Cisco, EMC, VMware Evolve Australian Data Centre to Private Cloud

Cisco, EMC, VMware Evolve Australian Data Centre to Private Cloud

Cisco, EMC and VMware have teamed on helping KPMG Australia, part of a global network of firms providing audit, tax and advisory services, to evolve its data centre to a private cloud with a Vblock infrastructure platform.

The companies claim that this platform successfully blends cloud computing with integrated, consistent enterprise security and compliance. This blending enables KPMG to easily meet or exceed all security and regulatory requirements.

The Australian firm is already using IT to boost its business and with this Vblock deployment it expects to grow even further.

In the coming weeks KPMG will enjoy several benefits by the unification of compute, network, storage access and virtualization resources in a single energy-efficient system.

In addition to reducing IT infrastructure costs and complexity, the Australian firm will also be able to provide nearly limitless scalability, and capitalize faster on new business opportunities, according to the companies.

At KPMG it’s essential for us to consistently innovate and lead the next generation of technology internally,” said Chris Robinson, chief information officer, KPMG. “Our decision to evolve to Vblock was based on the business outcomes we expect to achieve from our own rollout of highly secure and flexible technologies. This will provide an opportunity to show our clients an industry-leading on-premises cloud-based technology.”

“The innovations occurring in the data centre are transforming the way information and services are consumed and provided in Australia and globally,” said Les Williamson, vice president of Cisco Australia and New Zealand. “We are excited that KPMG Australia is taking advantage of this business model shift and teaming with Cisco and our ecosystem of partners to build, deploy and use highly secure cloud services for itself and its clients now and with even greater capability in the future.”

By Anuradha Shukla

Sorry, comments are closed for this post.

Comics
Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Four Trends Driving Demand For Data Security In 2017

Four Trends Driving Demand For Data Security In 2017

Data Security Trends 2017 will be a hallmark year for security in the enterprise as all industries have reached a tipping point with respect to cloud and mobile adoption, forcing more and more data beyond the corporate firewall. Over 100 IT executives weighed in on their plans for 2017 in our latest survey; buried among…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…