IT Products
SDDC
Definition:
-It's a data storage facility in which all infrastructure elements
(networking, storage, CPU and security )are virtualized and delivered as a
service.
-An SDDC is currently more of a concept than a commonly implemented
practice, but it has seen incremental adoption by cloud service providers
and data-center-as-a-service providers. The list includes Amazon, Google
and the Open Compute Project.
SDDC benefits :
-It's way to dynamically configure and provision applications,
infrastructure and IT resources.
-It provides an organization with its own private cloud for better control of
hosted data.
-it capitalizes on the agility, elasticity and scalabilty of cloud computing
and the chief advantage is automating all functions through intelligent
software, especially manually intensive tasks related to provisioning and
operational management.
-The intended result is to reduce cost and management overhead.
SDDC market share:
-The SDDC market is broken into segments relating to products for
software-defined compute, software-defined networking and software-
defined storage.
-There are two approaches to fully virtualizing a data center. The first is
transitional, in which existing hardware and equipment runs in parallel
with newer SDDC gear. The second approach involves integrating
existing and new equipment within a unified data center fabric.
NSX
Defination:
VMware NSX is the network virtualization and security platform that enables VMware’s cloud networking solution with a
software-defined approach to networking that extends across data centers, clouds and application frameworks.
Key benefits:
•Reduce network provisioning time from days to seconds and improve operational efficiency through automation.
•Protect applications with microsegmentation and advanced threat prevention at the workload level and granular
security.
•Gain consistent management of networking and security policies independent of physical network topology within and
across data centersand native public clouds.
•Obtain detailed application topology visualization, automated security policy recommendations and continuous flow
monitoring.
•Enable advanced, lateral threat prevention on east-west traffic using the built-in, fully distributed threat prevention
engine.
Use cases:
- Security:create a logical demilitarized zone (DMZ) in software or reduce the attack surface of a virtual desktop
environment. The NSX network virtualization and
-Multi-cloud networking : enables multi-cloud use cases ranging from seamless data center extension to multi–data security platform.
center pooling to rapid workload mobility.
-Automation: natively integrates with cloud management platforms and other automation tools, such as vRealize
Automation vRealize Automation Cloud, Terraform, Ansible and more, to empower developers and IT teams to
provision, deploy and manage apps at the speed business demands.
-Networking and security for cloud native apps :provides integrated, full-stack networking and security for containerized
applications and microservices, delivering granular policy on a per-container basis as new applications are developed.
This enables native containerto-container L3 networking, micro-segmentation for microservices, and end-to-end
visibility of networking and security policy across traditional and new applications.
Backup
Definition
Backup refers to the copying of physical or virtual files or databases to a secondary location for
preservation in case of equipment failure or catastrophe. The process of backing up data is pivotal to a
successful disaster recovery plan.
Backup types
Full backup captures a copy of an entire data set. Although considered to be the most reliable backup
method, performing a full backup is time-consuming and requires many disks or tapes.
Incremental backup offers an alternative to full backups by backing up only the data that has changed
since the last full backup. The drawback is that a full restore takes longer if an incremental-based data
backup copy is used for recovery.
Differential backup copies data changed since the last full backup. This enables a full restore to occur
more quickly by requiring only the last full backup and the last differential backup.
Backup software and hardware vendors
Vendors that sell backup hardware platforms include Barracuda Networks, Cohesity, Dell EMC (Data
Domain), Drobo, ExaGrid Systems, Hewlett Packard Enterprise, Hitachi Vantara, IBM, NEC Corp.,
Oracle StorageTek (tape libraries), Quantum Corp., Rubrik, Spectra Logic, Unitrends and Veritas
NetBackup.
Leading enterprise backup software vendors include Acronis, Arcserve, Asigra, Commvault, Datto, Dell
EMC Data Protection Suite (Avamar and NetWorker), Dell EMC RecoverPoint replication manager,
Druva, Nakivo, Veeam Software and Veritas Technologies
The Microsoft Windows Server OS inherently features the Microsoft Resilient File System (ReFS) to
automatically detect and repair corrupted data. While not technically data backup, Microsoft ReFS is
geared to be a preventive measure for safeguarding file system data against corruption.
VMware vSphere provides a suite of backup tools for data protection, high availability and replication.
vStorage API for Data Protection (VADP) enables VMware or supported third-party backup
software to safely take full and incremental backups of VMs. VADP implements backups via hypervisor-
Security
Defination
the quality or state of being secure: freedom from danger (SAFETY),freedom from fear or anxiety and freedom from the prospect of being
laid off.
Basic Security Concepts
Three basic security concepts are confidentiality, integrity, and availability. Concepts relating to the people who use that information are
authentication, authorization, and nonrepudiation.
Network security is a set of technologies that protects the usability and integrity of a company’s infrastructure by preventing the entry or
proliferation within a network of a wide variety of potential threats.
key tools of network security( Firewall,Load Balancer ,IDS/IPS, Sandbox, NTA/NDR ).
Security Technical Controls
Technical controls consist of the hardware and software components that protect a system against cyberattack. Firewalls, intrusion
detection systems (IDS),( IPS),encryption, and identification and authentication mechanisms are examples of technical controls.
SECURITY AS A SERVICE
-is an outsourced service wherein an outside company handles and manages your security. At its most basic, the simplest example of
security as a service is using an anti-virus software over the Internet.
-With security as a service, security solutions are no longer delivered locally, where your IT department installs virus protection software,
spam filtering software, and other security tools on each machine or on the network or server in your workplace, keeping the software up-
to-date or telling them to use it.
BENEFITS of SAAS.
1. You work with the latest and most updated security tools available.
2. You get the best security people working for you.
3. Faster provisioning.
4. You get to focus on what's more important for your organization.
5. Makes in-house management simpler.
6. Save on costs.
HCI
DefinationHyperconverged infrastructure (HCI) combines compute, virtualization, storage, and networking in a single cluster. Starting with as few as three nodes,
users can easily scale out to match computing and storage resource needs. Hyperconvergence brings cloudlike simplicity on-premises and within a single, easily
managed platform.
Bnefits of hyperconverged infrastructure.
Lower costs
Integrating components into one platform reduces storage footprint, power use, maintenance costs, and TCO.
Simplicity and agility
Hyperconverged systems can deploy in a fraction of the time of traditional IT infrastructure. And there’s no need for IT specialists for each resource area. Plus,
automation makes management simple, giving staff and administrators more time to focus on strategic initiatives.
Performance
Hyperconvergence helps organizations deploy any workload and enjoy high levels of performance. Many organizations use hyperconverged solutions for the most
intensive workloads, including enterprise apps and SQL Server.
Flexible scaling
Hyperconverged infrastructure scales easily. Additional resources can be added by simply connecting a new node to the cluster. Plus, with some hyperconverged
systems you can scale compute and storage separately. New resources are automatically identified and integrated into the cluster.
Multicloud support
Hyperconvergence dramatically simplifies hybrid cloud environments and reduces the time and cost of transitioning to a hybrid cloud. It also makes it easy to move
data and applications back and forth between on-premises servers and the public cloud.
Security and data protection
On-premises IT infrastructure is more secure than other options. Security is baked into hyperconverged systems, with features including self-encrypting drives and
tools that provide high levels of visibility. Backup and disaster recovery are also built in
Top 10 Companies in Hyper-Converged Infrastructure Market (Cisco,Dell EMC, Hewlett Packard Enterprise,Microsoft
THANK YOU
<Company Name>