Partner Perspectives //

bitdefender

1/19/2017
11:00 AM
Liviu Arsene
Liviu Arsene
Partner Perspectives
Connect Directly
Twitter
LinkedIn
Google+
RSS
50%
50%

What to Consider When Moving To Hyperconverged Infrastructure

Scalability, data availability, and agility are three reasons why enterprises are making the move to HCI.

IT decision makers have been tasked with the challenge of not only expanding the technical capabilities of their infrastructures, but also with providing high availability, scalability, simplicity and security. Digitalization has transformed the way businesses operate and boost revenue. To that end, Gartner has recently estimated worldwide IT spending will reach $3.5 trillion in 2017.

Moving to a hyperconverged infrastructure (HCI) offers significant benefits for large organizations, as software-defined datacenters (SDDC) reduce the complexity of managing multiple hardware and software platforms, and lower operational costs by using hardware as a single pool of resources shared across multiple applications. IT decision makers often have to present these two main benefits when facing the board of directors, but the decision-making process should also consider business continuity and the ability to quickly meet new demands.

Scalability
Hyperconverged integrated systems and infrastructures let organizations quickly deploy new services and applications without the cost of new hardware or upgrades. Because the SDDC revolves around the use of commodity hardware, the software layer is actually designed to manage aggregated resources across multiple individual nodes, focusing on mass centralization and integration. Reliance on vendor-specific hardware becomes obsolete, allowing more flexibility and efficiency.

Data Availability and Mobility
Agnostic components ranging from hardware to hypervisors and other technologies allow data to move fluidly between services and applications, meeting SLA requirements. Hyperconverged infrastructures allow different storage tiers - solid-state storage and spinning-disk – and see beyond the input/output blender by optimizing storage resources based on the individual profile or requirements of each VM.  Resource pools also allow for resource islands that serve the requirements of specific applications, allowing administrators to focus on applications instead of allocating resources.

Agility and Automation
Because software-defined datacenters place all physical resources under a unified administrative umbrella, IT departments can migrate workloads a lot faster than in legacy systems. This means they can also focus more on scripting and activity scheduling, without worrying about compatibility with vendor-specific hardware and products. Having everything in a single environment that can support VMs and policy management across the entire infrastructure makes the SDDC a highly agile environment.

Bottom Line
HCI and SDDC can help businesses decrease their total cost of ownership while rapidly delivering applications. Because the infrastructure stack is highly simplified and abstracted, businesses and organizations can focus on application mobility. While from a CAPEX perspective hardware acquisition is somewhat similar to legacy datacenters, from an OPEX perspective, costs can be significantly reduced.

Liviu Arsene is a senior e-threat analyst for Bitdefender, with a strong background in security and technology. Reporting on global trends and developments in computer security, he writes about malware outbreaks and security incidents while coordinating with technical and ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
New Cold Boot Attack Gives Hackers the Keys to PCs, Macs
Kelly Sheridan, Staff Editor, Dark Reading,  9/13/2018
Yahoo Class-Action Suits Set for Settlement
Dark Reading Staff 9/17/2018
RDP Ports Prove Hot Commodities on the Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-3912
PUBLISHED: 2018-09-18
Bypassing password security vulnerability in McAfee Application and Change Control (MACC) 7.0.1 and 6.2.0 allows authenticated users to perform arbitrary command execution via a command-line utility.
CVE-2018-6690
PUBLISHED: 2018-09-18
Accessing, modifying, or executing executable files vulnerability in Microsoft Windows client in McAfee Application and Change Control (MACC) 8.0.0 Hotfix 4 and earlier allows authenticated users to execute arbitrary code via file transfer from external system.
CVE-2018-6693
PUBLISHED: 2018-09-18
An unprivileged user can delete arbitrary files on a Linux system running ENSLTP 10.5.1, 10.5.0, and 10.2.3 Hotfix 1246778 and earlier. By exploiting a time of check to time of use (TOCTOU) race condition during a specific scanning sequence, the unprivileged user is able to perform a privilege escal...
CVE-2018-16515
PUBLISHED: 2018-09-18
Matrix Synapse before 0.33.3.1 allows remote attackers to spoof events and possibly have unspecified other impacts by leveraging improper transaction and event signature validation.
CVE-2018-16794
PUBLISHED: 2018-09-18
Microsoft ADFS 4.0 Windows Server 2016 and previous (Active Directory Federation Services) has an SSRF vulnerability via the txtBoxEmail parameter in /adfs/ls.