Decouple an App From the OS Before You Move to the Cloud

Virtual Application Appliances

Subscribe to Virtual Application Appliances: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Virtual Application Appliances: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Virtual Application Appliances
Porticor Virtual Private Data System Leverages Software-Defined Key Management to Eliminate Complexities and Risks Found in Traditional Hardware Encryption Security Modules CAMPBELL, Calif. – Aug. 5, 2014 – Porticor®, a leading cloud data security company delivering the only cloud-base...
When designing your cloud architecture you may notice several differences between the cloud-computing environment and the “old world” of physical infrastructure. Two of the main differences are elasticity and dynamism, which are part of the cloud’s DNA. The fact that security-related c...
Designed for SMBs, Branch Offices and Remote Workers, New Software Appliance Provides the Same Seamless Access as On-Premise Infrastructure, but with the Ability to Leverage the Cloud Palo Alto, Calif. - July 22, 2014 - CloudSigma, a public cloud IaaS provider with advanced hybrid host...
By David Parkinson, strategic development manager, UK & Ireland, for Wick HillIt's not often that news from the information security industry reaches the early evening TV slots. However, the major disruption caused recently to the Gameover Zeus (GOZ) botnet certainly did. In a coll...
OK, I’m excited. The latest release of Neverfail IT Continuity Architect has landed with some of our most requested features and we just can’t wait for you to try it out for yourselves. When I got walked through a demo of the new features last week I knew this was Continue ...
Amazon Web Services announced S3 SSE-C today; an enhancement allowing AWS S3 users to feed customer-generated keys to its S3 Server Side Encryption, which previously only allowed keys to be managed by Amazon itself. This is a great addition to the S3 feature set, and is a very usable w...
By Ed Scannell, Senior Executive Editor LAS VEGAS – Hoping to better secure corporate data from increasingly sophisticated hackers, HP’s new capabilities allow IT pros to encrypt data at the point of its creation, whether it resides in the cloud or on-premises. HP Atalla Cloud En...
Tuesday 20 May, 2014 New Version Provides Streamlined Identity Management for an All-In-One Solution Nottingham, England (May 20th, 2014) - Nervepoint Technologies Limited a leading provider of enterprise password self service software today announced release of its lates...
We’re well into a phase of unpredictable data growth. As so many organizations have discovered in recent years, unpredictable data growth means significant increases in risk and in the complexity of data management. The proliferation of data silos due to data deduplication is just one ...
At healthcare events throughout the world, we have met many health tech companies who are considering migrating to the cloud, but have serious concerns about protecting electronic protected health Information (e-PHI) and maintaining HIPAA compliance as they virtualize their environment...
The combination of cloud computing and big data is a match made in heaven. Big data requires a flexible compute environment, which can scale quickly and automatically to support massive amounts of data. Infrastructure clouds provide exactly that. But whenever cloud computing is discuss...
Last week, at the Amazon Web Services Summit in San Francisco’s Moscone Center, we met many companies who have deployed (or will migrate) their sensitive projects to the Amazon cloud.  These companies expressed real concerns about the security of their information, and the status of co...
Ian Kilpatrick, chairman Wick Hill Group, looks at the current state of authentication and examines the solutions on offer from two companies in Gartner's Magic Quadrant. 123456. Amazingly, surveys show that this is the most popular password for authentication. And simple passwords are...
#sdas #virtualization Scaling virtual infrastructure is one thing, managing it is another When virtualization first took off there was a fear - and it was a valid fear - of virtual sprawl. Virtual sprawl was the end result of spawning lots and lots of virtual machines and then essenti...
#RSAC #F5 #infosec #sdas #webperf Security and performance can coexist. Security is an integral part of what F5 is all about. It's our mission to deliver secure, reliable and fast applications to anyone, anywhere at any time and we take all three of those goals very seriously. From ha...
“The Cloud” has become almost synonymous with “agility.” Next to the economic benefits of moving projects to the cloud, the most visible benefit is the ability to deploy applications of any size at will, and to terminate them as soon as they are no longer needed. Agility is manifested ...
WatchGuard Dimension now includes unlimited scalability and availability, intuitive reporting enhancements and new language support 31 January, 2014 - WatchGuard® Technologies, a leader in integrated security platforms, has enhanced its real-time network security visibility solut...
Cloud computing changes the way companies consume IT resources. It shifts the burden of purchasing and maintaining IT infrastructure to specialized IT providers and allows the users to pay only for the resources they need, when they need them. In this new paradigm, cloud security is a ...
  The 20 Coolest Cloud Security Vendors Of The 2014 Cloud 100 The growing use of Web-based services and the frequent deployment of cloud-hosted server deployments have forced traditional security vendors to offer SaaS security offerings and prompted the emergence of a new breed of...
Moving to an Infrastructure as a Service cloud is the natural evolution of IT at an increasing number of companies. But with a fundamental systematic change like cloud adoption comes new responsibility. Most organizations migrating to the cloud are concerned with cloud security. We are...
Now that we have installed and configured the vCAC 6.0 Identity Appliance and the vCAC 6.0 Virtual Appliance we now need to install the vCAC 6.0 IaaS Server. The IaaS server is all the former vCAC 5.x and earlier components. The vCAC 6.0 IaaS Server includes the following components: I...
The vCAC 6.0 Virtual appliance(VA) is your gateway into vCAC 6.0. The vCAC VA packs a punch with lots of new capabilities including: Multi-Tenancy New Self-Service Portal Catalog Brand-able per tenant Ultra flexible advanced approvals Custom service offerings (XaaS) Custom Day 2 operat...
It’s been an exciting year for us at Neverfail – and at the center of that excitement is our newest product, IT Continuity Architect. Today, we are pleased to announce the general availability of this award-winning solution and highlight its momentum to-date. Since we launched the tech...
Enhancements help application producers expand their installation capabilities into complex environments while improving the customer experienceMaidenhead, UK - October 21, 2013 - Flexera Software, the leading provider of Application Usage Management solutions for application producers...
We’re excited to announce the release of the Porticor Encryption Agent, our latest addition to the Porticor Virtual Appliance, as part of our continuous efforts to provide flexible deployment options of our encryption and key management solution.  With the Porticor Encryption Agent, cu...
There are two scenarios when you want to create a RAID pair of Porticor protected disks on your Windows Server: 1. When you have 2 new disks and want to create a RAID pair from scratch. 2. When you already have a disk with data and want to add a mirror to it. The first [...]The post Ho...
First Big Data Analysis Technology to Help IT Identify Unknown Internal Email-Enabled Systems and Applications Emeryville, Calif, September 5, 2013—Sendmail today introduced Sentrion Rogue Email Application Control (REAC) 2.0, the first inside-threat protection application with n...
Robust growth forecast for application delivery controller market in 2013Woking, Surrey: 25th June, 2013 - Wick Hill is now shipping Barracuda Networks' new application delivery controller, an integrated solution that combines load balancing, application acceleration, application contr...
As the infrastructure cloud market (IaaS and PaaS) continues to grow rapidly, we are seeing quite a few customers who are delivering an application – whether it is a mission-critical or SaaS application – and basing their solution on VMware. VMware Security Cloud Encryption cloud keyb...
ViPR is not a technology creation developed in a vacuum instead includes customer feedback, wants and needs. Its core themes are extensible, open and scalable. What is ViPR addressing? IT and data infrastructure (server, storage, IO and networking hardware, software) challenges for t...
EMC ViPR software defined object storage part III By Greg Schulz This is part III in a series of posts pertaining to EMC ViPR software defined storage and object storage. You can read part I here and part II here. More on the object opportunity Other object acces...
Lichfield, 31 January 2013 - To support the expanding role of access control solutions that leverage the intelligence of the network, NextiraOne UK, part of Europe's leading expert in communications services, has announced today that it has achieved Identity Services Engine (ISE) Autho...
Overview Welcome to Porticor! At a high level, the steps involved in using Porticor on SCE are: Create a storage unit (disk). Create a Porticor virtual appliance (an instance). Activate the instance. Configure the instance. This article goes through each of the steps. Please read it th...
After completing the wizard process, and signing in to your Porticor Virtual Appliance console, you’ll get to the “Master Key” page. This page will appear one time only per project. The Master Key guarantees that only you control your data. It is important you copy and save this key in...
Using Porticor to encrypt your S3 storage is easy, once you get the hang of it. The first time though, I recommend that you go through these steps one by one, without cutting any corners. Step 1: Creating Your Porticor Project This is documented in this Knowledge Base article. Step 2: ...
This post, as well as the public evaluation is intended for Amazon Web Services customers. If you are using a different platform (such as Rackspace, HP or Microsoft Azure), our “Enterprise” version may be right for you. Please Contact us for further details. You might also ...
Gladinet Cloud Enterprise was released in 2012. The goal was to help businesses create a self-hosted file sync & share solution (dropbox-like solution) by leveraging business’s own file server and existing Active Directory services. As
Your Porticor appliance can encrypt data being stored to Amazon’s Simple Storage Service (S3). Porticor is the only system available that offers the convenience of cloud-based hosted key management without sacrificing trust by requiring someone else to manage the keys. Porticor’s...
The data centers of the future may look more like NASA ground control – governance inside, resources out One theme has remained consistent throughout the evolution of cloud thus far - enterprise IT wants to retain control of both its data and access to to it. This is not an unreasona...
We’ve released a new video describing how to initialize a new Porticor Virtual Appliance in AWS. The video describes the steps needed to create a new Porticor Virtual Appliance, create an encrypted disk, and mount it to the application: For a product overview click here For the w...