Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud

Verge.IO: Step 4 [of 4.5 Steps] to a VMware Exit in 45 Days [Planning & Testing]

Truth in IT
09/22/2023
89
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Mike Matchett: What's our what's our four and a half-th step here? Yan Ness: Yeah. So, so this is how you de-risk all four of those steps. And and George is the marketing guy, he liked four and a half and I liked it, too. So here we are. So, so basically, as we mentioned earlier, this a seamless migration that allows you to, you know, give it a try, bring it in, play with it, put it back, not bring it in, bring in, you know, one a day, play with it, play with it, play with it. That that seamless migration allows you to click a button and bring it in is really, really important. Otherwise, otherwise there's a lot of risk to this because you could you could spend the 20 hours maybe it takes with other platforms and bring in the environment and it works just fine. And then you do that 20 hours again and it doesn't work the same. And so that seamless migration is probably the most important part of, of of de-risking. Try it! I mean, somebody, somebody should be hosting whatever you're buying, right? And say, hey, can I have can I have a tenant or whatever it is you're selling and I want, I want to try it, I'm going to suck in my one of my VMware environments into into somebody else's hosted thing and then the next thing obviously is, is all right, give me give me some of the software. I've I've identified some old hardware. I'm going to drop it on there and, and test it myself. And we would say, you know, avoid the right of return to to de-risk yourself - meaning, you know, you don't get it's not like it needs to be it needs to be a true evaluation, not like, well, hey, you got to buy the software and you can return it if you know, if it doesn't meet certain criteria - just just give out free copies. Let's get a free copy of the software. I mean, everybody should be offering that right now. And and and it should be 15, 20 minutes to install on a couple nodes and another 15, 20 minutes to ingest your VMware and a couple hours later you're you're tinkering. Mike Matchett: All right. And I think if I'm reading ahead here, this idea of DR as a first step is a further way to say, okay, I want to do this as an IT professional and I'm looking or I'm in charge of my my IT scope. I've got to get the CISO on board. I've got to get the I've got to get my CIO on board. I've got to I've got to get the business people to look and finance to look at those contracts with VMware and figure out when to cut that. But in the meantime, I could be setting this all up and actually running it as my DR environment, which I may or may not already have a good one. I probably don't actually have a good one. So this is a great opportunity to push forward and get that going. And then at any point you can make that a clone into production. Yan Ness: Yeah. So like D stands for disaster and maybe one day that disaster is VMware calling you saying they're going to triple your price, right? Mike Matchett: Yeah. Yan Ness: Yeah. I mean. Mike Matchett: That's that's kind of the way to think about it, right? Yan Ness: I mean, that's a disaster. That is a business disaster, especially if you're like a hosting company and your gross margins are are pinched already, you're you're basically could have existential threat. And so, this this is a disaster that you can use this as a disaster recovery plan, put it in place do it in the next 2 or 3 weeks for your ten nodes or whatever. Okay. You got an exit plan, you have a parachute you can pull if they push you out of the airplane. And now you buy yourself a little time to to to do this. And we think that's the best way to de-risk the whole thing. And and you still got time, right? Mike Matchett: The whole runway shouldn't be about making the technology work. It should be about getting people comfortable enough with the change. Right. It and so if the technology migration here is really 20 minutes, 20 minutes, half a couple hours here and so on, that's great. And then I can spend my effort and time within the organization to get people comfortable with what we're doing and earn the commitment and trust to actually do it.

In Step 4 of "4.5 Steps to a VMware Exit Plan in 45 Days," Yan Ness, CEO of Verge.IO focuses on planning and testing the migration process for a successful exit from VMware.

Step 4: Planning & Testing

  1. Planning and Strategy: To begin the VMware exit, you must have a well-defined plan for how to execute the migration successfully. This plan includes considering how to test and verify the new environment.

  2. Testing Tools: Utilizing migration tools that can efficiently and automatically move workloads from VMware to the new environment is crucial. These tools save time and enable comprehensive testing.

  3. Testing Phase: The testing phase involves importing your VMware environments into the new environment, running tests on performance, security, functionality, and overall usability. This phase typically spans a week or two, allowing for thorough examination.

  4. Continuous Testing: Regularly refreshing and importing data from VMware during testing is essential to ensure that the new environment functions correctly. Frequent testing and adjustments help minimize potential issues.

  5. Agility and Data Center Level Testing: The ability to move entire data centers and quickly test configurations enhances agility during the migration process. The virtual data center concept allows for flexible experimentation with architectures.

  6. Emergency Copies: Throughout the testing phase, you have emergency copies of VMs available. In case of unexpected issues, these copies serve as a backup and help maintain data integrity.

  7. Reversibility: It's crucial to have the flexibility to move back to the previous environment if you are not comfortable with the new setup. This reversibility ensures a smooth transition and minimizes risks.

Categories:
  • » Cybersecurity Webinars » Backup & Recovery
  • » Cybersecurity Webinars
  • » Data Management » Virtualization
  • » Cloud Webinars » Private Cloud Webinars
  • » Cloud Webinars » Hybrid Cloud Webinars
Channels:
  • Verge.IO: 45 Days to a VMware Exit in 4.5 Steps
News:
Events:
Tags:
  • verge
  • vergeio
  • vmware
  • storage
  • security
  • hardware
  • highlights
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

            Video's comments: Verge.IO: Step 4 [of 4.5 Steps] to a VMware Exit in 45 Days [Planning & Testing]

            Upcoming Webinar Calendar

            • 09/16/2025
              12:00 PM
              09/16/2025
              SOC 2 for Startups: Strategies to Reduce Costs, Enhance Efficiency, and Achieve Compliance
              https://www.truthinit.com/index.php/channel/1410/soc-2-for-startups-strategies-to-reduce-costs-enhance-efficiency-and-achieve-compliance/
            • 09/16/2025
              01:00 PM
              09/16/2025
              KnowBe4: Beyond DMARC: Closing Critical Gaps in Your Email Security Shield
              https://www.truthinit.com/index.php/channel/1403/beyond-dmarc-closing-critical-gaps-in-your-email-security-shield/
            • 09/16/2025
              01:00 PM
              09/16/2025
              HUMAN Security: CISO to CISO: A HUMAN conversation about Artificial Intelligence
              https://www.truthinit.com/index.php/channel/1411/ciso-to-ciso-a-human-conversation-about-artificial-intelligence/
            • 09/18/2025
              04:00 AM
              09/18/2025
              Netskope: Die doppelte Funktion der KI: Innovationsantrieb und Sicherheitsgarant
              https://www.truthinit.com/index.php/channel/1445/die-doppelte-funktion-der-ki-innovationsantrieb-und-sicherheitsgarant/
            • 09/18/2025
              04:00 AM
              09/18/2025
              Netskope: La dualité de l’IA : inspirer l’innovation tout en protégeant l’avenir
              https://www.truthinit.com/index.php/channel/1446/la-dualité-de-lia-inspirer-linnovation-tout-en-protégeant-lavenir/
            • 09/18/2025
              10:00 AM
              09/18/2025
              Netskope: La dualità dell'IA: stimolare l'innovazione e salvaguardare il futuro
              https://www.truthinit.com/index.php/channel/1444/la-dualità-dellia-stimolare-linnovazione-e-salvaguardare-il-futuro/
            • 09/18/2025
              11:00 AM
              09/18/2025
              Trend Micro Webinar: Risk in Real Time: Agentic SIEM
              https://www.truthinit.com/index.php/channel/1372/risk-real-time-agentic-siem/
            • 09/18/2025
              01:00 PM
              09/18/2025
              Netskope: Harnessing AI’s Dual Nature: Progress and Protection
              https://www.truthinit.com/index.php/channel/1424/harnessing-ais-potential-for-innovation-and-mitigating-associated-risks/
            • 09/23/2025
              01:00 PM
              09/23/2025
              Enhancing Visibility, Control, and Trust in Cloud-First Data Security Management
              https://www.truthinit.com/index.php/channel/1497/enhancing-visibility-control-and-trust-in-cloud-first-data-security-management/
            • 09/24/2025
              01:00 PM
              09/24/2025
              Transforming Risk into Resilience: Managing Data and Access in Regulated Settings
              https://www.truthinit.com/index.php/channel/1500/transforming-risk-into-resilience-managing-data-and-access-in-regulated-settings/
            • 09/24/2025
              02:00 PM
              09/24/2025
              Achieving Full Network and Application Visibility through Zero Trust with Netskope and ExtraHop
              https://www.truthinit.com/index.php/channel/1427/achieving-full-network-and-application-visibility-through-zero-trust-with-netskope-and-extrahop/
            • 09/25/2025
              12:00 PM
              09/25/2025
              Netskope: Secure the Future--AI Usage & Data Security in the Enterprise
              https://www.truthinit.com/index.php/channel/1434/ensuring-data-security-and-ai-integration-for-a-resilient-enterprise-future/
            • 10/23/2025
              12:00 PM
              10/23/2025
              360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure
              https://www.truthinit.com/index.php/channel/931/360view-preventing-data-exfiltration-keeping-enterprise-data-secure/
            • 10/28/2025
              12:00 PM
              10/28/2025
              Netskope: Data Security Reimagined: Regain Your Control and Confidence
              https://www.truthinit.com/index.php/channel/1432/data-security-reimagined-regain-your-control-and-confidence/
            • 11/20/2025
              12:00 PM
              11/20/2025
              360View: Budget Optimization: Doing More with Less
              https://www.truthinit.com/index.php/channel/932/360view-budget-optimization-doing-more-with-less/
            • 12/18/2025
              12:00 PM
              12/18/2025
              360View: 2026 IT Predictions & Emerging Trends
              https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/

            Upcoming Spotlight Events

            • Sep
              16

              KnowBe4: Beyond DMARC: Closing Critical Gaps in Your Email Security Shield

              09/16/202501:00 PM ET
              More events

              Upcoming 360 View Events

              • Oct
                23

                360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure

                10/23/202512:00 PM ET
                • Nov
                  20

                  360View: Budget Optimization: Doing More with Less

                  11/20/202512:00 PM ET
                  • Dec
                    18

                    360View: 2026 IT Predictions & Emerging Trends

                    12/18/202512:00 PM ET
                    More events

                    Upcoming Industry Events

                    • Sep
                      16

                      SOC 2 for Startups: Strategies to Reduce Costs, Enhance Efficiency, and Achieve Compliance

                      09/16/202512:00 PM ET
                      • Sep
                        16

                        HUMAN Security: CISO to CISO: A HUMAN conversation about Artificial Intelligence

                        09/16/202501:00 PM ET
                        • Sep
                          18

                          Netskope: Die doppelte Funktion der KI: Innovationsantrieb und Sicherheitsgarant

                          09/18/202504:00 AM ET
                          More events

                          Recent Industry Events

                          • Sep
                            10

                            Netskope: Ask Bob: How to Mitigate Your Risk Profile

                            09/10/202501:00 PM ET
                            • Sep
                              09

                              From SSE to SASE: Transforming Connectivity with Netskope One SD-WAN

                              09/09/202511:00 AM ET
                              • Aug
                                26

                                Renown Health Secures 10K Mailboxes & Stops $1M+ in Email Threats (Abnormal Security Webinar)

                                08/26/202501:00 PM ET
                                More events
                                Truth in IT
                                • Sponsor
                                • About Us
                                • Terms of Service
                                • Privacy Policy
                                • Contact Us
                                • Preference Management
                                Desktop version
                                Standard version