Featured

Blog, Cetus Solutions, Citrix, Cloud, Cloud Hosting, IT Solutions, News, Our Upcoming Events, Technology, Uncategorized

Citrix Summit 2019 from a Citrix Platinum Partner Point of View


1 Comment

There are very few events throughout the year that get us super thrilled here at Cetus/instrato. Even fewer that we prepare for months before the actual event (aside from IPEXPO, which is a whole other story). But when it comes to Citrix Summit, held every January, we get very excited.

As a Citrix Platinum Partner, we stay on top of what’s going on in the Land of Citrix to make sure that we keep things fresh and up-to-date for our customers. And we’re absolutely blessed with two huge events a year to sink our teeth into; Summit and Synergy. We loved Citrix Synergy last May (and my god, we got some exciting updates on Citrix Workspace) and we’re still going on about it in our office. Of course, leaving the wet and windy UK for three days to fly to the US is a major bonus too!

As always, this year’s Summit is being held in Orlando, Florida, from the 7th to 9th of January- what a way to start the new year! Unlike Synergy, which is for customers as well as partners, Summit is only an event for partners, like Cetus, who promote and sell the Citrix Vision. And as always, we’re sending a little group of top Cetusites to go, explore and bring back the very best of Citrix.

The event is three days of inspiration, information and networking to bring the Citrix game to 100. Crazily, we’re expecting over 300 hours of training and hands-on learning, which we’ll be incorporating into all things Citrix when we get home. The event is a great way to build relationships with the biggest and brightest minds of Citrix experts and business leaders. From the opening keynote, which is always one of our favourite moments, to the breakout sessions, having those nagging questions answered at a Round Table, or just getting immersed in the hottest topics in the world of IT solutions in the Citrix Talks panel discussions, it’s going to be a crazy week. It’s events like Summit that inspire us to look to the future and adopt the latest and greatest ways of working.

One of the best things about being a Citrix Platinum Partner is the ability to really consolidate what we learn at Citrix Summit and Synergy into the huge projects that we work on. Having that foundation on which we can build our expertise is priceless, but a fair portrayal of how much we value Citrix itself as our partner. We know that having the title of Citrix Platinum Partner assures us that we’re in the best of hands, which means that our customers are, too.

When it comes to instrato, we work exclusively with Citrix and Microsoft Azure to get the optimal combination for a cloud deployment, so the fact that Microsoft will be attending makes our little cloud-enthused hearts flutter. In fact, cloud and cloud-based applications features heavily in the session previews, further strengthening its position as the future of IT. No doubt those sessions will be popular, including Citrix Talks to discuss cloud transformation projects.

You can be sure that, once we shake the jet lag, we’ll be incorporating all the latest updates and features into the solutions we design. If you want to hear a bit more about what you can expect from Citrix (and Cetus!) in 2019, have a chat with one of our Citrix Platinum Partner experts.

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

 

Blog, Cloud Hosting, IT Solutions, News, Our Upcoming Events, Technology, Uncategorized, VMware

VMworld 2018 Keynote


No Comments

So here we are at VMworld 2018 in Barcelona for VMware’s 20th anniversary and the 10th annual VMworld in Europe. With just under 12,000 attendees, the relevance and importance of the VMware strategy in helping businesses of all sizes grow and transform is clear to see everywhere you go. Pat Gelsinger took to the stage to layout his views and VMware’s strategy highlights for the coming years. For those that have not made it to VMworld before, the main keynote is quite high level and is followed by a number of ‘showcase’ keynotes that focus on the core areas of the VMware portfolio such as Security, Hybrid Cloud and EUC etc.

Pat showed how VMware has constantly driven to help businesses bridge gaps between innovation silos and highlighted three key ‘acts’ in the VMware history:
1. Server virtualisation
2. BYO/EUC
3. Networking
The message that organisations need to deliver both profit, as well as look after its people was clear; a fully engaged workforce will lead to innovation and transformation, which will lead to a more profitable business.

Technology should be a force for good in the world and that is what VMware is driving for in everything it does (The Mercy Ships case study was very powerful). Pat spoke about four tech superpowers in the world today (Cloud, Mobile, AI/ML, and Edge/IoT) and how each of them reinforces and drives the others. VMware sees the application as a network that requires an end-to-end platform to enable it. The VMware vision image below has been consistent across four core strategies for a number of years now;
• Modernise Datacenter
• Integrate Public Cloud
• Empower Digital Workspaces
• Transform Networking and Security
The ability for an organisation to deploy hybrid cloud and digital workspace solutions that are integrated from a single vendor drives simplification and reduces costs.

vmworld 1.jpg

At Cetus our mission is to help our customers deliver on their strategic mission by delivering hybrid cloud and secure digital workspace solutions, we believe that every organisation must embrace technology as a force for change and transformation. The VMware portfolio from vSphere to NSX onto Workspace One and out to Vmware on AWS means we can deliver on our mission from a single integrated technology stack.

There were a wealth of announcements in the keynotes, and while I’m not going to try and cover them all here, I just wanted to pick a few highlights.

Security
Pat talked about how the security solutions we deploy today are broken, as bolt-on options that are chasing a bad situation without a fundamental shift in protection levels. This is shown by record spending on security solutions, and also a record number of breaches.

VMware started to address this with NSX, moving the security enforcement from the North/South boundaries to cover the bulk of East/West traffic, and as such the micro-segmentation market emerged. While this takes security to a new level, it is still based on set policies and known interactions between services within the datacenter. VMware is taking this to the next level with the introduction of vSphere Platinum Edition that integrates the app defence solution into the vSphere licence. The combination of AppDefense and NSX allows VMware to deliver what it has now coined ‘Adaptive Segmentation’, allowing admins to deliver a step change in the security paradigm. The Adaptive Segmentation concept follows three key steps:
• Learn
• Lock
• Adapt

Rather than chasing after threats, AppDefense learns an application’s intended state and behaviour, then monitors for changes to this state that indicates a threat. When a threat is detected, AppDefense can automatically respond. Leveraging this known ‘good state’ allows policy to lock down the datacenter (NSX offering network-level automation) and then adapt as needed to changes in state. This deep integration allows for a shift in the overall security paradigm.

The focus on security across the VMware portfolio is really beginning to shine and deliver real value for customers.

Any Cloud
All businesses are on a journey to a hybrid/multi-cloud world and the need to automate and secure this transformation is key. VMware is innovating in both the datacentre and EUC spaces to ensure this journey is seamless, secure and cost-effective for all.

In the datacenter space, the need for a seamless path to and from cloud/on-premises is the key to allowing an organisation to unlock the power of its investment in infrastructure services. The ability to deploy to either on-premises or cloud and move between them seamlessly as costs and needs evolve ensures IT can meet businesses’ needs at all times. This needs to be enabled via a ruthless drive for automation, which the announcements of VMware Cloud Foundation 3.5 addresses by ensuring that enterprise IT teams can deploy private cloud with the same management and automation as cloud. Cloud Foundation underpins the hybrid cloud, both on-premises and as part of VMware on AWS- truly enabling this seamless hybrid cloud. With new VMware on AWS regions opening over the next 6-9 months, the reach will be truly global. Checkout my follow up blog from the datacenter showcase keynote for more details.

The message was clear that the future of cloud infrastructure will be hybrid and that VMware has delivered a true end-to-end solution. The acquisition and integration of Cloud Health extends this capability by providing a cloud operations platform that allows customers to understand costs and compliance across multiple clouds.

Any App
The Workspace One solution has been the stable leader in the MDM space for many years and over the last couple has evolved into a complete UEM (unified endpoint management) solution that supports mobile, Mac, Windows and Chrome end points. Providing users a simple, consistent and secure access method for all applications and data on any device, while ensuring that IT retain control of the full lifecycle of the devices. One big announcement was a joint partnership with OKTA to extend the Workspace One Identity Management solution and provide full user/device lifecycle management and automation. IT can now truly step away from the job of deploying endpoints, allowing technology to provide a simple user-driven workflow.

Enhancements to the Workspace One solution continues to demonstrate this market-leading position. Look out for my follow up blog from the EUC showcase keynote covering items Like Workspace One Intelligence and what COPE stands for.

So this ran on a bit longer that I expected; lots to talk about in what was actually a rather uneventful keynote by VMware’s standards. Most of this due to them splitting out 6 ‘showcase’ keynotes over the two days that focus deeper into the entire proposition. If you want to keep up-to-date with what’s going on with VMware, make sure to keep an eye on our events page where we regularly share workshops and webinars to keep you in the know!

Register for the webinar

Blog, Cetus Solutions, Citrix, IT Solutions, News, Technology, Uncategorized

IPEXPO 2018: A Newbie’s Perspective


2 Comments

As part of the marketing department, I’m privy to a lot of the cool and interesting things we at Cetus get ourselves into. From Christmas parties to our workshops, and everything in between, I hear of all the things we do- sometimes I can’t sleep from the excitement (though that could be from the coffee I’m drip-fed in the office). So when I popped into an IPEXPO organising meeting last month I didn’t think too much of it. IPEXPO is a utopia for all things IT solutions, cloud solutions, cyber security…. If it has something to do with running the IT in your organisation, there will be a company there with more experience and knowledge than you could possibly need. We’ve been exhibiting at IPEXPO since 2011, so it’s something that I’d heard about since I started at Cetus in February. I piped up with the mandatory odd line to justify my presence while I practiced my ‘I’m-totally-contributing-to-this-conversation’ face as I fell into standby mode. That was, until Mike English, our Managing Director, mentioned something about blogs. That rebooted me up real fast. It was with shock, horror, and a tiny bit of excitement that my name was etched on the list to go to the event.

That excitement faded away completely as I stood in the middle of Euston Station. My first ever time in London (I’m a poor girl hauled out of the Irish countryside) and I was not prepared for it. People, everywhere. They swarmed around me, dragging behind suitcases and children alike, totally oblivious of the commotion that was ripping through my mind. I very nearly pulled a sickie there and then, but for the fact that I’d already let the Marketing Head know that I was on the train into London. Bugger. But Euston wasn’t even the worst part. It was dragging myself and five kilos of ‘just in case’ pages of collateral all the way to the ExCeL convention centre on the edge of the city. And I was going to have to use the transportation of nightmares that makes men cry, brakes souls and causes couples to break; The Tube. To be honest, the worst was just finding my way around King’s Cross as I tried to figure out where to buy a ticket, and what constituted the difference between the train and the Tube entrances. I was a human Sim character for about 20 minutes, wandering around in circles trying to figure out why I was there and how to get out.

Two hours*, a packed Tube and a cheerful Twirl bar later, I found myself at ExCeL. It’s a marvellous, imposing building, shoved at what feels like the other end of the world. If I thought Euston station was bad, I was in for a bigger shock. The convention space was packed with nerds as far as the eye could see. And the place was incredible. Flashing lights, red carpets- I felt like I was in Hollywood. The elaborate stands were stocked full of toothy smiles, chocolates, pens, and enough collateral to build the DLR line all the way back to Euston. And the room was massive.

I waded through the throng of matching t-shirts and rucksacks, trying to find my way to the Citrix Partner Zone to find our stand. We were delighted to be displaying alongside Citrix again this year, especially with the introduction of our new instrato brand. With instrato, we work with Citrix and Microsoft Azure to revolutionise the journey to the cloud. We were even more excited to introduce our new project to the thousands of delegates that were in attendance, getting to chat with them and see how instrato could make their cloud journey simpler. And when I finally rocked up to the stand, it was clear that it was catching the eye of plenty of people. Thank god the girls had all bought matching blouses in Cetus purple, it made them so much easier to spot in the crowd that had manifested.

This year, we were especially excited to have a speaker at the event. In April, we won the highly fought-after Lewisham and Greenwich NHS tender. It’s a big deal for us at Cetus, one of the most prestigious projects we’ve ever taken on. Six months later and we’ve well and truly sunk our teeth into it. With healthcare IT hugely under-reported on, it made sense to introduce the instrato project in the theatre. Thankfully, I had made it just in time for our speaker slot, held in the App Virtualisation & Mobile Workspaces Theatre, which was just behind our stand. As always, our Business Development Director, Paul Kiveal, gave a brief introduction to Cetus and instrato, as relaxed and well-spoken in front of the packed theatre as he is during team meetings. As much as Paul could have detailed what benefits and improvements we are delivering to the NHS, he handed the reins over to Justin Beardsmore, Chief Technology Officer for the Lewisham and Greenwich Trust, who was more than happy to talk in depth about the project and why the Trust chose to work with us. Impeccably dressed, he stood at the top of the lecture theatre watching the chairs getting filled up as delegates made their way in.

An experienced senior technology leader, Justin captivated the audience with the situation of the NHS and what we are doing to improve the lives of not only the working staff, but also the patients that rely on the service. Justin went into detail about the community NHS staff, those incredible people who work remotely to provide a top-tier healthcare service to patients who aren’t able, or don’t need, to attend hospital. As you can imagine, the paperwork and procedures that has to be completed for each patient, regardless of location, can really pile up, so an innovative solution has to be sought.

It was a quick and captivating 30 minutes, and it was a delight to see delegates coming up to Paul and Justin after the lecture for their know-how and suggestions for their own projects. Our stand was swamped directly after the lecture as well, whispers of our successful lecture having spread around the convention, and everyone wanted to find out more about our exciting Citrix-Azure-instrato partnership. Essentially a human lump of a paperweight at the stand, I decided against striking up conversations with delegates and scaring them away with my limited IT knowledge. I played ‘undercover blogger’ and wandered around the convention, popping into cybersecurity lectures and avoiding eye contact with everyone I met (god forbid I get kicked out for being too stupid).

Alas, it was only too soon before I got the dreaded ‘let’s go make our way to the Tube :)’ text and had to say goodbye to the ExCeL centre. Weary that our beds were still another six hours away, we piled into the Tube (why on earth is it so short?) along with hundreds of other delegates who decided rush hour was the prime time to leave before they came back again the next day to do it all over again.

Did you go to IPEXPO this year? We hope you managed to pop by our stand for a chat (I swear, everyone else is extremely intelligent and knowledgeable in IT) and found out more about instrato and what exciting projects we have planned. If you didn’t make it to London, or just didn’t have the chance to come say hi, we still have the same experts (minus Justin, I’m afraid) on-hand to talk through your upcoming projects, and they’re easily available here. As for us, we’re going back to the drawing board to start planning for next year, can’t wait to see you there.

Speak to an expert

*It took me two hours because I can’t read CityMapper and I refuse to ask for directions. It should only take 30 to 40 minutes.

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

 

Blog, Cetus Solutions, Check Point, Cloud, IT Solutions, Our Upcoming Events, Security, VMware

WannaCry: What We’ve Learned One Year On


6 Comments

It felt like the world was held to ransom. All over the globe – an astounding 150 countries in fact -, little red boxes popped up on computer screens, causing dread and havoc. ‘Ooops, your files have been encrypted!’ they read, asking for between $300 and $600 (£230 to £470) in bitcoin for the safe release of the files. On Friday May 12th 2017 nations of the world collectively gasped as these faced the most devastating and widespread cyber security incident at that time. Over 200,000 machines were affected, with the perpetrators scamming over $112,000.

In Britain, the NHS was hit the hardest. The little red WannaCry pop-up appeared at 1pm on the screens of only four trusts, demanding the ransom. By 4pm, when the ‘kill switch’ was accidentally found, it had spread to 16 trusts. The cyber-attack threat was officially ‘stepped down’ by NHS England a week later, but not before the affected reached a staggering 80 out of 236 hospital trusts as well as 603 primary care and affiliate NHS organisations. Public health in the UK was seriously affected, since the ransomware attack resulted in thousands of cancelled appointments, infected systems and the diversion of A&E patients to other hospitals.

In hindsight, and a little bit of digging, it was a disaster waiting to happen. The NHS had been warned as far back as 2014 that their level of cyber security just wouldn’t cut it. With a failure to undertake the most basic of IT security procedures, which included patching and updating software, as well as not putting a strategy in place to properly deal with a cyber security incident, it’s a miracle that it didn’t happen sooner. But it was a huge wake-up call, not only to the NHS but to businesses globally. No longer would cyber security rest on the hopes of a flimsy firewall that hadn’t been updated in several years – this is a real risk, with significant consequences. So, in the year since WannaCry, what exactly have we learned?

It’s horrifying to think that WannaCry was a Gen-V cyber threat, while according to Check Point’s Cyber Security Generations Survey from March 2018, only 10% of IT security professionals are at Gen-IV and, worse still, only 3% are at Gen-V.

According to a recent report by cyber security firm Tanium, most organisations would still be unprepared should another incident like WannaCry happen again. The survey of 500 frontline IT security workers in the UK is shocking; 40% admit that their organisation is even more exposed than last year. Only 31% confessed that their organisation had invested in new security systems since WannaCry. As I stated already slightly higher up, it was basic IT security procedures that were the gateway for WannaCry, yet a staggering 66% of the IT security workers admitted that they still hadn’t improved their patch management process.

The results are definitive; it’s time to start safeguarding against further, potentially more devastating, cyber-attacks.

It’s all about the patching
WannaCry sneaked through a Windows weakness where there was a lack of security. Shockingly, it had been discovered and there had been a patch for the offending loophole two months before the attack. I know having to update is a major pain, but guys, it just needs to be done. WannaCry was a Microsoft Windows ransomware, a software that locked the files by encrypting them. This particular ransomware was particularly nasty because it was network enabled, which allowed it to essentially spread like a virus throughout not only the local network, but the internet as well. What your organisation needs right now is a patch management solution in place to patch for known vulnerabilities as soon as they arise, so that no little malware buggers can infiltrate your systems.

Backup, backup again, and verify
Had your organisation been hit with the WannaCry malware and you’d had all of your data backed up, you’d have been laughing – for the most part. Regardless of encrypting malware potentially hitting you, backups are critical for all things disaster recovery and business continuity. Whether it be tape or cloud (like Cetus Continuum), all of your data needs to be replicated somewhere safe. Regardless of where you store it (and we really do suggest cloud), it should all be encrypted. Security is, after all of this, a priority.

Use all of the threat intelligence and prevention
If you haven’t heard, micro-segmentation is really in right now. Which is really great in the face of cyber security. Life may be like a box of chocolates, but your data centre needs to be more like a hotel and protect itself from east/west traffic. This next point is important; invest in some good threat intelligence and threat security. At the moment, we’re working with Check Point and VMware to highlight how merging Infinity and NSX can create the ideal security solution to protect you.

Figure out where you stand with a security posture review
There are hundreds of ways to fall foul of a cyber-attack in this day and age. With work no longer confined to the office, mobile workspaces have become all the rage – and for good reasons. Being able to work while on the field instead of having to wait to get back to the office, being able to work from home, or just simply being able to sort out an urgent matter when on holiday is revolutionary. And everyone’s trying to get into it. However, using some random Wi-Fi is always a risk. Honestly, you’ve not lived until you stand outside an O2 store trying to rob a second of Wi-Fi to send an email. In the rain. But how secure is that? A security posture review is essential to identify where your security has slipped. And it just so happens that we offer complimentary security posture reviews, where we analyse network traffic to detect a variety of security threats, evaluate end-point security, assess any threats that lurk in your infrastructure as well as other crucial little things. Have a chat with our experts to see where the danger can find a way in.

One thing is for definite; cyber security has never been so important, and making sure that your IT reflects that is the way to protect yourself as much as possible from an attack. It’s important to be proactive in your cyber security, or you’ll be reacting to a security breach instead.

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

Blog, Cetus Solutions, Check Point, Cloud, IT Solutions, Security, Technology, Uncategorized

Practice Safe Mobility – Protect Your Endpoints


No Comments

It’s not the naughties anymore – the age of consequence-free mobility is over I’m afraid. It’s time to start practicing safe mobility. It’s time to put some endpoint protection on your ‘device’. The result of not doing so exposes your business to risk from threats, data loss, and unauthorised access.

For decades now, endpoint security has been the domain of anti-virus software. This was because Windows endpoints were the primary target, and we all ‘knew’ that they were vulnerable. Many businesses installed AV software on endpoint and moved on to more important matters…

So, what’s changed? Well, I would suggest that things have changed from two perspectives: the ‘use case’ has changed, and the threat environment has changed.
Taking each in turn…

From a use case perspective:
• The age of the virtual desktop seemed to be upon us (at least from Cetus’ perspective) – and then came ‘the well-managed Windows 10 desktop’.

• We’ve been acting like consumers for years now – buying smart phones, tablets and phablets and then wanting to use them for work.

• We’ve also been liberating ‘our’ data – storing it in personal cloud stores like Dropbox and sending it via our personal email accounts in an effort to be more productive
So what’s changed from a threat perspective?

• The days of good ‘old-fashioned’ viruses seemed to disappear when the use of nation state cyber weapons ransomware became an everyday thing (think Wannacry).

• Threats are now specifically targeting mobile devices (think Man-in-the-Middle Attacks. Women-in-the-Middle attacks are also a threat).

• Public cloud services are now part of most corporate strategies (think OneDrive), extending network boundaries into ill-defined, global data centres.

• Increased legislation with regards to the protection of individuals and their personal data (think the GDPR and its somewhat over stated, but none the less terrifying €20m fine).

The above list is by no means exhaustive, and tries to give a flavour of the changing threat landscape. So where am I going with this? Well, the good news is that our friends at Check Point have a solution to your cyber woes. Our cyber security portfolio provides Check Point End Point Security and Security Gateway Appliances that allow us to provide end-to-end security that encompasses your data centre, end points and the Cloud.
Specifically, from an endpoint perspective – Check Point provides data security, network security, threat prevention and a remote access VPN for complete Windows, Mac OS X and mobile device security.

If you’ve been playing fast and loose with your endpoints then we’re here to help. Our free-of-charge Security Posture Review will provide you an opportunity to discuss your endpoint security challenges, as well as your wider cyber security posture with regards to perimeter, data centre and cloud components.

Speak to an expert

Award, Blog, Cetus Solutions, IT Solutions, News, Uncategorized, VMware

Going Above and Beyond with VMware


No Comments

It’s been an incredible start to 2018 for Cetus. You may recall a recent blog when we announced that we earned VMware’s highly sought-after competency in Network Virtualisation– now we can proudly declare that we have been recognised as the VMware Rising Star of the Year 2018!

After being nominated and shortlisted earlier on this year, we were holding our collective breaths as a small group of Cetus elite travelled to London beneath sunny skies on the 18th of April. The prestigious VMware awards were presented at the 8th Partner Recognition Dinner in the Amba Hotel in Charing Cross- very fancy altogether.
VMware hosts the annual awards as recognition for those partners in the UK who have gone above and beyond in the field of IT solutions and are key to the growth and success of the major vendor- so of course we’d at least be nominated! That being said, we knew that we’d be up against some very tough competition. But we rose above the other nominees, having proven that Cetus are one of the best in the delivery, service and support to users of VMware solutions.

The Rising Star award recognises Cetus Solutions as a quality provider of VMware, going farther than most to design a bespoke solution to fit your business and be there for you when any problems arise. It guarantees excellent service, from the moment you start researching the answer to your IT problems, all the way through to its the implementation and beyond.

“We are delighted to win the award for Rising Star 2018 at VMware’s prestigious UK&I Partner Recognition Dinner. For us, the award celebrates what has been a fantastic year helping our customers to transform their organisations with market-leading technologies from VMware. The award recognises our continued investment to achieve and maintain the highest levels of technical competency, knowledge and experience across VMware technologies to ensure we deliver first-class solutions, service and support for our customers.” said Claire Gibson, Head of Marketing and Strategic Vendor Alliances, who went to London to collect the award.

“It is a great honour to be recognised by VMware as the Rising Star for 2018 with our focus on the NSX / VSAN solutions. Cetus have been working with VMware since the early days of GSX/ESX Server virtualisation platforms and continue to develop customer solutions based on proven technologies. The award is a great testament to my team’s commitment and this recognition is proudly received,” said Managing Director Mike English.

If you want to work with VMware’s brightest star to solve your IT solution challenges, speak to one of our experts today. Alternatively, our free-of-charge security posture review will provide you an opportunity to discuss your endpoint security challenges, as well as your wider cyber security posture with regards to perimeter, data centre and cloud components.

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

Blog, Cetus Solutions, IT Solutions, Our Upcoming Events, Security, Uncategorized, VMware

When ‘Traditional’ Approaches to Security Are No Longer Enough…


1 Comment

Security attacks are without doubt increasing in sophistication and frequency. With the average time to detect a breach over 200 days(!) the damage an attack could cause is frightening… Simultaneously, for many organisations their IT infrastructure and networks are becoming increasingly complex – with 83% of businesses believing the complexity of their organisational structures and IT infrastructure is putting their companies at even greater risk for security breaches.

In recent years, the number of high-profile data breaches compromising sensitive information has continued to rise. Although breaches were achieved in different ways, the majority exposed the fundamental weakness of the perimeter-centric network security model: after all, once the perimeter is breached, it is difficult to stop threats from moving laterally (east-west) throughout the data centre. These attacks have proven that investing in perimeter firewalls is insufficient and that more investment is needed to secure east-west (server-to-server) traffic.

One solution is virtualisation. Virtualisation abstracts the underlying infrastructure from the applications running on top of it, giving IT departments full visibility into the data path. Abstracting applications from the infrastructure provides the ideal enforcement point to compartmentalise applications through micro-segmentation of the network. This allows simplified security-policy creation and management. It also helps reduce the overall application infrastructure attack surface and provides the ability to effectively prevent threats from breaching the data centre. Leveraging abstraction in the data centre also protects the infrastructure from any compromise.

In our attempt to help more organisations improve their security posture, we are proud to announce that last year Cetus Solutions earned VMware’s highly sought-after specialist competency in Network Virtualisation. VMware, who pioneered the term software-defined data center (SDDC), awarded Cetus with the accolade after demonstrating technical competency, experience and expertise in delivering NSX solutions.

VMware NSX is the network virtualization and security platform for the software-defined data center. VMware NSX brings security inside the data center with fine grained policies tied to the virtual machine they protect. Essentially, with NSX, IT departments can programmatically create, snapshot, store, move, delete, and restore entire networks with the same point-and-click simplicity and speed of a virtual machine—delivering a level of security, agility, and availability never before feasible with hardware-centric or traditional operational approaches.

Our Managing Director, Mike English, had a few words on the achievement;

“We are delighted to have secured the Network Virtualisation competency from VMware. In the last twelve months, we have seen an uplift in conversations centred around data center security and particularly micro-segmentation. VMware NSX’s capabilities makes this level of protection economically and operationally feasible for the first time for a lot of customers. By gaining this competency, it shows our commitment to helping customers define, deliver and manage their security strategy in line with their business requirements.”

With the threat landscape increasing ‘traditional’ security approaches are failing to effectively secure a modern organisation. Now is the time to revaluate your approach to security. Our free-of-charge security posture review will provide you an opportunity to discuss your endpoint security challenges, as well as your wider cyber security posture with regards to perimeter, data centre and cloud components.

Speak to an expert