerio Cloud beta program, and after testing with my clients, I can report that the reliability, security and ease of administration rivals any other email service on the market.”

Kerio Connect 8 features the new Kerio Connect client, which is a completely redesigned Webmail experience that has been rebuilt from the ground up to deliver the performance and experience users expect from a modern web application. Email, calendars, contacts, tasks and notes are fully functional in the Kerio Connect client.

In addition to this new cloud offering, Kerio Connect 8 continues to be available as an on-premise server solution and through our existing SaaS hosting partners.

About Kerio Technologies, Inc.
Innovating in Internet security since 1997, Kerio Technologies, Inc. provides unified collaboration, communications and security solutions for businesses and organisations worldwide that prefer a simple approach to IT.

For more information on Kerio and other technology solutions for business and public sector organisations, including where you can purchase from, contact us today

FRESH NEWS: Red Hat Enterprise Linux 6.4 Beta Released

Red HatRed Hat have announced exciting news about the next beta release for Red Hat Enterprise Linux 6 – Red Hat Enterprise Linux 6.4

The Red Hat Enterprise Linux 6.4 beta release includes a broad set of updates to the existing feature set and provides rich new functionality in the areas of identity management, file system, virtualization, and storage as well as productivity tools.

Through collaboration with partners, customers and the open source community, we are committed to delivering technology that is tested and stable – including in the beta phase of development. Red Hat Enterprise Linux 6.4 demonstrates this commitment and has been designed for optimized performance, stability and flexibility to cater to today’s diverse workloads running in physical, virtual and cloud environments.

Key new features and enhancement details include:

Identity Management

  • System Security Services Daemon (SSSD) enhancements improve the interoperability experience with [Microsoft Active Directory] by providing centralised identity access control for Linux/Unix clients in a heterogeneous environment.
red hat enterprise linux 6.4 performance improvements

Performance improvements with addition of Direct I/O

File system

  • pNFS (Parallel NFS) client (file layout only) remains in technology preview, however now delivers performance improvements with the addition of Direct I/O for faster data access. This drives particular performance benefits for I/O intensive use cases including database workloads.

Virtualization

  • Red Hat Enterprise Linux 6 now includes the Microsoft Hyper-V Linux drivers, which were recently accepted by the upstream Linux community, improving the overall performance of Red Hat Enterprise Linux 6 as a guest on Microsoft Hyper-V.
  • Installation support for VMware and Microsoft Hyper-V para-virtualization drivers. This new feature enhances the user deployment experience of Red Hat Enterprise Linux as a guest in either of these virtualization environments.
  • In this release, KVM virtualization virtio-scsi support, a new industry storage architecture, provides industry leading storage stack scalability.

Management

  • The use of swap functionality over NFS enables more efficient read/write tradeoffs between local system memory and remote disks. This capability increases performance in very large, disk-less server farms seen in ISP and Web hosting environments.
  • Enhancement in c-groups delivers the ability to migrate multi-threaded applications without errors.
  • Optimised perf tool for the latest Intel processors

Storage

  • New system log features identify mapping from block device name to physical device identifier – allowing an administrator to easily locate specific devices as needed.

    wacom_tablets red hat enterprise linux 6.4 beta support

    Now with support for newer Wacom tablets

Productivity Tools

  • Microsoft interoperability improvements with Microsoft Exchange and calendar support in Evolution. Productivity functions, such as calendar support with alarm notification and meeting scheduling is improved.
  • Customers such as animation studios and graphic design houses now have support for the newer Wacom tablets.

Through this next beta release of Red Hat Enterprise Linux 6, Red Hat is proud to deliver the highest quality open source enterprise platform. Red Hat looks to the community and their partners and customers for feedback to ensure Red Hat Enterprise Linux 6.4 follows this path.

Access to the beta release of Red Hat Enterprise Linux 6.4 is available here: https://rhn.redhat.com/rhn/software/channels/Beta.do.

Learn More about Red Hat Enterprise Linux at the Optimizing IT Virtual Event on Dec 5th and 6th

Join Red Hat for the virtual event on the 5th and 6th December 2012, covering virtualization, cloud computing, storage, and the Red Hat Enterprise Linux operating system. Hear updates on Red Hat Enterprise Virtualization, Red Hat Storage, Red Hat OpenShift, Red Hat Enterprise Linux, and Red Hat CloudForms from customers, partners, and the broader Red Hat ecosystem.

JOIN ONE OF TWO LIVE SESSIONS

To better serve the Red Hat global ecosystem of partners, customers, and contributors, the live event will be hosted twice.  Sign up for the date and time that best suits you. (All registrants can access both events.)

For more information on Red Hat and other technology solutions for business and public sector organisations, including where you can purchase from, contact us today

You can follow Technology4Business on LinkedinTwitter and Facebook, where we’ll keep you up to date on our  latest blog posts on Technology to help keep your IT Infrastructure and Network secure, safe and always connected.

OPTIMIZING IT RED HAT VIRTUAL EVENT

The Optimizing IT virtual event will showcase Red Hat’s continued commitment to customer success and enterprise innovation. Join Red Hat for the virtual event covering virtualization, cloud computing, storage, and the Red Hat Enterprise Linux operating system. Hear updates on Red Hat Enterprise Virtualization, Red Hat Storage, Red Hat OpenShift, Red Hat Enterprise Linux, and Red Hat CloudForms from customers, partners, and the broader Red Hat ecosystem.

  • Red Hat Enterprise Linux,
  • Red Hat Enterprise Virtualization,
  • Red Hat Storage,
  • Red Hat OpenShift,
  • Red Hat CloudForms

TOP 5 REASONS TO ATTEND

  1. TALK TO THE PROS: Access Red Hat experts directly to collaborate and identify the best ways to optimize your IT during both live events.
  2. EASY ACCESS: Attend technology optimization sessions, product update presentations, and hear the latest enhancements from Red Hat partners—all in one place, on your time, from anywhere.
  3. COLLABORATE WITH PEERS: Collaborate and interact with other customers, partners, and accelerated IT professionals.
  4. HEAR IT HERE FIRST: Get ahead of the curve and learn all of the latest enhancements and added value available from your existing Red Hat subscriptions.
  5. BUILD YOUR PLAN: Decide which sessions are best for you and create a plan to optimize your IT.

JOIN ONE OF TWO LIVE SESSIONS

To better serve the Red Hat global ecosystem of partners, customers, and contributors, the live event will be hosted twice.  Sign up for the date and time that best suits you. (All registrants can access both events.)

TAKE THE POLL

For more information on Red Hat and other technology solutions for business and public sector organisations, including where you can purchase from, contact us today

You can follow Technology4Business on LinkedinTwitter and Facebook, where we’ll keep you up to date on our  latest blog posts on Technology to help keep your IT Infrastructure and Network secure, safe and always connected.

Bitdefender talk Security for Virtualized Environments at Citrix Synergy 2012

Bitdefender exhibited at Citrix Synergy 2012 in Barcelona, one of Europe’s largest gatherings of virtualisation and cloud professionals, to showcase it’s its enterprise solutions, in particular the Bitdefender Security for Virtualized Environments solution.  Take a look at the video below where Robert Krauss, Director Enterprise Sales & Alliances, North America, Bitdefender and Bo Skeel, Sales Director Europe, Bitdefender, describe Bitdefender’s Security for Virtualized Environments (SVE), which delivers comprehensive, virtualisation-centric security for complex datacenters.

As proud Citrix Ready security technology provider, Bitdefender Security for Virtualized Environments (SVE) not only extends the advantages and value of XenServer and XenDesktop, it helps strengthen it, giving Citrix resellers another reason to be excited about the opportunities with Bitdefender solutions for both their current and new customers.

Bitdefender provides centralised management of virtual appliances creating comprehensive coverage across platforms. Organisations can reduce the financial, logistical and performance costs associated with traditional security approaches. Enterprises and cloud service providers (CSPs) with large scale deployments no longer have to choose between improved consolidation ratios and security.

FREE Technical Workshop in London in November to get hands-on with Bitdefender Security for Virtualized Environments and Cloud Security for Endpoints

Join Building Zones and Bitdefender for a FREE workshop on Thursday 22nd November, at Dryland Business Members’ Club in Kensington, London.

In this hands-on, technical session you will explore the features within Bitdefender Security for Virtualized Environments and Cloud Security for Endpoints. Discover how to leverage these products to enable you to securely migrate to a new way of working that dramatically cuts IT investment and boosts productivity.

Places are limited and we expect attendance to be high, so we highly recommend those interested, register now.

You can also learn more about the event on the registration page.

For more information on Bitdefender and other technology solutions for business and public sector organisations, including where you can purchase from, contact us today

You can follow Technology4Business on LinkedinTwitter and Facebook, where we’ll keep you up to date on our  latest blog posts on Technology to help keep your IT Infrastructure and Network secure, safe and always connected.

Event: Discover secure new ways of working that cuts IT investment and boosts productivity this November 22nd in London

Join Building Zones and Bitdefender for a FREE workshop on Thursday 22nd November, at Dryland Business Members’ Club in Kensington, London.

In this hands-on, technical session you will explore the features within Bitdefender Security for Virtualized Environments and Cloud Security for Endpoints. Discover how to leverage these products to enable you to securely migrate to a new way of working that dramatically cuts IT investment and boosts productivity.

  • Learn how companies are using Bitdefender technologies, to secure an increasingly mobile and dispersed workforce.
  • Play with the technology in a demo environment, with Bitdefender experts on-hand to guide you though the process.
  • Hear the benefits that other organisations have experienced from choosing Bitdefender and Building Zones to secure their mobile workforce.

You will also get an opportunity to learn more about Work Different, share your workspace experience with companies like yours and to see the wonderful new office concept that is Dryland Business Members’ Club.

Places are limited and we expect attendance to be high, so register now.

You can learn more about Building Zones and Work Different at the Dryland Business Members’ Club in this video

For more information on Bitdefender and other technology solutions for business and public sector organisations, including where you can purchase from, contact us today

You can follow Technology4Business on LinkedinTwitter and Facebook, where we’ll keep you up to date on our  latest blog posts on Technology to help keep your IT Infrastructure and Network secure, safe and always connected.

Kerio Technologies Updates its UTM Security Appliance for Cloud and Virtual Networks

Kerio Technologies this week announced Kerio Control 7.4, which adds VLAN support for easier network management of cloud, virtualised,and large environments. As corporate networks become more advanced and more stressed with employees adding their own devices, IT administrators are working hard to keep their network securely behind the firewall. Kerio Control 7.4 enables network admins to use VLANs to separate a large network into smaller, isolated segments, without incorporating additional switches or routers.                                                              Click image to enlarge

“Kerio Control 7.4 comes at a time when corporate networks are going through interesting changes. Everything from virtualization and cloud, to IPv6 has an impact on security,” said James Gudeli, vice president of business development, Kerio Technologies. “We have made a great deal of investment in new features that support these advanced networks and IT environments while still meeting the needs of our legacy customers.”

As Kerio Control has diverged from its Windows software version to Linux, we have created a Hyper-V software appliance so customers in Windows invested environments can still test and deploy the Linux software appliance on the Hypervisor.

Kerio Web Filter, an optional module of Kerio Control that prevents users from visiting websites that are known to contain malicious content, has been upgraded with HTTPS and embedded URL filtering. This ensures the network is not exposed by employees using encrypted Web connections or by accessing approved sites with embedded links to view inappropriate content.

Redesigned Kerio Control Statistics

Formerly Kerio StaR, the new Kerio Control statistics interface has a fresh new look along with support for groups, user photos and better rights management for accessing statistics and email reports. Administrators now have the flexibility to specify which groups to gather statistics for, assign group statistics access to any user (a director or VP for example) regardless of their group membership, and even allow users to access their own statistics data or email reports. Imagine your teams’ productivity gains if they could see just how much of their internet activity you are monitoring. Now that’s powerful.                                            Click image to enlarge

Admin Dashboard

The admin Dashboard, which is displayed as the default “home” screen upon login, provides admins with easy access to important system and license information, system health charts, traffic charts, connection status, bandwidth utilization, top active hosts and more. The Dashboard is completely customizable using a modular “tile” concept – admins can select which tiles to display and arrange tiles as they like on the dashboard page. Admins will also appreciate the redesigned charts and the new problem/alert notifications.                                                                                                                                                                  Click image to enlarge

Other Improvements

  • Allowing of incoming IPv6 connections
  • Improved charts
  • Better notification of problems
  • NTLM improvements

For more information on Kerio Control and other technology solutions for business and public sector organisations, including where you can purchase from, contact us today

You can follow Technology4Business on LinkedinTwitter and Facebook, where we’ll keep you up to date on our  latest blog posts on Technology to help keep your IT Infrastructure and Network secure, safe and always connected.