It's supposed to enhance security in public and private cloud
environments
First there was the great alliance between Cisco, VMware and EMC and
now there's a littler, less trumpeted triumvirate made up of Cisco,
VMware and EMC rival NetApp assembled in the name of virtual and cloud
security.
It means they'll have some recommended, pre-tested, and validated
end-to-end configurations that they'll promote as their so-called Secure
Multi-tenancy Design Architecture (SMDA) - basically blueprints,
implementation tips and best practices - that they all support globally
24x7 to get the enterprise virtualized faster.
And that's good for VMware, which means it's ultimately good for
parent EMC especially since this new alliance lacks the Vblock bundles
and the Acadia joint venture of the Cisco-VMware-EMC axis.
The scheme is supposed to enhance security in public and private
cloud environments by isolating the IT resources and applications of
different clients, business units or departments that share a common IT
infrastructure. In other words segment and isolate the workloads.
It's supposed to enable enterprises, integrators and service
providers to deliver IT as a service (ITaaS). The trio's partners will
sell the stuff.
And naturally it involves vSphere/vCenter/vShield, Cisco's UCS
servers and 10 gigE Nexus switches, and NetApp's FAS storage with its
Multistore partitioning software and anticipates moving data and
applications around hybrid clouds.
Everything exists; the customer just has to pick from the Chinese
menu and get it put together.
It's supposed to help administrators establish the appropriate
quality of service for each resource layer and deliver consistent
service performance levels for the applications in each layer.
Read more Cloud Distribution News @ http://bit.ly/5NMFEA
Monday, 1 February 2010
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment