ClusterHQ today announced the integration of its Flocker container management technology with Docker’s fig file format, thereby enabling customers to deploy and manage Docker containers on multiple servers, data centers and cloud providers. Importantly, ClusterHQ’s Flocker technology tackles a problem addressed by few Docker orchestration frameworks by enabling data layers installed within Docker containers to similarly migrate across host environments instead of remaining attached to the machine on which the Docker container in question is installed. Whereas existing container management technologies solve the problem of managing the migration and deployment of containers that house applications within multiple environments, Flocker’s solution uniquely addresses the challenge of managing databases, key value stores and data layers within container environments.
Michael Coté, Research Director, Infrastructure Software at The 451 Group, remarked on the significance of ClusterHQ’s innovation with respect to the data layer and Docker containers as follows:
We’re seeing activity around Docker grow incredibly quickly, with application developers only beginning to find the edges of what’s possible – including how to architect their applications appropriately for operations to deploy and manage. Management of the data layer has always been difficult with containers, yet is a critical need for production operations, since every application has to deal with state. It’s great to see ClusterHQ working on this layer of the Docker container stack.
Here, Coté comments on the challenges developers have encountered with respect to management of the data layer in relation to Docker technology. Coté elaborates on how data layer management is critical because applications need to register states, one component of which concerns the data repositories that represent one dimension of the application’s history. ClusterHQ’s announcement of the integration of its Flocker container management technology with Docker’s fig file format comes in the wake of last week’s announcement by Amazon Web Services of it support for Docker technology by means of a container management framework specific to AWS. Unlike AWS’s container management framework and Google’s Kubernetes, however, Flocker takes up a vendor agnostic position with respect to cloud infrastructures by integrating directly with Docker technology, thereby enabling it to interoperate on any cloud platform or environment featuring Docker containers. As a result, Flocker facilitates the management of Docker containers across multiple data centers and cloud vendors and thereby delivers a uniquely vendor-agnostic solution to Docker orchestration and container management in conjunction with its focus on the data layer of Docker applications.
Palerra, formely known as Appirity, launches from stealth today and releases its cloud security platform, LORIC. Whereas cloud security has traditionally involved defensive tactics aimed at stopping specific types of threats to an IT infrastructure or application, LORIC delivers predictive analytics and proactive threat detection aimed at proactively identifying and mitigating threats before they escalate or even materialize. LORIC’s proprietary advanced analytics enable the identification of deviations from steady state, baseline parameters that suggest the possibility of a security breach or emerging threat. The platform’s predictive analytics subsequently delve deeper into anomalous infrastructure and application behavior to determine whether the aberration in question represents a local, episodic variation from the norm or a symptom of a more serious security violation. LORIC supplements its back-end analytics platform with rich data visualization as illustrated below:
The graphic above shows spikes in failed logins on select dates that empower LORIC customers to perform a more thorough into its root causes as deemed appropriate. Rohit Gupta, founder and CEO of Palerra, remarked on the innovation of LORIC within the cloud automation space as follows:
With LORIC, we have created an intelligent, automated threat avoidance system that not only learns behavior in order to beat threats to the punch, it also automatically remediates them through a systematic approach with no action needed by IT. By combining security and incident response automation into a single platform, Palerra enables enterprises to securely embrace the cloud.
Here, Gupta remarks on LORIC’s ability to remediate threats without manual intervention in ways that leverage machine learning to iteratively deliver more nuanced threat analysis. Deployed as a SaaS solution, LORIC performs unobtrusive threat detection and remediation by means of advanced analytics whose efficacy increases as the platform accumulates progressively more historical data. The platform illustrates how organizations with cloud deployments can reap the benefits of predictive analytics for the automation of threat detection and incident response as well as the ability to leverage big data analytics to proactively ensure the security of a cloud infrastructure.
The following graphic, courtesy of CloudPhysics, illustrates some of the hidden hazards lurking in virtualized datacenters. Created in the spirit of Halloween, the graphic identifies issues such as Heartbleed and admission control that may have unexpected repercussions on the performance of IT infrastructures. CloudPhysics specializes in the identification and pre-emptive resolution of problems that may affect virtualized infrastructures as elaborated in a blog post by Krishna Raj Raja.
Today, Snowflake Computing emerged from stealth to announce the Snowflake Elastic Data Warehouse, branded as the first data warehouse designed specifically for the needs of cloud computing infrastructures. The Snowflake Elastic Data Warehouse absolves customers of the hassle of managing an on premise data warehouse by providing a data warehouse as a service. Moreover, the platform’s patent pending technology delivers a SQL-compliant data warehouse that elastically scales in conjunction with the number of users, incoming data and workloads. The platform’s “multidimensional elasticity” enables users to load and query data concurrently with a degree of performance that enables rapid ingestion and transformation of data into a relational database structure. Meanwhile, the product decouples storage from computational power in the context of a larger architecture dedicated to optimizing cloud storage and querying capabilities. Customers interact with data stored in the Snowflake Elastic Data Warehouse via a SaaS user interface that delivers query results as illustrated by the screenshot below:
Whereas competing data warehouses from Teradata and Oracle typically deliver on premise data warehouse products, the Snowflake Elastic Data Warehouse allows analysts to run queries such as that shown in the graphic above via a web browser. Today’s announcement of the Snowflake Elastic Data Warehouse coincides with a concomitant announcement of the company’s finalization of $26M in Series B funding led by Redpoint Ventures with additional participation from Sutter Hill Ventures and Wing Ventures. With an extra $26M in cash, Snowflake Computing stands poised to continue disrupting the traditional data warehouse space by delivering a warehousing platform uniquely configured for the cloud. As such, the platform embodies the convergence of cloud computing and Big Data by delivering cloud-optimized performance for the storage and retrieval of petabytes of real-time, streaming Big Data.
Kaseya recently announced the launch of Kaseya Release 8, which adds security and compliance features to its cloud monitoring platform. Kaseya 8 bolsters the ability of small to mid-size organizations to manage their IT infrastructure and applications by means of enhancements to Kaseya Remote Control that empower IT administrators to remotely perform work on servers and workstations. Moreover, Kaseya’s AuthAnvil product helps companies manage IT-related authentication protocols, including two factor authentication, single sign-on and password management functionality. AuthAnvil also enables users to customize the list of applications included within the purview of single sign-on applications as illustrated below:
Furthermore, Kaseya 8 claims enhanced centralized management functionality for Microsoft Office 365 and SharePoint Online. In addition, the platform delivers service level tracking software to automate compliance with service level agreements in conjunction with the delivery of notifications that signal cases in which a SLA stands a danger of violation. Overall, Tuesday’s release pivots the product toward security and compliance functionality for SMBs by delivering out of the box functionality that can assist organizations monitor compliance with SLAs and assure the implementation of robust identity access management features. As told to Cloud Computing Today in a phone interview with Kaseya’s CEO, Yogesh Gupta, the company’s primary client base consists of SMBs sized at roughly 50 to 250 employees. The latest release delivers security and compliance solutions that can be readily implemented by companies that fit the profile of Kaseya’s customer base that are seeking to ensure the security of their IT infrastructures. That said, cloud security and compliance are hot topics for virtually any organization with a cloud deployment, so Kaseya will need to ensure its offering can meet the demands of its customers as they grow and undertake more complex cloud and application deployments.
The following infographic, from AlgoSec, reflects on the implementation of security protocols in hybrid cloud environments.
This week, Ericsson acquired a majority stake in Apcera, a platform as a service vendor that enables organizations to control how applications are used in cloud computing environments. Apcera’s Continuum platform allows customers to monitor the usage of IT infrastructures, orchestrate application deployment and implement governance and security policies. The acquisition of Apcera promises to enhance the Ericsson platform by delivering cloud automation as well as security, governance and application management functionality that gives users more granular insight about the performance of their infrastructure and its constituent environment. Apcera’s technology takes aim at the rapidly emerging discipline of business processes dedicated to risk management, security and compliance by providing Ericsson customers with enhanced abilities to organize and delineate security and governance protocols as they relate to infrastructure components and applications. The acquisition constitutes a notable feather in Ericsson’s IaaS cap as it builds out its cloud portfolio to serve the needs of enterprise customers, many of whom are compelled to leverage audit, compliance and security protocols to satisfy the requirements of investors and state and federal regulatory agencies.