VSPEX has always been about flexibility. We’ve heard from customers that they want an easy to deploy data center solution, but they also want to be able to choose their favorite networking vendor, server vendor, management tools, and even how they’ll rack, cable, and power the solution.
That’s why we’ve designed VSPEX to be as flexible as possible – designing a set of requirements for each solution and allowing customers and their resale partners to take it from there. It is clear that customers are happy with this approach, as Gartner recently noted that VSPEX became the #1 integrated reference architecture system in the fourth quarter of 2013.
As organizations continue their journey towards leveraging hybrid cloud services and modernizing their data centers to a software-defined architecture, updating or upgrading data protection strategies and methods must also follow suit.
EMC is proud to introduce the newest member of the EMC RecoverPoint family, RecoverPoint for Virtual Machines, a simple, more efficient operational and disaster recovery solution for the applications of today and tomorrow in VMware-based cloud environments. This solution provides local and remote replication in combination with continuous data protection for per-VM recovery to any point in time, with built-in automated disaster recovery orchestration. RecoverPoint for Virtual Machines brings the enterprise quality and advanced features of EMC RecoverPoint, with over 20,000 units installed worldwide, to a 100% software offering. Continue reading →
Today, EMC is recognizing companies who are redefining the role of IT in their respective organizations. These leaders are leveraging hybrid cloud and integrated management and orchestration to improve business results and create a more agile and efficient IT organization. Winners were selected from four different categories including Redefining Hybrid Cloud, Redefining Software-Defined Storage, Redefining Big Data and Redefining Flash – and were honored at VMworld in San Francisco.
Recently I visited Singapore for RSA Conference APJ, which involved passing through immigration and customs. I realized – perhaps as a byproduct of jet lag – that border control is in many ways an identity management issue.
Like Information Security teams, border control needs to prevent unknown entry, validate who is entering (via authentication), and have visibility and control of what people are authorized to do while in the country (i.e. – Are you a short-term tourist? Are you permitted to work here?). This has gotten more difficult for border control teams as the volume and type of visitors has increased, as has pressure to ensure security. New high-tech immigration kiosks have been brought in to automate some of this by scanning passports and photographing lower-risk individuals so that the staff can focus on the more complex work that needs their attention.