logo
Mirantis k0rdent unifies AI, VM & container workloads at scale

Mirantis k0rdent unifies AI, VM & container workloads at scale

Techday NZ30-05-2025
Mirantis has released updates to its k0rdent platform, introducing unified management capabilities for both containerised and virtual machine (VM) workloads aimed at supporting high-performance AI pipelines, modern microservices, and legacy applications.
The new k0rdent Enterprise and k0rdent Virtualization offerings utilise a Kubernetes-native model to unify the management of AI, containerised, and VM-based workloads. By providing a single control plane, Mirantis aims to simplify operational complexity and reduce the need for multiple siloed tools when handling diverse workload requirements.
k0rdent's unified infrastructure management allows organisations to manage AI services, containers, and VM workloads seamlessly within one environment. The platform leverages Kubernetes orchestration to automate the provisioning, scaling, and recovery of both containers and VMs, helping deliver consistent performance at scale.
The platform also offers improved resource utilisation by automating the scheduling of computing and storage resources for various workloads through dynamic allocation. According to the company, this optimisation contributes to more efficient operations and cost control across modern and traditional application environments.
Organisations can benefit from faster deployment cycles as k0rdent provides declarative infrastructure and self-service templates for containers and VMs. These features are designed to reduce delays typically associated with provisioning and deployment, allowing teams to accelerate time-to-value for projects.
Enhanced portability and flexibility form a key part of the platform's approach. Workloads, including AI applications and microservices, can run alongside traditional VM-based applications on public cloud, private data centres, or hybrid infrastructure, without requiring refactoring. This capability aims to support a wide range of operational strategies and application modernisation efforts.
Shaun O'Meara, Chief Technology Officer at Mirantis, stated, "Organisations are navigating a complex mix of legacy systems and emerging AI demands. k0rdent Enterprise and k0rdent Virtualization are delivering a seamless path to unified, Kubernetes-native AI infrastructure, enabling faster deployment, easier compliance, and reduced risk across any public, private, hybrid, or edge environment."
With the new updates, platform engineers can define, deploy, and operate Kubernetes-based infrastructure using declarative automation, GitOps workflows, and validated templates from the Mirantis ecosystem. The solution is built on k0s, an open source CNCF Sandbox Kubernetes distribution, which Mirantis says enables streamlined infrastructure management and supports digital transformation initiatives across enterprises.
k0rdent Virtualization, which operates on Mirantis k0rdent Enterprise, is positioned as an alternative to VMware tools such as vSphere, ESXi, and vRealize. This is intended to facilitate enterprises seeking to modernise application portfolios or expand edge computing infrastructure, including the integration of AI and cloud-native workloads, while retaining support for legacy infrastructure.
The platform supports distributed workloads running across a variety of environments. It enables platform engineering teams to manage Kubernetes clusters at scale, build tailored internal developer platforms, and maintain compliance and operational consistency. k0rdent offers composable features through declarative automation, centralised policy enforcement, and deployment templates that can be used with Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), vSphere, and OpenStack.
Mirantis provides k0rdent Enterprise and k0rdent Virtualization directly and via channel partners to meet the needs of organisations managing distributed and AI-driven workloads.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

‘One of the most challenging periods in Spark's history': Telco takes big profit hit, reveals new five-year plan
‘One of the most challenging periods in Spark's history': Telco takes big profit hit, reveals new five-year plan

NZ Herald

time2 hours ago

  • NZ Herald

‘One of the most challenging periods in Spark's history': Telco takes big profit hit, reveals new five-year plan

Spark said 100% of FY2026 free cash flow (a forecast $290-$330m) would go to the dividend payout. FY2025 free cash flow was $330m. The telco also revealed a new five-year strategy, dubbed 'SPK 30″, which it said would deliver a 'capital management reset that refocuses Spark on its core connectivity business'. SPK-30 was outlined in very broad strokes today. 'The strategy includes four key focus areas – growing core connectivity, simplifying and optimising beyond the core, and delivering a better network and better customer experiences. 'These priorities are enabled by a focus on people and culture, embedding technologies such as AI across Spark, disciplined financial management, and an enduring commitment to sustainability,' the telco said in an NZX filing. Reported ebitdai was $1053b, just a whisker shy of the analyst consensus $1.054b. FY2026 guidance was for operating earnings of $1.02-$1.08b or $1.01-$1.07b excluding its now spun-out data centre business. Revenue fell 2.5% to $3.75b. Total capital expenditure fell 17.2% to $429m. Spark said 'business as usual' capex would fall to $380-$420m in FY2026 - excluding $50-$70m in 'strategic capex' for data centre expansion, which will now be shared with a new majority owner. Mobile service revenue declined 2.3% to $987m, 'driven by price competition in enterprise and government and consumer prepaid,' Spark said in an NZX filing. Small business and consumer numbers grew in the second half, the telco said. IT services revenue continued to be a pain point, falling 7.7% to $144m. Broadband revenue fell 0.8% to $608 million. Cloud revenues grew 4.4% to $235 million 'as public cloud uptake continued to increase'. Data centres revenue grew 11.1% to $50 million. On August 12, Spark said it had sold 75% of its data centre operations to Australian Pacific Equity Partners in a deal that values the business at $705 million. The telco will get $486m cash, with a further $98m - for a total $584m - in FY2027 if performance targets are hit. The proceeds will go to paying debt, the company said in an NZX filing. Spark had net debt of $2.74b as of December 31, 2024 and $2.13b as of June 30, 2025. An artist render of the 40 megawatt data centre Spark will build on the Dairy Flat Surf Park development. The 10MW first stage will take about 18 months to construct. Image / Spark The Sydney-based Pacific Equity Partners (PEP) has more than A$14 billion ($15.4b) in funds under management. Its largely non-tech portfolio includes financial services and healthcare companies, Singapore Post's Australian operation and fleet leasing. It has also owned and sold major New Zealand businesses, including the chicken company Tegel and biscuit maker Griffins. Spark banked a windfall $47 million on June 23 as Hong Kong conglomerate CK Hutchison bought out its ASX-listed subsidiary, Hutchison Telecommunications Australia – in which Spark owned a 10% stake (dating from its Telecom days and a never-realised plan for a 3G partnership). The cash proceeds arrived in July, but will help with the FY2026 outlook delivered with results. After a slow first half, Spark's drive to save $80m-$100m in costs gained steam in the second half. In April it announced an expanded contract with Indian outsourcing and offshoring giant Infosys, and in May 180 network operations roles were outsourced to Nokia (once a marquee handset brand and now a global giant in mobile networking infrastructure that runs outsourcing centres in two cities in India for global clients, as well as local operations). Spark has said it will launch a mobile-to-satellite service in the New Year, via a US operator – who is un-named, but there are strong indications its name rhymes with Farlink and has a famous South African-American billionaire as its CEO. Spark's Auckland staff moved into the newly constructed Fifty Albert tower in the New Year. Photo / NZ Herald Reaction to Spark's first half FY2025 result was brutal as weak earnings came in under a twice-lowered forecast. About $1b was wiped off the telco's market capitalisation in the hours after it was announced. 'It must have felt like the last days of Rome in the Spark head office on Friday as the share price burned,' Craigs' Geoff Zame wrote the Monday after the shocker result delivered on February 21. Shares closed Tuesday at $2.48. The stock is down 42.3% for the year. Spark recently announced a board refresh that will see three new directors arrive between today's earnings and its annual meeting in a couple of months. They are: Former NZ Super Fund director and current NZX and Milford director Lindsay Wright. Former Mercury, Genesis Energy and Trustpower executive Vince Hawksworth. San Francisco-based tech executive Tarek Robbiati – now at fast-growing Pure Storage and formerly at Telstra and US telco Sprint (now T-Mobile), where as CFO he was part of a major restructuring. The successor to chair Justine Smyth is expected to come from their ranks. Chris Keall is an Auckland-based member of the Herald's business team. He joined the Herald in 2018 and is the technology editor and a senior business writer.

Bugcrowd & Pretera partner to enhance security in Benelux
Bugcrowd & Pretera partner to enhance security in Benelux

Techday NZ

time11 hours ago

  • Techday NZ

Bugcrowd & Pretera partner to enhance security in Benelux

Bugcrowd and Pretera have entered into a strategic collaboration aimed at providing scalable, continuous security testing solutions for high-risk sectors across Europe. Pretera, a Brussels-based offensive security firm, is Bugcrowd's first partner in the Benelux region and will now offer its enterprise clients managed bug bounty engagements and vulnerability disclosure programmes using Bugcrowd's platform. Expanded offering Pretera is known for specialising in manual-first red teaming, penetration testing, and adversary simulation services designed to expose complex vulnerabilities, particularly for clients in the finance, healthcare, critical infrastructure, and government sectors. With operations spanning Europe, the Middle East, and North America, the company has established a reputation for providing real-world attack simulations to strengthen clients' defences. The new partnership will see Pretera integrate Bugcrowd's global network of ethical hackers and crowdsourced security capabilities, supported by an AI-powered platform. This will enable continuous vulnerability testing beyond standard scheduled assessments. "We see bug bounties and VDPs as complementary to our manual penetration testing offering, allowing us to offer clients continuous security coverage beyond point-in-time assessments. By partnering with Bugcrowd, we combine our deep technical expertise with a trusted crowdsourced platform, addressing the growing demand for scalable, real-time vulnerability discovery and responsible disclosure," said Dardan Prebreza, Co-founder and Head of Security Services at Pretera. Hybrid security approach Under the terms of the collaboration, enterprises in the Benelux region will have access to a hybrid approach that combines Pretera's in-depth manual testing with Bugcrowd's continuous and scalable crowdsourced model. This approach is intended to help organisations respond more confidently to changing threat environments and new regulatory requirements. Bugcrowd executives noted the significance of increasing their reach via local partnerships in regions with heightened demands for security. The company said that the alliance with Pretera aligns with its global channel strategy to add specialist partners and meet local market needs. "Pretera brings outstanding technical depth and domain-specific knowledge in sectors where security failures are not an option. A local presence with an established partner is vital to expand and provide regional organizations multiple options for crowdsourced security. It provides additional resources to our current bug bounty customers in Benelux and expands our support for public sector clients," said Jacques Lopez, VP of Global Channel and Alliances at Bugcrowd. Broader sector benefits The new collaboration is intended to benefit organisations operating in sectors with stringent security demands, such as finance, healthcare, critical infrastructure, and the public sector. Through this partnership, clients will be able to leverage both real-world attack simulation and the scalability offered by Bugcrowd's network of security researchers. According to statements from both companies, the integration of Pretera's hands-on, deep-dive testing methodologies with Bugcrowd's platform offers a unified solution for ongoing vulnerability identification and responsible disclosure. This combination is designed to support organisational resilience across key industries in the region. Regional and global operations Pretera has been in operation since 2021, providing services such as network and application penetration testing, red teaming, social engineering, and cloud security assessments. Its client base includes enterprise and public sector organisations throughout Europe, North America, and the Middle East. Bugcrowd has been offering crowdsourced security testing since 2012, combining its technology platform with a large network of security researchers. The platform enables systematic assessment of vulnerabilities and provides scalability to match the needs of various industries.

Proofpoint warns FIDO authentication can be bypassed by downgrade
Proofpoint warns FIDO authentication can be bypassed by downgrade

Techday NZ

time18 hours ago

  • Techday NZ

Proofpoint warns FIDO authentication can be bypassed by downgrade

Proofpoint threat researchers have identified a potential vulnerability in the adoption of FIDO-based authentication systems, revealing a method that could enable attackers to bypass these security mechanisms through a process known as a downgrade attack. FIDO authentication in the threat landscape The Fast IDentity Online (FIDO) standards have been increasingly implemented by organisations seeking to strengthen online security and reduce the risk of credential phishing and account takeover incidents. By eliminating the reliance on traditional passwords and instead utilising hardware keys, biometrics or PINs, FIDO-based authentication is widely considered to deliver robust protection against commonplace phishing threats. Despite these advancements, a newly uncovered attack vector demonstrates that FIDO authentication may not be impenetrable. Proofpoint researchers have discovered that attackers could exploit a weakness by forcing users to revert to less secure authentication methods, therefore re-exposing them to adversary-in-the-middle (AiTM) attacks. Proofpoint has not yet observed FIDO downgrade attacks being used in real-world incidents. Understanding AiTM attacks Before the adoption of FIDO standards, hackers commonly employed phishing techniques to steal credentials, even circumventing multi-factor authentication (MFA). AiTM attacks involve victims being lured to counterfeit login portals via reverse proxies, where attackers can intercept both the credentials and authentication tokens required for session hijacking. The proliferation of advanced AiTM kits and Phishing-as-a-Service platforms has made these complex attacks more widely accessible and effective. FIDO-secured accounts are currently resistant to most phishing attempts using standard phishlets, but Proofpoint's research suggests this status may be vulnerable under certain conditions. How FIDO downgrade attacks operate The Proofpoint team has demonstrated that FIDO-based authentication, with specific reference to users of Microsoft Entra ID, can be susceptible to downgrade attacks. This vulnerability arises partly due to some browsers, such as Safari on Windows, lacking support for FIDO2 authentication. Attackers can exploit this by spoofing unsupported user agents, prompting the authentication system to request a less secure method. "Proofpoint researchers have found that FIDO-based authentication can be side-stepped using a downgrade attack. Using a dedicated phishlet, attackers could downgrade FIDO-based authentication to less secure methods, exposing targets to adversary-in-the-middle (AiTM) threats. Proofpoint researchers have yet to observe FIDO authentication downgrade attacks in the wild. Authentication downgrade remains a key method for challenging 'phishing-resistant' authentication methods, but attackers' current focus remains on accounts with other MFA methods or no MFA methods at all." To demonstrate the attack, Proofpoint researchers created a dedicated phishlet for the Evilginx AiTM attack framework. The attack is reliant on the existence of an alternative authentication method - usually a traditional MFA option - as most organisations retain these for account recovery purposes in conjunction with FIDO implementations. The process begins with the victim receiving a phishing link. Upon clicking, they encounter an authentication error page asking them to switch to an alternative sign-in method, such as the Microsoft Authenticator app. When the victim completes authentication via the spoofed page, their credentials and MFA token are intercepted, allowing the attacker to hijack the session and perform post-compromise activities including data theft or lateral movement. Assessing the risk Proofpoint highlights that, although the downgrade attack is technically possible, it has not yet been identified in active cyberattacks. The researchers attribute this rarity to several factors. Attackers tend to target accounts lacking MFA entirely, as these are easier to breach and do not require advanced knowledge to exploit. Crafting or adapting a custom phishlet for this type of operation also requires a higher level of technical skill, which is typically beyond the reach of lower-tier cybercriminals. "While technically feasible, FIDO authentication downgrade attacks haven't been observed in the wild. This could be due to: Lower Effort Alternatives: Attackers often target users with weaker or no MFA, which requires less technical sophistication and yields high success rates. Technical Acumen: Creating or adapting such a phishlet requires specialized knowledge, deterring most low-level attackers." Proofpoint researchers note that as the use of FIDO for authentication becomes more widespread and attacker toolkits evolve, interest in targeting FIDO-secured accounts may increase, particularly among sophisticated attackers and Advanced Persistent Threat (APT) groups. Recommendations The findings reiterate that FIDO remains a highly recommended approach for defending against phishing and account takeover threats. However, Proofpoint advises organisations to be aware of potential downgrade vectors, especially where alternative authentication methods are used as fallbacks, and to consider enhancing browser and platform support for FIDO to mitigate these risks.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store