Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

5/19/2010
08:55 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Vodacom Business And Novell Partner To Securely Manage And Optimize Cloud Services

Vodacom to provide infrastructure and software-as-a-service solutions across Africa using many of Novell's Intelligent Workload Management technologies

AMSTERDAM, May 19 /PRNewswire-FirstCall/ -- Novell BrainShare Europe -- Novell, Inc. and Vodacom Business, majority-owned by UK-based Vodafone Group Plc today announced a partnership that will integrate much of Novell's Intelligent Workload Management portfolio including: SUSE Linux Enterprise Server, Platespin Virtualization and Workload Management, and Identity and Security solutions into the network provider's cloud hosting solutions. The partnership is aimed at helping businesses across Africa securely provision, manage and monitor multi-tenant applications deployed from Vodacom Business's cloud infrastructure.

Managing the Cloud

As businesses move to the cloud, successfully managing all aspects of infrastructure technology including service quality, security and availability, become more critical. Customers need comprehensive information about their physical and virtual server environments to obtain a true picture of how resources are being used, especially when trying to scale and rapidly provision workloads. Designed to take the guesswork out of complex server consolidation and capacity planning initiatives, Vodacom Business is using SUSE Linux Enterprise Server from Novell and virtualization and workload management solutions including PlateSpin Recon, PlateSpin Migrate and PlateSpin Protect from Novell to respond to growing business demands, improve server workload performance, reduce energy consumption and lower costs.

Securing the Cloud

A major benefit of cloud computing is the flexible, on-demand model that allows enterprises to rapidly acquire additional computing power only when needed. However, this presents significant security and audit challenges. Today's regulations require a complete audit trail when demonstrating identity and security compliance. Vodacom Business will leverage Novell identity and security management solutions to give customers the ability to treat their cloud assets as an extension of the data center. A core tenet of Intelligent Workload Management is the integration of identity and security management into cloud resources. This ensures policies and procedures for regulatory compliance and prudent business practices will be enforced ubiquitously.

"Cloud computing will change the way companies do business. The service delivery model is vastly scalable and less resource and energy intensive, enabling organizations to purchase robust and reliable infrastructure and application services for a reduced cost," says Richard Vester, Executive Head of Hosted Services, Vodacom Business. "However, security concerns are inhibiting the adoption of cloud computing. Our partnership with Novell enables us to deliver infrastructure and application services that can support our customers' specific security policies and regulatory compliance requirements."

Both companies have proven experience working together to enable application providers the ability to offer secure business practices in the cloud. For example, BasisOne, a hosting provider based in South Africa, uses Novell identity and security solutions for its platform that deploys SAP ERP solutions as a service using Vodacom Business's private cloud. Using Novell identity and security solutions, BasisOne can extend an enterprise organization's security policies onto the applications that are running on virtual servers at Vodacom Business's state-of-the-art data center.

"Cloud computing is core to Vodacom Business's strategy and we're pleased to be their engineering and technology solution partner for their cloud strategy," says Markus J. Krauss, VP Service Providers, Novell EMEA. "Vodacom Business is another proof point for Novell's strategy to become the leader in the intelligent workload management marketplace. We're looking forward to providing our partner with a more agile, cost effective and scalable way of managing, optimizing and securing cloud environment so they can pass the full benefits of cloud computing onto their customers."

About Novell

Novell, Inc. (Nasdaq: NOVL), a leader in Intelligent Workload Management, helps organizations securely deliver and manage computing services across physical, virtual and cloud computing environments. We help customers reduce the cost, complexity, and risk associated with their IT systems through our solutions for identity and security, systems management, collaboration and Linux based operating platforms. With our infrastructure software and ecosystem of partnerships, Novell integrates mixed IT environments, allowing people and technology to work as one. For more information, visit www.novell.com.

Novell, PlateSpin and SUSE are registered trademarks and BrainShare is a registered service mark of Novell, Inc. in the United States and other countries. *All third-party trademarks are the property of their respective owners.

About Vodacom Business

Vodacom Business was launched in February 2008 and offers a total communications service portfolio to corporate customers. Vodacom Business has invested in significant infrastructure and has a Tier 1 internet network capability as well as a corporate grade national MPLS VPN. Vodacom Business services include next-generation IP voice, managed networks and infrastructure, internet access, hosting and storage. In 2008, Vodacom Business launched a dedicated internet access service and also a broadband internet access service. It also launched a managed MPLS VPN service together with a managed enterprise voice and VoIP gateway in April 2008 and May 2008, respectively. These service offerings are supported by a new data centre at the headquarters in Midrand, the development of a soft switch and the development of a client services operations centre.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/11/2021
Edge-DRsplash-10-edge-articles
Cybersecurity: What Is Truly Essential?
Joshua Goldfarb, Director of Product Management at F5,  5/12/2021
Commentary
3 Cybersecurity Myths to Bust
Etay Maor, Sr. Director Security Strategy at Cato Networks,  5/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-18178
PUBLISHED: 2021-05-18
Path Traversal in HongCMS v4.0.0 allows remote attackers to view, edit, and delete arbitrary files via a crafted POST request to the component "/hcms/admin/index.php/language/ajax."
CVE-2020-20214
PUBLISHED: 2021-05-18
Mikrotik RouterOs 6.44.6 (long-term tree) suffers from an assertion failure vulnerability in the btest process. An authenticated remote attacker can cause a Denial of Service due to an assertion failure via a crafted packet.
CVE-2020-20222
PUBLISHED: 2021-05-18
Mikrotik RouterOs 6.44.6 (long-term tree) suffers from a memory corruption vulnerability in the /nova/bin/sniffer process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).
CVE-2020-20236
PUBLISHED: 2021-05-18
Mikrotik RouterOs 6.46.3 (stable tree) suffers from a memory corruption vulnerability in the /nova/bin/sniffer process. An authenticated remote attacker can cause a Denial of Service due to improper memory access.
CVE-2020-20237
PUBLISHED: 2021-05-18
Mikrotik RouterOs 6.46.3 (stable tree) suffers from a memory corruption vulnerability in the /nova/bin/sniffer process. An authenticated remote attacker can cause a Denial of Service due to improper memory access.