World Backup Day 2025

Our CEO, Don Boxley, chimed in with a commentary on World Backup Day this year and how organizations need to remember that datacenter resilience means more than just having backups. Organizations need to ensure that high availability processes are in-place to do their best to prevent extended outages in the first place.

Read the full commentary at any of these news outlets: 
Beta News
Cyber Protection Magazine
GIXTools
The IT Nerd
Network World
Unified Networking
VMBlog
Wireless Wednesday Live

How AI-driven high availability clustering is changing the game for developers

In this article, our CEO, Don Boxley, talks about how high availability solutions are increasingly integrating artificial intelligence to help enhance their capabilities. They can leverage AI to detect usage anomalies and prevent outages before they even happen by taking automated action to balance workloads across server resources so that performance SLAs are maintained.

Along with benefiting overall reliability and scalability, developers should take note of AI’s ability to secure their data estates as well, with AI-powered threat detection and automated threat isolation

Read the full article here: DevPro Journal

AI Workloads and HA Clustering – A Cornerstone of Modern Energy Systems

Read this article to learn how artificial intelligence is change the game for energy companies in terms of high availability and network security solutions.

Our CEO, Don Boxley, goes into detail describing how this innovative technology can be applied for huge gains in uptime and security within the energy industry. Whether it’s being utilized to optimize grid performance or to isolate potential threats, AI-infused high availability and cybersecurity represent the future.

Read the full article here: Electric Energy Online

How AI-Driven High Availability (HA) Clustering is Rewriting the Rules for Telecom

Telecommunications is just one of the countless industries that can benefit from AI-enhanced high availability solutions. Check out this article authored by our CEO, Don Boxley, as he talks about some industry-specific advantages provided by artificial intelligence for security and uptime.

This article further segments the benefits of AI-integrated high availability software and network security solutions based on how they affect both telecom professionals and telecom resellers.

Read the full article here: Telecom Reseller

DH2i, Microsoft, and SUSE to Present Two Sessions on Secure, Resilient AI and Data Platforms at SUSECON 2025

Attendees to Learn How to Build Secure, Highly Available AI Applications on the SUSE AI Platform with Microsoft SQL Server and DH2i DxEnterprise; and Discover How to Optimize SQL Server 2025 and SUSE Rancher Prime for a Unified, Scalable Data Platform Across Containers, Physical, and Virtual Machines

FORT COLLINS, CO – March 6, 2025DH2i®, the world’s leading provider of always-secure and always-on IT solutions, today announced its participation in SUSECON 2025, taking place March 10-14 in Orlando, Florida. DH2i, alongside technology leaders from Microsoft and SUSE, will present two sessions focused on building secure, resilient data platforms. The first, an in-person breakout session at the conference, will showcase how to optimize SQL Server 2025 and SUSE Rancher Prime to create a unified, scalable data platform across containers, physical, and virtual machines (VMs) with DH2i’s DxEnterprise. The second, a pre-recorded session made available at the conclusion of the conference, will provide a step-by-step guide to deploying highly available AI applications using SUSE AI, Microsoft SQL Server, and DH2i’s DxEnterprise.

In-Person Breakout Session

Date/Time
Thursday, March 13th, 11:00 am – 11:50 am ET
Location
TBD
Presenters
OJ Ngo, CTO and Co-Founder, DH2i
Abduallah Mamun, Senior Product Manager | Azure Data, Microsoft
Terry L. Smith Director, Global Alliances Solutions, SUSE
Session Title
Harnessing SQL Server 2025 and SUSE Rancher for a Unified Data Platform Across Containers, Physical, and Virtual Machines with DH2i’s DxOperator
Abstract
Build a data environment that is cross-platform, spanning across virtual machines, physical machines, and containers in different environments. In this session, we will deploy SQL Server containers across Azure Kubernetes Service and other Kubernetes platforms using the DH2i Operator, managing the entire deployment with SUSE Rancher Prime. With the release of SQL Server 2025, we will also showcase the vector search capability, enabling semantic search natively for your databases. If you are a database developer, engineer, or administrator looking to modernize your data estate, this session is for you. We will highlight new developer features in SQL Server 2025, making it easier to work with JSON, Parquet, and traditional relational data within the same environment. Additionally, we will cover how SUSE Rancher Prime can be used to manage and administer Kubernetes clusters, ensuring efficient and streamlined operations in an all-Kubernetes environment. Join us to discover best practices, tips, and tools for optimizing your SQL Server container deployments in a hybrid cloud landscape.

Pre-Recorded Session (Viewable after SUSECON)

Presenters
OJ Ngo, CTO and Co-Founder, DH2i
Amit Khandelwal, Principal Product Manager | Data Platform – SQL Server, Microsoft
Terry L. Smith Director, Global Alliances Solutions, SUSE
Session Title
“How to Build a Secure and Resilient Production Environment for Your AI Applications”
Abstract
In today’s AI-driven world, swift and seamless transitions from development to enterprise deployment are essential, along with reliable high availability (HA) for databases supporting AI apps. In this demo-packed session, Ngo, Khandelwal, and Smith will guide IT teams step-by-step in building a comprehensive solution architecture for deploying enterprise AI at scale. They will use SUSE AI & SUSE Linux Enterprise Base Container Images for a secure and feature-rich foundation, Microsoft SQL Server as a flexible and secure database backbone, and DH2i DxEnterprise for infrastructure-agnostic HA/DR. Attendees will leave with an actionable framework for building highly available, production AI apps on the SUSE platform using SUSE AI, Microsoft SQL Server, and DH2i DxEnterprise, and an understanding of the benefits of SUSE Cloud Native solutions.

“AI applications require secure, resilient production environments to protect sensitive data, ensure uptime, and support scalable, reliable deployment, enabling businesses to innovate confidently and maintain a competitive edge,” said Khandelwal. “I look forward to the opportunity to join with DH2i and SUSE to discuss how, by combining SUSE AI for secure and scalable operations, Microsoft SQL Server for flexible data services, and DH2i DxEnterprise for infrastructure-agnostic HA/DR, users can create a scalable, secure framework for highly available AI apps.”

“As organizations modernize their data environments, they need a unified approach that seamlessly integrates SQL Server with Kubernetes and multi-cloud infrastructure,” said Mamun. “At SUSECON 2025, we’ll demonstrate how SQL Server, combined with SUSE Rancher Prime and DH2i’s DxEnterprise, empowers businesses to deploy, manage, and scale resilient data platforms with ease.”

“Successfully deploying AI applications at scale requires seamless integration of security, resilience, and operational efficiency,” said Smith. “SUSE AI is the integrated, extensible, cloud-native platform with robust container management, zero trust security, observability with actionable insights, and a collection of securely-built AI components. By leveraging SUSE AI with Microsoft SQL Server’s vector-enhanced data services and DH2i DxEnterprise’s infrastructure-agnostic HA/DR capabilities, organizations can confidently deploy, optimize, and secure their AI-driven workloads anywhere.”

“Ensuring the success of AI applications in production environments requires a strategic combination of high availability, security, and scalability,” said Ngo. “By leveraging SUSE AI for a secure and feature-rich foundation, Microsoft SQL Server for flexible and high-performance data management, and DH2i DxEnterprise for infrastructure-agnostic HA/DR, organizations can confidently deploy AI applications that are always available and protected. This collaboration with SUSE and Microsoft provides enterprises with a modern, scalable framework and the advanced capabilities needed to streamline, secure, and optimize AI-driven workloads across hybrid and multi-cloud environments.”

SUSECON, taking place from March 10-14 in Orlando, promises to be a must-attend event for IT professionals, developers, and business leaders eager to explore the latest advancements in open-source solutions. With a focus on innovation, collaboration, and the future of enterprise technology, the conference will feature a dynamic lineup of keynote speakers, hands-on workshops, and engaging breakout sessions. Attendees will gain insights into topics such as cloud-native transformation, edge computing, and containerization while networking with industry leaders and peers. To learn more, please visit: https://www.suse.com/susecon/.

About DH2i

DH2i Company is the world’s leading provider of multi-platform smart high availability (HA) clustering and software-defined perimeter (SDP) software for Windows, Linux, and containers. DH2i enables users to connect securely and failover enterprise applications – from anywhere to anywhere. DH2i’s DxOdyssey® SDP software, the unVPN® networking solution for Zero Trust security, enables users to create highly available application-level Zero Trust Network Access tunnels across any mix of locations and platforms. DH2i’s DxEnterprise® smart high availability clustering software – now optimized for containers, delivers an all-in-one clustering solution for any application, any OS, any server configuration, and any cloud. DxEnterprise is the only SQL Server clustering solution to provide fully automatic failover of SQL Server AG in Kubernetes. To learn more, please visit: www.dh2i.com, call: 800-380-5405, or email: [email protected].

Also Published here:
Backup Review
PR Newswire

Navigating Government Sector Network Security in the Age of AI

The good news: Every state in the US now has a Chief Information Security Officer (CISO) appointed with formalized authority to help ensure security and data privacy across state government operations. The bad news—as we’ve learned from the 2024 Deloitte-NASCIO Cybersecurity Study—is that “nearly 40% of CISOs say funding falls short of what they need to keep assets and citizens safe.”  These budget shortcomings are becoming an even more acute issue as all levels of government work to protect against the cyber threats associated with their evolving use of Generative AI technology.

The Growing Role of AI in Government 

At the state level, most governments across the US have started actively deploying generative AI (GenAI) tools. Only 8% of state CIOs said that they were not using any GenAI tools in their respective states. 

The most common uses among government adopters include virtual meeting assistants, cybersecurity, software code generation, and document creation.  However, the earliest adopters of the technology are already deploying more sophisticated applications to provide services like public-facing chatbots, as well as leveraging GenAI for increasingly critical purposes like analyzing crime reports and public health data. However, these are a just a couple examples of the countless ways that GenAI is being leveraged to enhance government efficiency and (hopefully) increase constituent satisfaction. 

Generative AI Brings Its Own High Availability & Cybersecurity Challenges 

As generative AI technology plays an increasingly critical role across all levels of government, application uptime becomes a key consideration. To sustain the front-end AI application capability for end users, the database backbone must be integrated into a flexible and resilient high availability (HA) framework. In the context of AI, this means employing HA technology that can unify HA across a complex mix of platforms and cloud infrastructure. 

Additionally, the public sector has always been an unfortunately attractive industry for foreign state actors and private criminal organizations to wage cyberattacks due to its wealth of sensitive data. And while generative AI technology unlocks huge gains for the government in terms of efficiency and automation, it also intensifies security threats within data environments. AI-perpetuated vulnerabilities include: 

Increased Attack Surface: Generative AI models often require large amounts of data to function effectively. This can lead to an increased attack surface, as more data is being collected, stored, and processed. If this data is not properly secured, it can become a target for attacks. 

Complexity and Interconnectedness: Generative AI systems can be complex and interconnected, making them harder to secure. As these systems are integrated with existing infrastructure, they can create new vulnerabilities and increase the potential for lateral movement in the event of a breach. 

Model Theft or Manipulation: Generative AI models themselves can be stolen or manipulated, allowing attackers to use them for malicious purposes. For example, a stolen model could be used to generate fake identities or documents. 

Dependence on Third-Party Libraries and Tools: Many generative AI systems rely on third-party libraries and tools, which can introduce additional security risks if these components are not properly secured or updated. 

Lock Down Networks with DxOdyssey Software-Defined Perimeter 

DH2i’s DxOdyssey Software-Defined Perimeter (SDP) can help the public sector enhance cybersecurity in several keys ways to help address the security challenges posed by generative AI: 

Secure Access Control: DxOdyssey SDP provides secure, granular access control to sensitive resources and applications, ensuring that only authorized users and devices can connect. This is particularly important when dealing with generative AI models that may require access to large datasets or computational resources. 

Micro-Segmentation: The public sector can leverage DxOdyssey’s micro-segmentation capabilities to isolate critical assets and applications from the rest of the network. This reduces the attack surface, making it more difficult for malicious actors to move laterally within the network in the event of a breach. 

Zero Trust Network Access: Implementing ZTNA tunnels with DxOdyssey SDP ensures that all users and devices are authenticated and authorized before being granted access to resources, regardless of their location or device. This is crucial when generative AI models may be accessed remotely or by third-party vendors. 

DxOdyssey Software-Defined Perimeter technology enables application-level zero trust network access connections.

Highly Available Network Connections: DxOdyssey allows for the creation of ZTNA tunnel groups to provide failover support in the case that a certain endpoint goes offline, ensuring high availability for your network connections. 

Encryption: DxOdyssey provides end-to-end encryption for all traffic, ensuring that even if data is intercepted, it will remain unreadable without the decryption key. This protects sensitive information used in or generated by AI models from unauthorized access. 

Support for Mixed-Infrastructure Data Estates: Many public sector organizations operate in mixed-infrastructure environments, with applications and data spread across on-premises, cloud, and edge locations. DxOdyssey SDP supports these diverse environments, ensuring consistent security policies can be applied everywhere, which is vital for securing generative AI workloads that may span multiple deployment models. 

Eliminate VPN Infrastructure: Virtual private networks are not cut out for the complex, cloud-based infrastructure that supports AI applications. Not only that, but they leave excessive swaths of network vulnerable to attack, and rely on physical appliances (another potential point of failure) to do the job. DxOdyssey introduces a standalone, software-defined alternative to facilitate isolated application-level access and eliminate the need for any physical network security infrastructure. 

Potential Use Cases Among Government Agencies 

DxOdyssey’s infrastructure-agnostic nature and cross-platform capabilities can allow it to help a variety of government agencies protect their sensitive data and applications from unauthorized access. DxOdyssey can also help ensure compliance with relevant regulations and security policies. Here are just a few possible examples of how specific agencies could lockdown their networks if they chose to deploy DxOdyssey SDP: 

National Institutes of Health (NIH) 

The NIH uses GenAI applications to analyze medical images and genomic data to accelerate disease diagnosis and treatment. They need to protect sensitive patient data and research information from unauthorized access. 

Use Case: The NIH could deploy DxOdyssey SDP to secure the network infrastructure supporting their GenAI applications. DxOdyssey would allow them to: 

  • Isolate the GenAI application servers from the rest of the network, ensuring that only authorized researchers and clinicians can access them. 
  • Encrypt data in transit between the GenAI application servers and the research teams’ workstations. 
  • Implement role-based access control to ensure that researchers and clinicians can only access specific patient data and research information based on their roles and permissions. 

Benefits: The NIH could benefit from DxOdyssey SDP by ensuring the confidentiality, integrity, and availability of sensitive patient data and research information—allowing them to stay in compliance with regulations such as HIPAA and FISMA. 

Federal Bureau of Investigation (FBI) 

The FBI uses GenAI applications for facial recognition, natural language processing, and other investigative tasks to support law enforcement operations. They need to protect sensitive case data and intelligence information from unauthorized access. 

Use Case: The FBI could deploy DH2i software to lock down their GenAI application networks. Specifically, they could use DxOdyssey SDP to:  

  • Create encrypted Zero Trust Network Access (ZTNA) connections for remote investigators to securely access case data and intelligence information from anywhere. 
  • Use micro-segmentation to isolate specific segments of the network, such as those containing classified information, from the rest of the network. 

Benefits: DxOdyssey SDP would benefit the FBI by ensuring network security, performance, and availability of sensitive case data and intelligence information, even for their off-site workforce. 

National Oceanic and Atmospheric Administration (NOAA) 

NOAA uses GenAI applications to analyze climate models, weather patterns, and oceanographic data to support environmental monitoring and prediction. They need to protect sensitive research data and intellectual property from unauthorized access. 

Use Case: NOAA could deploy DxOdyssey SDP to: 

  • Secure the data ingestion process for research data from various sources, such as weather stations and satellite imagery. 
  • Implement network access control to ensure that only authorized researchers and scientists can access specific research data and models. 
  • Use encrypted ZTNA connections to protect sensitive research data in transit between NOAA’s data centers and research partners’ networks. 

Benefits: NOAA would benefit from DxOdyssey SDP by keeping intellectual property and sensitive research data encrypted and secure while in-transit. The use of DH2i network security technology would also help them to comply with regulations such as FISMA and the National Institute of Standards and Technology (NIST) Cybersecurity Framework. 

Other Useful Cybersecurity Best Practices 

Having the right network security technology in place is a fantastic start, but not the only measure that public sector organizations need to take. To further mitigate the risks posed by generative AI, government agencies should engage in the following: 

Regular Security Audits and Penetration Testing: Conduct regular security audits and penetration testing to identify vulnerabilities in the system. 

Employee Education and Training: Educate employees on the potential risks associated with generative AI and provide training on how to use these systems securely. 

Model Monitoring and Validation: Continuously monitor and validate the output of generative AI models to detect potential security issues or data manipulation. 

Incident Response Planning: Develop incident response plans to quickly respond to and contain potential security breaches. 

By taking a methodical and multi-faceted approach to cybersecurity, the government sector can minimize the risks associated with leveraging generative AI technology and ensure that these systems are used securely and effectively. DH2i’s DxOdyssey SDP offers a robust security solution that can ensure secure access control and reduced attack surface across any mix of infrastructure. Implementing additional proactive best practices around internal education, testing, and disaster-readiness can further bolster your organization’s overall cybersecurity strategy. 

DxOdyssey can be easily installed on any of your existing infrastructure in just a few clicks.
Get signed up for a free trial license today