Start Your Free Trial

Agile Dev & Test Environments With Nested Virtualization

The Ravello Blog

Oracle RAC DB on Ravello

Oracle Real Application Clusters (Oracle RAC) is a shared cache clustered database architecture that utilizes Oracle Grid Infrastructure to enable the sharing of server and storage resources. Automatic, instantaneous failover to other nodes, and therefore enables an extremely high degree of scalability, availability, and performance.

Continue reading »

Migrating virtual training environments from VMware to AWS

Virtual Training in the Cloud

If you’re getting to the point where the training capacity in your datacenter is insufficient, or on the contrary – you find that there is severe under-utilization of hardware that’s just lying there – you might consider a different option: migrating virtual training environments from VMware to AWS. By doing so you will increase your training infrastructure efficiency, you will not waste capacity, and you will gain other benefits – like geographical flexibility, fast environment provisioning, cloud economics, and more.

Continue reading »

Build & test network security architecture using enterprise replicas on AWS & Google Cloud

Author:
Matt Conran
Matt Conran is a Network Architect based out of Ireland and a prolific blogger at Network Insight. In his spare time he writes on topics ranging from SDN, OpenFlow, NFV, OpenStack, Cloud, Automation and Programming.

Colocation with third-party network elements/servers in demilitarized zone (DMZ) is an issue for security architects and puts pressure on network security architecture. How do we connect third party equipment to inhouse security appliances in a flexible way? This is an issue for many large financial & health care institutions, and other enterprises that have to securely connect 3rd party equipment.

Continue reading »

Network security architecture using VXLAN with Palo Alto Networks NG Firewall

Author:
Matt Conran
Matt Conran is a Network Architect based out of Ireland and a prolific blogger at Network Insight. In his spare time he writes on topics ranging from SDN, OpenFlow, NFV, OpenStack, Cloud, Automation and Programming.

Financial institutions and enterprises require flexible network security architecture to accommodate external network devices/servers in their DC/colo facilities. This article provides a way to design and implement such a network security architecture using Border Gateway Protocol (BGP) + VXLAN tunnels along with VM-series firewall from Palo Alto Networks. Ravello Network Smart Labs provides an easy way to test and deploy an architecture before moving it to the enterprise infrastructure.

Continue reading »

4 Instructor led training best practices

Virtual Training Lab

A productive training process is key to the success of new products (from internal training to channel partners and customers). Since ILT also involves a substantial investment, it isn’t surprising that more and more training organizations are seeking to understand instructor led training best practices – essentially – what they can do to maximize the effectiveness of their training sessions. At Ravello we believe that the essentials are: easily provisioned and deployed isolated full-featured product environments for each student anywhere and anytime, where the instructor and student can collaborate.

Continue reading »

Man-in-the-middle Network Security Testing on enterprise environment replicas in AWS & Google Cloud

Author:
Clarence Chio
Clarence is a Security Research Engineer at Shape Security, working on the system that tackles malicious bot intrusion from the angle of big data analysis. Clarence has presented independent research on Machine Learning and Security at Information Security conferences in several countries, and is also the organizer of the “Data Mining for Cyber Security” meetup group in the SF Bay Area.

Have you ever used an unsecured public wifi connection and wondered if someone could be hacking you? Who could possibly be interested in monitoring your browsing activity on the web? In this post, we focus on a particularly active and common type of network hacking – man-in-the-middle (MITM) attacks. Network security testing is essential to discover these attacks, and Ravello cybersecurity labs provide an easy way to replicate enterprise environments on AWS and Google cloud and carry out MITM security testing.

Continue reading »

Penetration testing on AWS: Think like your attacker

Shape Security
Author:
Clarence Chio
Clarence is a Security Research Engineer at Shape Security, working on the system that tackles malicious bot intrusion from the angle of big data analysis. Clarence has presented independent research on Machine Learning and Security at Information Security conferences in several countries, and is also the organizer of the “Data Mining for Cyber Security” meetup group in the SF Bay Area.

In the previous post in the pentest on AWS and Google series, we set up a complete security testing environment to play with. As you have seen, it really isn’t that difficult for an attacker to pwn your network. A lot of what attackers do is observation, trial-and-error, and guesswork. I left most of those parts out of the article, but bad network cleanliness and practices make things a lot simpler for adversaries.

Continue reading »

Pentesting on AWS: Network Penetration Testing Playground

Shape Security
Author:
Clarence Chio
Clarence is a Security Research Engineer at Shape Security, working on the system that tackles malicious bot intrusion from the angle of big data analysis. Clarence has presented independent research on Machine Learning and Security at Information Security conferences in several countries, and is also the organizer of the “Data Mining for Cyber Security” meetup group in the SF Bay Area.

This next post in the network penetration testing lab series will get you acquainted with the technical details of the pentest blueprint and settings required to test security capabilities and run pentesting on AWS or Google Cloud.

Continue reading »