8×8 and VCE Deliver Cloud Services to Businesses

8×8 and VCE Deliver Cloud Services to Businesses

Business communications and cloud computing solutions provider 8×8 and VCE are collaborating to deliver cloud computing services to businesses utilizing the Vblock Infrastructure Platform.

VCE or the Virtual Computing Environment Company was formed by Cisco and EMC with investments from VMware and Intel. This company was established to create a fully integrated IT platform that combines compute, network, storage, virtualization and management technologies from Cisco, EMC and VMware.  8×8 is able to accelerate deployment of cloud-based computing solutions by adopting the Vblock platform. These solutions have the ability to significantly cut down the cost of IT and allow businesses to focus on innovation instead spending resources on integrating, validating and managing IT infrastructure.

8×8’s recently acquired Zerigo and this strategic move allows it to add a comprehensive, easy-to-use and powerful provisioning mechanism to the Vblock platform. As a result of this acquisition, 8×8 can accomplish rapid and automatic deployment of flexible cloud computing services.

8×8 is building its enterprise cloud service offerings with leading technology from industry cloud computing heavyweights like Cisco, EMC and VMware,” said Bryan Martin, chairman & CEO of 8×8. “The Vblock solution represents the platinum standard for tier 1 business applications and provides businesses with the confidence to entrust mission critical applications to the cloud. We view this partnership as a major stepping stone towards our goal of becoming the preferred provider for all types of cloud services for businesses across the United States.

VCE is very pleased to work with 8×8,” said Frank Hauck, president of VCE. “Vblock platforms form the perfect foundation to build cloud infrastructures that support mission critical applications securely and confidently, while providing the agility and efficiency so important to today’s enterprise IT operations.

Looking forward, 8×8 will market these cloud services to larger enterprise and government customers as well as its traditional SMB customer base.

The company will leverage its new and existing channel relationships to this end.

By Anuradha Shukla

Sorry, comments are closed for this post.

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…