Building a Secure Multi-tenant Cloud for SaaS Applications: Challenges and Lessons Learned

Creating a secure multi-tenant cloud requires proper tenant isolation and access control, operational efficiency through automation and self-service provisioning, and on-demand service creation with dynamic resource scaling across key network and security functions. Delivering all of these requires a move to optimized software abstractions and policy-based architectures as existing infrastructures lack the means to support… Continue reading Building a Secure Multi-tenant Cloud for SaaS Applications: Challenges and Lessons Learned

OpenStack: One Keystone to Rule them all

Traditionally, the focus has been on configuring and deploying Keystone in single cloud / single data center. The enterprise clouds are generally spread across multiple data centers. What happens to authentication and authorization platform across multiple data centers? How do users from one data center access resources in 10 other data centers? At Symantec, we… Continue reading OpenStack: One Keystone to Rule them all

Delivering a Carrier-Grade Platform with OpenStack: From Sprints to Marathons

Telco Network Equipment Vendors (NEPs) and Communication Services Providers (CSPs) are fast moving from Network Functions Virtualization (NFV) solutions in their respective labs to real world deployments with OpenStack as the overwhelming Cloud Operating System. NFV deployments pose a number of additional unique challenges over any traditional enterprise cloud deployment and vendors are looking up… Continue reading Delivering a Carrier-Grade Platform with OpenStack: From Sprints to Marathons

Detecting targeted cyber attacks in the cloud

These days, we see an increasing number of cyber-attacks affecting both public and private clouds. According to reports by antivirus companies, clouds can be used by botnets as well as by special services or cyber criminals to run targeted attacks with the purpose of collecting sensitive information in enterprise networks or government institutions. Current detection… Continue reading Detecting targeted cyber attacks in the cloud

EMC To Acquire Virtustream

Hopkinton, MA: EMC Corporation (NYSE: EMC) today announced it has entered into a definitive agreement to acquire privately-held Virtustream. When the transaction closes, Virtustream will form EMC’s new managed cloud services business. The acquisition represents a transformational element of EMC’s strategy to help customers move all applications to cloud-based IT environments. With the addition of… Continue reading EMC To Acquire Virtustream

Live Migration at HP Public Cloud

Live migration seems like magic – that you can take a running VM and swap its host without the VM or its users really noticing. But in some sense it’s not very “cloudy”. After all why live-migrate your pets if you can just start a new herd of cattle wherever you need them? At HP,… Continue reading Live Migration at HP Public Cloud

Moving Enterprise Apps to OpenStack-based Clouds

Complex multi-tier enterprise applications assume reliable hardware and typically have dependencies on underlying operating systems, hardware configurations, and network topologies. The boundary between one application or service and another is often unclear. These traits make many enterprise applications difficult to move entirely to a public cloud.

The Multi-hypervisor OpenStack Cloud: Are We There Yet?

The Multi-hypervisor OpenStack Cloud: Are We There Yet? One of the visions for OpenStack is for it to be the unifying common fabric for all cloud and infrastructure components in the enterprise. Literally, this would mean that all hypervisors, storage systems, and networking services from different vendors could be offered to users and orchestrated under… Continue reading The Multi-hypervisor OpenStack Cloud: Are We There Yet?