Mozilla to Firefox users: Here's how we're protecting you from code injection attacks

Mozilla to Firefox users: Here’s how we’re protecting you from code injection attacks

Mozilla cleans up Firefox to cut risk of code injection attacks and deter use of a dangerous JavaScript function Firefox-maker Mozilla has detailed its recent efforts to harden the browser against code injection attacks. That hardening work has focused on removing "potentially dangerous artifacts" in
/
Microsoft to use AI to filter game chat

Microsoft to use AI to filter game chat

Microsoft is turning to AI and machine learning to let Xbox gamers filter the language they see in text messages. It is introducing customisable filters that let gamers choose the vocabulary they see in messages from friends and rival players. The four levels of filtering
/
Infosec thought leaders

How a Connection Broker Manages Complexity and Remote Access

Hyperconverged and Hybrid Environments

Consolidating desktop workloads in the datacenter using hyperconverged infrastructure and virtualization optimizes resources, reduces power consumption, and saves money. However, managing the complexity of a consolidated datacenter, along with public cloud resources, presents its own set of challenges. A connection broker is an essential element of an effective VDI or hosted application deployment to meet the challenges of datacenter or hybrid cloud complexity.

Data centers are a beast. No matter the size of your organization, building, maintaining, and scaling your data center is a never-ending task for your over-worked IT department. If not properly managed, data center complexity increases your costs, reduces your agility, and can even hinder the performance of your mission-critical applications.

What are these mission-critical applications? They could be employee applications, like the CAD application used by your engineers. They could also be corporate applications, such as a Microsoft SQL Server database. Finally, important to a company like Leostream who builds connection broker technology, the “application” may actually be the user’s entire desktop.

Building independent silos for each of these “applications” – using dedicated storage, network, and servers for each use case – typically results in underutilized compute resources, high power consumption, and costly management fees.

Hyperconvergence and Virtualization to the Rescue

Thankfully, two technologies evolved to help battle data center complexity and solve the problems inherent in silos: hyperconverged systems and virtualization.

Hyperconverged systems combine servers, storage, and networking into a single solution. With fewer moving parts, hyperconverged systems are easier to deploy and manage.

The virtualization layer then transforms the single physical server into multiple virtual servers or virtual desktops, optimizing hardware utilization. By implementing these two technologies together, IT can deploy applications and desktops faster, easily scale the data center as demand increases, and even save a little money.

Managing Hybrid Cloud Complexity

While hyperconverged systems evolved to solve data center complexity, the public cloud threatened to add complexity back into IT. With the public cloud, IT could host desktops and applications off premises, usually at a lower cost and as an operating expense, instead of a capital expense.

While the promise of saving money is high, not all desktops and applications are suitable for moving to a cloud environment, leaving IT in a position where they need to manage applications and desktops both on-premises and in the public cloud, in a complex hybrid environment.

What’s the big challenge presented by a complex hyperconverged and hybrid environments?

In two words – remote user access. When introducing technologies to solve data center complexity, or moving to the public cloud to save on capital expenses, you need to ensure that you don’t transfer complexity to the end user. End users need access to the correct desktops and applications, delivered using a display protocol that meets their performance needs, from almost any location. To address these challenges, a connection broker is an essential element in your hosted application and desktop deployment.

How does a connection broker manage datacenter complexity and user remote access?

End users don’t care where or how their desktops and applications are hosted; they just need access. By including a connection broker, such as the Leostream Connection Broker, users access a single portal to request and access any of the resources in your data center or even in a public cloud.

The Leostream Connection Broker integrates with a variety of hyperconverged, virtualization, and cloud platforms, such as VMware vSphere, OpenStack, AWS, Azure, and Google Cloud Platform, as well as different hardware form factors such as HPE Moonshot Systems or workstations that utilize NVIDIA GPUs. Regardless of how you decide to build your data center or what cloud you plan to use, end users always enter through a single Leostream login to gain access to their allocated applications and desktops.

When connecting to their desktop, Leostream uses either an HTML5-based display protocol or one of a variety of supported high-performance display protocols to meet the performance needs of any application – including graphics-rich applications.

Additionally, Leostream provides tools to help manage capacity in your cloud or virtualization platform by automatically launching and deleting desktops and applications as user demand waxes and wanes. Leostream can even be set to release or terminate the user’s desktop if they become idle. These tools, and more, help IT reign in application sprawl both on premises and in the cloud, where unintended sprawl increases compute costs.

A connection broker solves the primary challenge of datacenter-access complexity by connecting users to the applications and desktops they need to get their jobs done. With the connection broker managing end-user connections, IT can focus on managing complexity elsewhere in the data center, knowing that their users always have access to what they need.

By Karen Gondoly

  • Recent Articles
Karen Gondoly Contributor
Leostream Corporation – CEO
A 15-year veteran of the technology industry, Karen Gondoly brings leadership experience as well as extensive skills in software development, technical writing, GUI design, and usability to her role as CEO of Leostream Corporation. An active advocate of innovations in the desktops virtualization space, Gondoly writes widely on the topics of hosting resources in the datacenter and is a member of the “Women of OpenStack” community. A graduate of Massachusetts Institute of Technology, she holds bachelor and master of science degrees in aeronautical/astronautical engineering. She is a dedicated fitness enthusiast and avid runner, having completed over 40 marathons spanning 38 states and 3 countries.
follow me
Bryan Doerr

Cyber-Threats and the Need for Secure Industrial Control Systems

Secure Industrial Control Systems (ICS) Industrial Control Systems (ICS) tend to be “out of sight, out of mind.” These systems are essential to life in ...
The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments ...
The Cloud Debate - Private, Public, Hybrid or Multi Clouds?

The Cloud Debate – Private, Public, Hybrid or Multi Clouds?

The Cloud Debate Now that we've gotten over the hump of whether we should adopt the cloud or not, "which cloud" is now the center ...
Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Cloud-Enabled Managed Hosting Provider We are all familiar with the old saying “That's like comparing apples to oranges” and though we learned this lesson during ...
Mark Casey Apcela

Industrial IoT will reshape network requirements

Industrial IoT The hype around IoT may have been surpassed this year by breathless coverage of topics such as artificial intelligence and cryptocurrencies, but there ...
It Programs Compressor