As more and more businesses adopt the “working from anywhere” policy, these policies also open other challenges that the business must deal with. These challenges must be met with a balanced response covering complexity, security and costs.
In our last blog post we got to where we connected our workload to our new created segment. At this point, you probably require an internet access to and from your workloads or North-South connection. This blog post will guide you through the steps to connect your NSX-t with the outside world easily and quickly using BGP connection.
In the previous blog post, we learned how to deploy the NSX-t Manager and Edge serves. This gets us ready to start attaching our workloads to our logical networks, or NSX-t segments. Let’s together learn how to create and attach a workload to a segment.
Deploying VMware NSX-t is a straightforward and simple task, but things can become confusing when it comes to the configuration of the NSX-t environment. In this blog post, I will show you how to simplify the configuration to help you get started.
To secure your data, you are probably using data encryption and data encryption keys on each set of your data. This method of data encryption can be simplified by using centralised encryption keys offered by Azure Key Vault. Lets learn how to set it up, and how long it takes.Continue reading
Are you using a Microsoft Azure SQL Database and wondering how you can easily backup your databases? Perhaps you are running a mix of Azure managed and unmanaged SQL servers and wish to standardise your backup strategy? We will go through some of your backup options in this blog.
Sometimes you are required to deliver services that combine the different workloads of two different kernels. Does this strategy of service delivery require two different Kubernetes clusters? Can you run the different workloads on the same Kubernetes cluster?
DevOps culture is becoming the norm of the cloud era. Many companies are beginning to think of implementing this culture into their businesses. As an IT professional, is important that you be familiar with these new skills, and be prepared to use them in the future. How do we start?
Many organisations are diverting their focus to protecting their data against Ransomware attacks. Even the best security out there cannot make you 100% immune. So how can you use Azure Private Endpoint to reduce your surface area facing an attack against your data?
Veeam Datalabs is a powerful feature that can help your organization automatically validate your backup recoverability and integrity. However, setting Datalabs on your on-premises, or on the cloud environment, requires a very accurate network and routing configuration. Let’s simplify this topic.