Summer Journal

Volume 29, Issue 3

Full Contents Now Available!

Jon Seals

(TNS) - The first students to race up the stairs at Ocosta Elementary School’s new gym and tsunami refuge were so excited, it took teachers a while to corral them into orderly lines on the rooftop.

“It’s really cool to finally see kids up here,” Paula Akerlund said, as the third-graders jostled and joked and tried to peer over the tall parapet on a sunny spring afternoon.

Akerlund is superintendent of the Ocosta School District, headquartered near Westport in Washington state a scant half-mile from the Pacific Ocean. On Saturday, she will preside over a dedication ceremony for what — on the outside — looks pretty much like any modern school complex.


In today’s corporate structure, many workers telecommute full time, or at least have the ability do so in certain circumstances. Most of our customers use “Work from Home” (WFH) as a recovery strategy for their loss scenarios. In a lot of cases, this can be a great approach, but it should never be your ONLY strategy. In many instances, there are simply too many variables to have WFH be a reliable plan on its own.

Consider the following examples:


The Federal Emergency Management Agency (FEMA) is announcing the release of the State Mitigation Planning Key Topics Bulletin: Risk Assessment, now available in the FEMA library at"> The Risk Assessment Bulletin provides suggestions for identifying and describing hazards, identifying state assets, analyzing risks, and summarizing vulnerability. The Risk Assessment Bulletin emphasizes ways that states can address the requirements to include the considerations of future hazard conditions, including the effects of long-term changes in weather patterns and climate on hazards.


The State Mitigation Planning Key Topics Bulletins (“Bulletins”) series covers the various components of the state mitigation planning process, including risk assessment, mitigation capabilities, and mitigation strategy. The Bulletins are brief documents aimed at informing states, the District of Columbia, and five U.S. Territories on the various ways to meet the regulatory and policy requirements described in the">State Mitigation Plan Review Guide (“Guide”), which became effective March 6, 2016.The Guide presents FEMA’s official policy on and interpretation of the natural hazard mitigation planning requirements for states established in the Code of Federal Regulations (44 CFR Part 201). The Bulletins are not intended to clarify policy, but instead to provide state officials approaches and resources for updating state hazard mitigation plans.


For more information and updates on FEMA’s Hazard Mitigation Planning Program, please visit">

INDIANAPOLIS, Ind. – Scale Computing, the market leader in hyperconverged storage, server and virtualization solutions for midsized companies, announced today a new user community, Scale Legion, for IT professionals in small to midsized environments. Scale Legion is open to any IT professional who manages a hyperconverged infrastructure, regardless of virtualization platform(s), in addition to employees of the more than 1300 organizations using Scale Computing products and Scale's solution provider partners.

Members of Scale Legion will have access to web-based and in-person opportunities to network with peers, educational resources, including talks, meetings, conferences, road shows, webinars, training, technical materials, and other content to help create efficient, flexible SMB data centers. Scale Computing also intends to give community members an active voice in product direction.

The Scale Legion concept was born out of the end user community at Spiceworks, the social and professional network for tech workers, and nurtured by Shane Weinbrecht, who was president of the VMware Users Group (VMUG) for more than four years. Weinbrecht, a longtime expert in SMB virtualization technologies and platforms, now serves as Scale Computing's Senior Systems Engineer and Community Manager, North America, working directly with customers and resellers to build data center solutions using Scale's HC3 product line.

"IT administrators in these organizations are often generalists, who must have a wide variety of skills, from servers to data protection to iSCSI to website development," said Weinbrecht. "Scale Legion is a community of peers who are facing the same complexities and demands, so we can collaborate, commiserate, and learn from each other. This is a community for technologists who aren't afraid to go against the status quo and build new things."

The Scale Legion's official launch event will be held in New York City at The Grand Havana Room, ( on June 15. For more information or to register, visit

To learn more about Scale Legion, or join the community, visit:

Linked IN:


Twitter: @ScaleLegion


Scale Computing's HC3 platform brings storage, servers, virtualization and management together in a single, comprehensive system. With no virtualization software to license and no external storage to buy, HC3 products lower out-of-pocket costs and radically simplify the infrastructure needed to keep applications running. HC3 products make the deployment and management of a highly available and scalable infrastructure as easy to manage as a single server. Scale's updated storage architecture supports hybrid storage including SSD and spinning disk with HyperCore Enhanced Automated Tiering (HEAT) without the need for VSAs, SAN protocols, or file system overhead.

About Scale Computing
Scale Computing integrates storage, servers, and virtualization software into an all-in-one appliance based system that is scalable, self-healing, and as easy to manage as a single server. Using industry standard components, the HC3 appliances install in under an hour, and can be expanded and upgraded with no downtime. High availability insulates the user from any disk or server failure and a unified management capability driven by the patented HyperCore Software™, efficiently integrates all functionality. The result is a data center solution that reduces operational complexity, allows a faster response to business issues, and dramatically reduces costs.


With Arkin, VMware vRealize Suite Will Uniquely Deliver Operational Control and Visibility for Applications Across Compute, Storage and Networking Elements in the Data Center

PALO ALTO, Calif. – VMware, Inc. (NYSE: VMW), the global leader in virtualization and cloud infrastructure, today announced the intention to acquire Arkin Net, a leader in software-defined data center security and operations. Financial details of the transaction were not disclosed. The transaction is expected to close in Q2 2016.

Organizations globally are adopting a software-defined data center (SDDC) architecture based on VMware virtualized infrastructure and management to deliver automation, security and continuity for applications. SDDC breaks down the barriers between traditionally disparate domains of compute, networking and storage. This evolution requires an operational model that delivers cross-silo visibility and collaboration. With the acquisition of Arkin, and through the integration of VMware vRealize® Suite, cloud management teams will have access to a new generation of planning, troubleshooting and automation platform that provide visibility and control across the entire data center environment.

VMware NSX™ network virtualization is being widely adopted in large scale production deployments as part of the SDDC where cross-silo visibility and collaboration is critical. Identified by Gartner in "Cool Vendors in Enterprise Networking, 2016(1)," Arkin is purpose-built for NSX environments. The Arkin platform provides insights into the datacenter traffic flows via a pre-assessment tool that enables faster NSX deployments via micro-segmentation planning. Post deployment, Arkin significantly lowers time to resolution, leveraging constructs such as time-machine, plain English search and contextual analytics across virtual and physical layers.

Today, VMware vRealize Operations provides extensive management across both physical and virtual compute and storage environments. With the acquisition of Arkin, VMware vRealize Suite will have the ability to extend across the entire SDDC, including the VMware NSX network virtualization layer.

"Arkin is a great fit for VMware and its customers as we look to accelerate our growth businesses including cloud management and network virtualization," said Ajay Singh, senior vice president and general manager, cloud management business unit, VMware. "With VMware NSX combined with Arkin and vRealize, VMware will deliver the security and operations management plane for the SDDC. Over time, Arkin will solidify vRealize Suite's position as the industry's most comprehensive Cloud Management Platform that delivers application-focused operations, NSX micro-segmentation at scale and cross-domain visibility and context across physical and logical infrastructure."

"Arkin and VMware have been great partners and we're now excited to join the VMware family to take Arkin to the next level," said Shiv Agarwal, co-founder and chief executive officer, Arkin. "Arkin delivers a new operations paradigm that has been built from the ground up for VMware NSX network virtualization and is fully aligned with the core NSX use cases of IT automation, security and application continuity."

VMware and Arkin are already collaborating to meet the needs of mutual customers such as Columbia Sportswear, California Department of Water Resources (CDWR) and Nebraska Medicine.

"Operational visibility, which accounts for both hardware and software, is critical to how organizations succeed in using next-generation data center technologies," said John Spiegel, IS/Global Communications Manager at Columbia Sportswear. "The combination of VMware NSX and Arkin provides us a tactical and strategic lens for managing our virtualized data center."

"Arkin and VMware are strategic partners helping Nebraska Medicine deploy our next-generation NSX based software-defined data center," said Brian Lancaster, Executive Director of Information Management at Nebraska Medicine. "Arkin real-time flow analytics makes it extremely easy to implement micro-segmentation security. The visibility and troubleshooting capabilities that Arkin provides to our networking and operations teams enables us to more quickly and confidently scale our NSX deployment."

Additional Resources

About Arkin Net

Arkin is enabling software-defined security and networking for next generation data centers and cloud. Several F500/G2000 organizations have deployed the Arkin platform to get deep operational visibility across virtual and physical, implement micro- segmentation based security, and ensure high application availability. Visit or follow us @arkinnet

About VMware
VMware is a global leader in cloud infrastructure and business mobility. Built on VMware's industry-leading virtualization technology, our solutions deliver a brave new model of IT that is fluid, instant and more secure. Customers can innovate faster by rapidly developing, automatically delivering and more safely consuming any application. With 2015 revenues of $6.6 billion, VMware has more than 500,000 customers and 75,000 partners. The company is headquartered in Silicon Valley with offices throughout the world and can be found online at

VMware, vRealize, and VMware NSX are registered trademarks or trademarks of VMware, Inc. in the United States and other jurisdictions.

  1. Gartner Cool Vendors in Enterprise Networking, 2016 - April 13, 2016, Document G00299631.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Forward-Looking Statements

This press release contains forward-looking statements including, among other things, statements regarding the consummation of the acquisition of Arkin Net, the anticipated timing for the closing of the transaction, the impact of the transaction on VMware's future product offerings and anticipated benefits of the transaction for customers and partners. These forward-looking statements are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995 and are made as of the date of this press release. Actual results could differ materially from those projected in the forward-looking statements as a result of certain risks, uncertainties, changes in condition, significance, value and effect, including but not limited to (i) the satisfaction of closing conditions for the acquisition; (ii) unexpected costs, liabilities or delays in connection with the transaction; (iii) adverse changes in general economic or market conditions; (iv) the unsuccessful integration of acquired companies and assets into VMware; (v) competitive factors, including but not limited to pricing pressures, industry consolidation and the entry of new competitors into industries in which we compete; (vi) VMware's customers' acceptance of and ability to transition to new products and computing strategies; (vii) rapid technological changes in the industries in which we compete; (viii) VMware's relationship with EMC Corporation and EMC's ability to control matters requiring stockholder approval, and any changes that Dell may implement following the completion of the Dell-EMC merger, as well as other risks detailed in documents filed with the Securities and Exchange Commission, including VMware's most recent reports on Form 10-K and Form 10-Q and current reports on Form 8-K that we may file from time to time. These forward-looking statements are made as of the date of this press release and are based on current expectations. VMware assumes no obligation to, and does not currently intend to, update any such forward-looking statements after the date of this release.

Interconnection Platform Enables Direct Connectivity to Leading Cloud Providers Including Amazon Web Services and Microsoft Azure

HERNDON, Va. – EdgeConneX®, specializing in global data center solutions at the Edge of the network, today announces that Console will deploy its leading enterprise software and interconnection platform in its Detroit Edge Data Center®. With Console, EdgeConneX's Detroit metro area enterprise customers will gain scalable, private, direct connections to the world's most popular cloud service providers, including Microsoft Azure, Amazon Web Services (AWS) and more.

With Console, companies can bypass the public Internet and directly connect to business-critical cloud services, such as Amazon Web Services, Microsoft Azure and Google Cloud Platform. In addition, the Console platform enables direct connections with a variety of other cloud service providers, enterprises and networks. Services accessible via the Console platform offer highly reliable, private and flexible direct connections that avoid the associated risks of sending data over the public Internet. The Console platform extracts Layer 2 and Layer 3 configuration complexity for the enterprise to connect its network privately and directly to others.

Following its recent announcement in Portland, EdgeConneX is pleased to announce Detroit as the next Tier 2 market to now offer locally available cloud for area enterprises. The new high-speed connectivity service provides additional options for companies requiring the most direct, cost-effective, reliable and secure access to their preferred cloud-based solutions. The combination of these offerings will make the EdgeConneX Detroit Edge Data Center (EDC) one of the most connected, high-performance and secure cloud on-ramp facilities in the country.

"With Console's enterprise software and interconnection platform, EdgeConneX will provide enterprise businesses full access to the cloud in the Detroit metro market," remarks Clint Heiden, chief commercial officer, EdgeConneX. "This deployment highlights how investments made at the Edge of the network can level the playing field for enterprises located in cities outside of the few core global markets, transforming non-traditional locations to prime connectivity points for burgeoning enterprise businesses."

"As enterprises look to scale and innovate, they need secure and consistent access to the cloud," Al Burgio, CEO, Console, comments. "The Detroit Edge Data Center, enabled by Console's Interconnection Platform, allows area enterprises to have secure and robust solutions to quickly solve their cloud migration challenges."

The EdgeConneX Detroit EDC is purpose-built to offer security, speed and performance improvements. These innovations enable customers to deliver digital content, cloud and applications to end-users as fast as possible. Edge Data Centers are proximity-based, strategically located nearest to end-users' points of access to reduce network latency and optimize performance. Local proximity access also brings the cloud closer to the enterprise, enabling more secure, real-time access to cloud applications and services while offering reduced backbone transport costs.

For more information about EdgeConneX and its leading Edge of network infrastructure solutions for expanding and improving access to wireless and data communications, visit: or email

About EdgeConneX®
EdgeConneX® is the only global Edge Data Center® provider. Creating purpose-built, edge-of-network infrastructure solutions that extend the Internet's reach, EdgeConneX enables the fastest and most secure delivery of content, cloud services and applications. Edge Data Centers host bandwidth intensive and latency sensitive data closer to end-users, establishing a more secure, reliable and cost effective distribution model for the Internet. For more information, please visit the EdgeConneX Internet of Everywhere® at

About Console
Console was founded in 2011 to change the way enterprises connect to their customers, vendors and partners. Console's next generation interconnection platform enables any-to-any collaboration globally, for clouds, networks and enterprises. The Console platform provides enhanced network security, improved performance and faster business-to-business direct connections. For more information, visit

Console (formerly IIX Inc.) is headquartered in Silicon Valley, California. The company has expanded its global interconnection footprint into more than 160 Points of Presence (PoPs) across the U.S., Canada, Europe, Asia and the Middle East. Console is privately held and investors include New Enterprise Associates (NEA), Formation 8, DOT Capital, AME Cloud Ventures and Drew Perkins.

Console is a trademark and IIX is a registered trademark of Console Connect Inc. All other trademarks are the property of their respective owners.

New Application Uses Behavioral Analytics to Detect Ransomware as It Enters Corporate Networks

NATIONAL HARBOR, MD – Exabeam, the leader in user and entity behavior analytics (UEBA) for security, today announced Exabeam Analytics for Ransomware, a new application designed for early detection of ransomware, one of the most pressing security threats in 2016. With this new application, Exabeam can provide significant early detection across the corporate network, in the absence of third party security controls. Unlike other security products, Exabeam can detect ransomware movement and activity in the network, the servers, workstations, BYOD devices, and cloud services.

In April of this year, the DHS released a report indicating that the National Cybersecurity and Communications Integration Center (NCCIC) had received 321 reports of ransomware-related activity affecting 29 different federal agencies since June 2015. In the same month, HIMSS Analytics released survey results indicating that half of the U.S. hospitals surveyed had been hit by ransomware. Another 25% indicated that they had no way of knowing if ransomware had penetrated their networks.

"Ask any CISO about their biggest challenge today, and ransomware will almost certainly be the response," said Nir Polak, CEO of Exabeam. "It's bypassing security tools and overwhelming already-overburdened security analysts. Exabeam Analytics for Ransomware addresses both detection and response, bringing relief to stressed security departments. As the Internet of Things grows, the ability to monitor entity (i.e. machine) behavior becomes critical to IT security and this is our newest entry in that market."

Ransomware can significantly disrupt business operations by threatening data access and integrity. However, this threat is usually detected too late to stop its effects. Because ransomware changes often and spreads quickly, many legacy detection techniques are ineffective, and result in temporary -- and potentially permanent -- data loss. Exabeam uses cutting-edge techniques to detect ransomware as it first enters the network and begins to spread. These techniques include both behavioral analysis and file analysis:

  • Detecting new (i.e. unknown) ransomware via machine-learning. With no signatures and no static correlation rules, Exabeam learns the normal file and document behaviors of an organization's employees, and quickly finds the anomalies associated with ransomware infection.
  • Detecting known ransomware via indicators of compromise. Known ransomware processes use certain file extensions and have known patterns or other indicators listed in threat intelligence feeds. The Exabeam Threat Research Team verifies these indicators and implements them in the product.
  • Infrastructure-wide, hybrid-cloud ransomware protection. By looking at machine logs, Exabeam can detect ransomware operating on endpoints, in the datacenter or against cloud based storage services. For example, an employee might access corporate files on the cloud sharing service Box from home, using his personal device, and in the process, allow ransomware to begin encrypting the Box files. Other employees accessing the same corporate files enable the malware to infect their corporate workstations and begin moving across the corporate network. Only Exabeam can detect this activity end to end, and early enough to prevent disruption.

Exabeam Analytics for Ransomware can inter-operate with specific security technologies, such as endpoint protection products, to perform additional analytics.

Exabeam Analytics for Ransomware is available as either a physical appliance or a virtual machine. It can be deployed in hours and delivers true security insight quickly. Existing customers can upgrade their systems to gain these new capabilities. Pricing is based on number of users. For more information, go to:

About Exabeam
Exabeam's security intelligence solution leverages existing log, endpoint, and other data to quickly detect advanced attacks, prioritize incidents and guide effective response. The company's Stateful User Tracking™ automates the work of security analysts by resolving individual security events and behavioral anomalies into a complete attack chain. This dramatically reduces response times and uncovers attack impacts that would otherwise go unseen. Built by seasoned security experts and enterprise IT veterans from Imperva, ArcSight and Sumo Logic, Exabeam is headquartered in San Mateo, California and is privately funded by Aspect Ventures, Icon Ventures, investor Shlomo Kramer and Norwest Venture Partners. Visit us on Facebook or Twitter and follow us on LinkedIn.

Extending the VMware AirWatch Platform to Cloud Security Partners Offer Validated and Integrated Solutions for Cloud and Mobile Security

PALO ALTO, Calif. – VMware, Inc. (NYSE: VMW), a global leader in cloud infrastructure and business mobility, today announced five leading cloud access security broker (CASB) leaders have joined the Mobile Security Alliance. The addition of Blue Coat Systems, Inc., CloudLock, Netskope, Palo Alto Networks and Skyhigh Networks adds to the growing support from security industry leaders for the VMware AirWatch® Enterprise Mobility Management™ (EMM) platform to collaboratively solve the challenge of mobile and cloud security. Integrating VMware Workspace™ ONE™ with products from CASB partners can deliver validated solutions that provide security, visibility and control of applications and devices, and secure digital workspaces from the cloud.

"VMware AirWatch is an Enterprise Mobility Management leader with a proven platform for the mobile-cloud era," said Noah Wasmer, senior vice president, product management, mobile products, End-User Computing, VMware. "We are extending the mobility management and identity management technologies in VMware Workspace ONE to the industry's leading cloud security providers to give customers a holistic view of their mobile-cloud health and security. Optimized integration between VMware Workspace ONE and CASB partner solutions enable quick action and remediation against threats from a single platform, simplifying mobile-cloud security and management."

As organizations embrace mobile and cloud technologies, security across cloud applications is a key factor in corporate security compliance. Integrations between CASB solutions, VMware AirWatch and VMware Workspace ONE help unify enterprise mobility, identity management and cloud security to provide customers a secure and compliant environment. The integrated solutions offer organizations the ability to detect security vulnerabilities in cloud applications and enforce specific actions on mobile devices seamlessly and instantly, reducing the risk and vulnerabilities of mobile devices accessing cloud applications. These joint solutions support common mobile-cloud use cases including secure cloud collaboration, access to sensitive information in customer reference management (CRM) products and, the reduction and control of "shadow IT."

The Mobile Security Alliance launched in 2015 and is supported by 17 partners, including Check Point Software Technologies, FireEye, Intel Security and Palo Alto Networks. Members work in conjunction with VMware engineering to develop validated, joint solutions and aligned roadmaps, providing customers seamless security management from a single pane of glass. The Mobile Security Alliance focuses on four key security areas: device, application, network and cloud.


Validated and integrated solutions from VMware, Blue Coat Systems, Inc., CloudLock, Netskope, Palo Alto Networks and Skyhigh Networks are available today.

Supporting Quotes:

"The rate of smartphone and tablet adoption by the workforce has caught many enterprises off guard and ill prepared to maximize the full benefit of these devices while ensuring its secure use. The most logical approach is to deploy best-of-breed enterprise mobility management and content security solutions together at the enterprise to smartphones and tablets. Blue Coat and VMware have teamed up to offer a completely interoperable and comprehensive security solution to address the need and to safeguard enterprise customer data." - Peter Doggart, vice president of Business Development, Blue Coat Systems, Inc.

"We're very excited to announce the expansion of our initial collaboration with VMware on EMM and identity, enabling joint customers to benefit from end-to-end security visibility across their cloud and mobile infrastructure. Through the combination of these best-of-breed technologies -- VMware AirWatch, VMware Identity Manager™ and CloudLock's CASB and cybersecurity platform -- we can deliver unified remediation of risks with zero impact on users, without requiring agents." - Manolo Gonzalez, vice president of Platform and Technology Alliances, CloudLock

"We look forward to providing our joint customers enhanced capabilities and deeper integration as part of the Mobile Security Alliance. Employees and enterprises alike have embraced the combination of mobile and cloud to ensure productivity and efficiency, and integrating the Netskope Active Platform with VMware AirWatch and VMware Identity Manager provides IT with exceptional real-time visibility and actionable control for both sanctioned and unsanctioned cloud app traffic on mobile devices." - Rick Holden, vice president of Business Development and Alliances, Netskope

"Cloud applications built for mobile devices have become indispensable productivity tools for many organizations. With this growing trend, many IT teams are struggling to extend policy enforcement across devices, users and cloud applications. The extension of our partnership with VMware to include Aperture will provide a unique approach to securing SaaS applications accessed through mobile devices to prevent data risk, malware insertion and compliance violations." - Chad Kinzelberg, senior vice president of Corporate and Business Development, Palo Alto Networks

"In today's mobile-cloud era, organizations are seeking integrated solutions that provide seamless visibility and policy enforcement across users (identity), device and data. Skyhigh's proven scale across more than 30 million users, comprehensive deployment options (proxy and API), industry leading DLP and user behavior analytics, and agentless approach allows organizations to embrace mobile and cloud solutions while seamlessly enforcing their security, compliance and governance policies. We are thrilled to partner with VMware to bring the largest deployment of EMM with the largest deployment of CASB to deliver best-in-class mobile-cloud security for the industry." - Kamal Shah, senior vice president of products and marketing, Skyhigh Networks

Additional Resources

  • Watch a discussion between Sanjay Poonen, executive vice president and general manager, End-User Computing and head of global marketing and communications, VMware and Rajiv Gupta, chief executive officer, Skyhigh Networks
  • For information about the new unified endpoint management and security solution, VMware TrustPoint™ also announced today, read the press release here
  • For information about the updates to VMware Workspace™ ONE also announced today, read the press release here
  • Follow us on Twitter and Facebook

About VMware

VMware is a leader in cloud infrastructure and business mobility. Built on VMware's industry-leading virtualization technology, our solutions deliver a brave new model of IT that is fluid, instant and more secure. Customers can innovate faster by rapidly developing, automatically delivering and more safely consuming any application. With 2015 revenues of $6.6 billion, VMware has more than 500,000 customers and 75,000 partners. The company is headquartered in Silicon Valley with offices throughout the world and can be found online at

VMware, AirWatch, AirWatch Enterprise Mobility Management, VMware Workspace, Workspace One, and VMware Identity Manager are registered trademarks or trademarks of VMware, Inc. or its subsidiaries in the United States and other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.


NetApp SolidFire's Scale-out Design and Guaranteed Performance Enable Telecommunications Innovator to Deliver Transformational Cloud Services to Customers in the Philippines and Across Asia

BOULDER, Colo. – NetApp SolidFire (NASDAQ: NTAP), the leader in all-flash storage systems built for the Next Generation Data Center, today announced that Globe Telecom, a leading full-service telecommunications company in the Philippines, through its Globe Business group, has deployed NetApp SolidFire's all-flash scale-out storage platform to support its Virtual Private Cloud and Dedicated Private Cloud offerings. With NetApp SolidFire's automated, scalable infrastructure that guarantees performance, Globe Business' internal and external customers can meet their storage capacity and performance needs today and in the future at a cost two to three times lower than before.

Globe Business provides an entire suite of products and services for mobile, fixed, broadband, data connections, internet and managed services. With its own network of data centers around the country, Globe Business prides itself on continuously improving value-added services for its customers. In order to accelerate its cloud offerings and give it an even better competitive edge, Globe Business turned to NetApp SolidFire to modernize its data center infrastructure, and in turn, enable its customers to harness cloud technology's transformational capabilities.

NetApp SolidFire's unique all-flash architecture met all of Globe Business' criteria to help its customers embrace cloud-first principles, optimize resources, and maximize business opportunities. Thanks to its volume-level Quality of Service (QoS), Globe Business can deliver guaranteed, fast and predictable performance to its customers. With NetApp SolidFire's scale-out design, customers can scale and control performance and capacity independently, without downtime or disruption. Utilizing NetApp SolidFire's always-on data-at-rest encryption and real-time replication, customer data always stays safe and secure.

The NetApp SolidFire platform is deeply integrated with VMware vSphere via its REST-based API, allowing for complete automation, instant provisioning and end-to-end monitoring. These features, in combination with NetApp SolidFire's comprehensive data reduction capabilities, enable Globe Business to realize significant cost-savings that translate into competitive pricing options for its customers. In addition, NetApp SolidFire's partner AISC assisted Globe Business with solution positioning and continues to provide high-quality vendor support.

"With its flexibility and cost efficiency, more and more companies in the Philippines are taking advantage of cloud computing. As they demand higher performance versus just capacity, we realized that adding more disks to the rack was too expensive and inefficient," said Mike Frausing, Globe Senior Advisor for Enterprise and IT Enabled Services Group. "With NetApp SolidFire's all-flash scale-out architecture, our customers have confidence that we can meet their needs for guaranteed levels of performance. We can offer reliable cloud services at a better price, providing a competitive -- and a domestic -- alternative to foreign cloud providers."

"With storage infrastructure fueled by NetApp SolidFire, Globe Business can now deliver services with the speed and agility demanded by their customers," said Stuart Oliver, global service provider programs manager at NetApp SolidFire. "By deploying NetApp SolidFire's all-flash storage, Globe Business was able to build its next-generation cloud service environment to successfully serve the cloud and hosting needs of its customers and a become a disruptor in an increasingly competitive market."

"The telecom market in the Philippines is among the most vibrant and innovative in Asia/Pacific region with service providers offering innovative data services to help businesses and consumers successfully embark into IDC's 3rd Platform era," said Rajnish Arora, Vice President, Enterprise Computing, IDC Asia/Pacific. "By providing differentiated services like guaranteed performance and scale-out storage, cloud service providers gain a significant edge over their competition and are uniquely positioned to meet the needs of the most demanding customers."

Learn how NetApp SolidFire powers the most demanding data centers in the world. Read more about how the Fueled by SolidFire program helps cloud providers define, develop and capitalize on new market opportunities made possible with NetApp SolidFire storage infrastructure.

About Globe
Globe is a leading full service telecommunications company in the Philippines, serving the needs of consumers and businesses across an entire suite of products and services including mobile, fixed, broadband, data connections, internet and managed services. Its principals are Ayala Corporation and Singapore Telecom who are acknowledged industry leaders in the country and in the region. For more information, visit

About Globe Business
The corporate arm of leading telecommunications company in the Philippines Globe Telecom, Globe Business provides a comprehensive range of ICT interconnectivity solutions for the country's top industries, businesses and commercial enterprises engineered according to their business requirements and enabling them continuous access to information. The portfolio of products and services comprise of mobile, wireline, broadband, data connections, internet, managed services and IT-enabling services as well as cloud computing solutions which it pioneered in the country. The company's data center and carrier ethernet services are ISO- and MEF global standards-certified, respectively. For more information, visit

About NetApp SolidFire
NetApp SolidFire (NASDAQ: NTAP) is the market leader in all-flash storage systems built for the Next Generation Data Center. Leveraging SolidFire's all-flash architecture, with volume-level Quality of Service (QoS) controls, customers now can guarantee storage performance to thousands of applications within a shared infrastructure. Coupling this functionality with in-line data reduction techniques and system-wide automation results in substantial capital and operating cost savings relative to traditional disk and basic all-flash storage systems.

About NetApp
Leading organizations worldwide count on NetApp for software, systems and services to manage and store their data. Customers value our teamwork, expertise and passion for helping them succeed now and into the future. To learn more, visit

NetApp and the NetApp logo are trademarks of NetApp, Inc. All other marks are the property of their respective owners. Use of the word "partner" or "partnership" does not imply a legal partnership between NetApp and any other company.

Image Available:

Large Italian Utility Provider Uses 1200R Security Appliance to Enhance Visibility and Control of SCADA Networks

MILAN, ITALY – Check Point® Software Technologies Ltd. (NASDAQ: CHKP) today announced Acea Distribuzione, part of Acea Group, one of the largest Italian public utility companies for power and water supply, has deployed Check Point's 1200R security gateway appliances to secure its critical infrastructure, SCADA network and control systems.

Following the findings of the Panoptesec project, Acea selected the Check Point solution following a competitive tender for a customizable, rugged solution that would work in harsh operating environments, including primary and secondary energy switching and distribution sites, while meeting specific technical requirements. The 1200R appliance was the only proven solution to meet these requirements, and Acea worked with systems integrator DGS Group to deploy it within the company's existing network infrastructure.

Additionally, the 1200R will integrate with the Panoptesec cyber defence decision support infrastructure. This EU-funded initiative addresses the challenges of detecting vulnerabilities and possible attacks on sensitive information and essential networks and services by enabling individuals, companies and organisations to handle security incidents. Panoptesec delivers a continuous cyber security monitoring and response capability in real-time. It proactively and reactively evaluates system weaknesses to identify potential attacks, provide a list of prioritised response actions to automatically manage cyber incidents.

"We wanted to protect our internal and external SCADA assets as well as all the relevant Command & Control centers," says Andrea Guarino, ICT Security, Privacy and Compliance manager at Acea. "The 'pain point' was being able to detect and block all 'normal' attacks against our networks and those attacks specifically targeting SCADA networks and devices. We also needed to ensure we had full visibility of the SCADA command sequences, both sent and received, on the controlled networks and that we were able to record them for forensic and analysis purposes. The Check Point solution was the only one to meet all of our criteria."

The Check Point 1200R has also improved overall performance on Acea's SCADA networks thanks to the traffic filtering done on the appliance: this could potentially enable more peripheral devices to be deployed on existing servers and communication lines.

"The Check Point solution provides us with enhanced security and has improved our ability to identify and respond to potential vulnerabilities," added Andrea Guarino at Acea. "We now also have a better understanding of the command flows and information used by our SCADA systems and industrial control systems. Furthermore, we can now monitor and analyze network traffic, enabling us to improve our overall security posture."

Acea was the first company to utilise the Panoptesec service to centralise data and resources from its commercial partners and suppliers, collating information provided by various cyber security defence systems and probes, including firewall, IPS / IDS, Silent Defense and Syslog. This centralised information simplifies analysis and monitoring, driving further efficiencies.

Amnon Bar-Lev, President at Check Point says: "Our 1200R appliance is optimized for deployment in the harshest of industrial environments and remote locations, to support SCADA networks and control systems. It delivers unrivaled security for critical infrastructure, designed to prevent access and the disruption of vital processes."

The Check Point 1200R is a purpose-built, ruggedized security gateway appliance for harsh industrial environments and remote deployments. It enables full visibility and granular control of SCADA traffic to prevent network, devices and logical process attacks. With over 780 SCADA commands and parameters within the Check Point Firewall and Application Control Software Blades, and over 280 SCADA-specific IPS signatures, Check Point offers the most extensive SCADA security support. Specialized threat reports in Check Point Next Generation SmartEvent provide full reports on SCADA traffic to grant quick and detailed forensics for incident investigations. This overall security solution also has regulation compliance monitoring with the Check Point Compliance Blade.

Follow Check Point via:
Check Point Blog:

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. ( is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyberattacks with an unmatched catch rate of malware and other types of threats. Check Point offers a complete security architecture defending enterprises -- from networks to mobile devices - in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.