Browsing Posts published in January, 2024

Reading Time: 2 minutesRunecast was founded in 2014 by a team of virtualization professionals with a vision: help IT System Admins get and maintain control of their environments. Today, organizations around the world benefit from our patented solution, Runecast Analyzer, and its predictive and actionable intelligence for increasingly complex hybrid cloud IT environments.‍The Runecast team’s dedication to providing unrivaled customer experience has earned us a five-star Capterra rating from customer reviews. In 2020, Runecast was named a Gartner Cool Vendor and won Computing’s SME awards for Best Place to Work in Digital and Cloud Security Product of the […]

Reading Time: 3 minutesNAKIVO has just released the new v10.11 of its product with enhanced IT monitoring, faster file recovery, expanded storage snapshot integration and Microsoft 365 backup functionality. NAKIVO Backup & Replication v10.11 is available for download. Customers can either update their version of the solution or install the 15-day Free Trial to check how the new features work.

Reading Time: 2 minutesOne of the interesting new features of Veeam Backup & Replication is the introduction of YARA (Yet Another Recursive Acronym) rules to scan the VM guest files. As explained in this great blog post, YARA is one of the most effective ways to help identify and classify malware like ransomware. YARA is an open sourced resource that enables cybersecurity teams to search for, detect and alert you to the presence of malware before it can do any damage.

Reading Time: 3 minutesAs you know the VMUG membership is completly free as also most of the benefits, including the online resources, local meeting and UserConf events (some events may have a fee depending by the local VMUG, but almost are for free). But, if you want (and note that it’s not mandatory for VMUG membership), you can have more benefits by subscribing to the VMUG Advantage, that is an interesting way to stay on top of your technical skills with discounts on training, certifications, attendance at VMworld and on product licenses.

Reading Time: 7 minutesTo implement some encryption solutions (like VM encryption, backup encryption, storage encryption) you need to manage symmetric keys in a secure way. Key management has always been solved with proprietary solutions. Each vendor have offered in the past their own key management server/client combination, but as the complexity of datacenters increased, this designed has shown its limits. If you have multiple components, all in need of security keys, why you would need to run multiple key management solutions? But in order to have a common solution, you first would need a protocol to let all […]

© 2025-2011 vInfrastructure Blog | Disclaimer & Copyright