Zenoss Expands Unified Cloud Monitoring With Support for Citrix CloudStack

Heterogeneous Cloud Management Enhanced With Addition of Leading Cloud Computing Platform

SANTA CLARA, CA–(Marketwire – Nov 7, 2011) – Today at Cloud Expo, Zenoss, a leading provider of management software for physical, virtual, and cloud-based IT infrastructures, announced the availability of a free and open source CloudStack ZenPack. The new ZenPack extends Zenoss Core to manage the open source Citrix CloudStack™, providing CloudStack users with a unified view of their cloud infrastructure.

Citrix CloudStack is a production-ready, free and open source cloud infrastructure platform that helps providers of all types deploy and manage simple, cost-effective cloud services that are scalable, secure and open by design. Zenoss’ ZenPack provides an additional level of management by tracking capacity and usage trends for the entire cloud, as well as alerting to changes in both physical and virtual infrastructure. Bringing this level of capacity monitoring for CloudStack into Zenoss’ unified status, performance and event monitoring of existing infrastructure allows CloudStack to be more seamlessly integrated into an organization’s existing operations.

Interest in building clouds, public or private, is on the rise. To ensure a successful cloud deployment, IT must have unified visibility and real-time awareness of their entire cloud infrastructure,” said Bill Karpovich, co-founder and CEO of Zenoss. “Zenoss’ work with Citrix is a natural fit for customers pursuing the full management and operation of robust private, public or hybrid clouds.”

Citrix CloudStack provides customers with the fastest path to the cloud by providing the most advanced software technologies for building highly scalable, highly reliable cloud computing environments. More than 60 large-scale production clouds have been deployed using the open source CloudStack, including GoDaddy, GreenQloud, KT, Nokia, Tata Communications and Zynga.

Citrix wants customers to have a choice as they build cloud infrastructures while ensuring that their cloud solution easily integrates with other cloud technologies,” said Peder Ulander, Vice President of Product Marketing, Cloud Platform Group at Citrix Systems. “Zenoss’ support of Citrix CloudStack will enable our joint customers to have complete control and visibility into their cloud-based IT infrastructure.”

Zenoss will be demonstrating the new CloudStack ZenPack at the Cloud Expo in Santa Clara, November 7-10 in booth No. 816.

About Zenoss Inc.

Zenoss is a leading provider of management software for physical, virtual, and cloud-based IT infrastructures. Over 35,000 organizations worldwide have deployed Zenoss to manage their networks, servers, virtual devices, storage, and cloud infrastructure, gaining complete visibility and predictability into their IT operations. Customers include Rackspace, VMware, Hosting.com, LinkedIn, Carlson, Motorola and Deutsche Bank. Zenoss was recognized as a “Visionary” in Gartner’s 2010 Magic Quadrant for IT Event Correlation and Analysis.

Source: Marketwire

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…