This video captures one of the most compelling customer testimonials to date for our Nexus 1000V virtual switch, as we sit down with Sean Donaldson, Director of IT Infrastructure at Secure-24. Secure-24 provides managed hosting and private cloud computing for the enterprise level, business critical applications of large enterprise and middle-market companies.
Today, we announced we will be delivering VM networking support for Hyper-V in Microsoft’s forthcoming Windows 8. Specifically, we are working with Microsoft to deliver integrated support for the Nexus 1000V and VM-FEX technology in their next generation server platform, thus extending the benefits customers have seen from both these technologies to another server/hypervisor environment. For more info, check out the announcement and this brief and this Q&A.
With this latest announcement, we offer (or will offer) Nexus 1000V functionality for VMware vSphere and Microsoft Hyper-V as well as VM-FEX support for those two hypervisors and RedHat Enterprise Virtualization. For folks building out virtualization architectures and cloud environments, we think this is a key benefit, since it maintains their choice and flexibility and allows them to build out hyper-visor agnostic infrastructure that delivers consistent features and functionality.
So, that’s about it for now. Stay tuned to this space and we’ll keep you apprised as things progress.
Before going on to an interview on SiliconAngle.tv and speaking at a Super Session on “How Cisco and VMware Collaborate to Build the Cloud”, Soni Jiandani gave me a couple of minutes to sum up the Cisco innovations announced and on display at VMworld 2011.
At VMworld this week in Las Vegas, Cisco will be providing a preview of a virtual implementation of our ASA security appliance. A “preview” implies that we aren’t ready to announce ultimate pricing or availability, but we are demonstrating a strategic direction for the ASA product line. Earlier, I alluded to important new advances in our virtual security story upcoming at VMworld in the comments section of a recent blog post I wrote responding to HP criticisms of our Virtual Security Gateway (VSG) product.
With security concerns being the most frequently cited obstacle to large scale virtualization projects and adopting cloud computing models, Cisco will be greatly enhancing its industry-leading virtual security infrastructure with this product. The new virtual ASA introduces a wide range of security services that have not been available from Cisco before in a virtual form factor. The virtual ASA will enable more sophisticated security policies that better align with business and compliance needs in the virtual data center.
Some of the key aspects of this new virtual ASA product:
The ASA family is one of the most deployed and trusted security products in the industry, with over 15 years of security experience and more than 1 million appliances installed, and now is available in a virtual form factor for greater flexibility in the data center
Virtual ASA runs the ASA feature set, so important capabilities such as VPN , NAT, and much more will be available in addition to firewall capabilities
The Virtual ASA will run on top of the Nexus 1000V virtual switch, fully leveraging the VM and traffic visibility provided by the Cisco virtual fabric, as well as optimal traffic steering to the security node from the VM and virtual switch
Rather than replacing our VSG virtual firewall, the virtual ASA will be a strong complement for the current VSG capabilities. The virtual ASA includes security functionality most often deployed at the edge of an organization and the edge of the data center. As such, it is better suited for North-South traffic into the data center and virtual applications. VSG, with its greater visibility to VM-specific and application attributes, enforces security policies between applications and virtual machines, and is more East-West traffic oriented.
Across the whole ASA product line, customers will be able to get consistent functionality, management and policy enforcement across all form factors (stand-alone appliance, modular blade, and now virtual instances). And with Nexus 1000V integration, Virtual ASA customers will also get consistency in management, provisioning and service routing with Cisco’s other virtual services including VSG and vWAAS. At a minimum, this should alleviate all objections that we just offered a virtual firewall and not other key security services.
If you are in Las Vegas next week, we encourage you to come by the Cisco booth (#700) for a look. If not, stay tuned for more details…