Vyatta Supports the Amazon Web Services Cloud

Vyatta Supports the Amazon Web Services Cloud

Vyatta Network OS 6.3 is now available as an Amazon Machine Images (AMI).

The new release offers comprehensive network security for the Amazon Web Services (AWS) cloud with new AMI custom support packages, notes Vyatta, a specialist in software-based networking for physical, virtual and cloud infrastructures.

For those unaware, an Amazon Machine Image (AMI) is a special type of pre-configured operating system and virtual application software that aid in creating a virtual machine within the Amazon Elastic Compute Cloud (EC2).

According to Amazon, AMI serves as the basic unit of deployment for services delivered using EC2.

Amazon cloud customers can leverage Vyatta Network OS AMI to build out secure multi-tier, multi-location architectures within Amazon VPC environments that include the same connectivity, network security and threat protection available from hardware devices in their enterprise datacenters.

Scheduled to be availability from today, September 15, 2011, the Vyatta Network OS AMI offers the most complete virtual networking solution available today.

The release includes stateful firewall, IPSec and SSL-based VPN, intrusion prevention, web filtering, QoS, dynamic routing and more.

“One of our primary objectives for Vyatta Network OS 6.3 was to deliver an on-demand networking solution that provides enterprise-level security for organizations expanding their use of cloud-based environments,” said Tom McCafferty, vice president of marketing at Vyatta. “Providing support for the Amazon Web Services cloud provides a completely virtual networking and security solution for enterprise customers that can operate in Amazon-based public cloud and be migrated to private cloud environments.”

Vyatta delivers a software-based network operating system that is portable to standard x86 hardware as well as common virtualization and cloud computing platforms.

The company was in news earlier this month for receiving its fourth straight InfoWorld Bossie Award for best open source software solution for the data center and cloud.

By Anuradha Shukla

Sorry, comments are closed for this post.

Comics
Cyber Security: McAfee on IoT Threats and Autonomous Cars

Cyber Security: McAfee on IoT Threats and Autonomous Cars

IoT Threats and Autonomous Cars Autonomous cars are just around the corner, there have been controversies surrounding their safety, and a few doubts still hang in the minds of people who don’t like the idea of a computer driving their car. However, the biggest news stories surrounding this topic have been to do with how…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Cyber Criminals Are Business People Too

Cyber Criminals Are Business People Too

Cyber Crime Business You’re on the morning train on the way to work and take a look at the guy next to you. He’s clean-cut, wearing a crisp suit and holding a leather briefcase just like dozens of others. Just another worker headed to the office, right?. Yes, but not in the way you think…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments. Every day, we hear about how another retailer, bank or Internet company has been hacked and private information of customers or employees stolen. Governments and oversight organizations are responding to…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…