Blog Archives

Edward Haletky
Edward HaletkyEdward L. Haletky, aka Texiwill, is the author of VMware vSphere(TM) and Virtual Infrastructure Security: Securing the Virtual Environment as well as VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers, 2nd Edition. Edward owns AstroArch Consulting, Inc., providing virtualization, security, network consulting and development and The Virtualization Practice where he is also an Analyst. Edward is the Moderator and Host of the Virtualization Security Podcast as well as a guru and moderator for the VMware Communities Forums, providing answers to security and configuration questions. Edward is working on new books on Virtualization. [All Papers/Publications...]

The Security of Converged Infrastructures

January 7, 2014
By
VirtualizationSecurity

On the January 2, 2014, the Virtualization Security Podcast was joined on the spur of the moment by @Josh_Atwell, who works for VCE, to discuss the security of converged infrastructures. This was of particular interest to me due to my current research on the security of a VCE Vblock. The research got me thinking about…

Read more »

Scope: It Is All about Scope

December 17, 2013
By
Scope: It Is All about Scope

When to implement security and data protection practices, or even change existing ones, is all about timing, knowledge, and scope. Deciding what to implement at any particular time requires knowledge of what needs to be fixed, and also of what the future could hold. To do this properly, you need to pay close attention to…

Read more »

Utopian Disaster Recovery

December 16, 2013
By
VirtualizationBackup

Recently at Dell World, I was part of a conversation about what would be utopian disaster recovery and where we are today in the state of the industry. But where we are today is transforming, with a new name that encompasses many technologies. We are now using the term “data protection” (DP) to mean much…

Read more »

Lowest-Hanging Fruit of Cloud Security

December 10, 2013
By
VirtualizationSecurity

At nearly every conference, we talk about the lowest-hanging fruit of virtualization security, but we often miss the discussion about the lowest-hanging fruit of cloud security. They are not the same. Are we talking about good SSL hygiene? That is a part of it, but there is something even more basic than that. John Dickson,…

Read more »

A Tale of Two Clouds

December 5, 2013
By
CloudComputing

Recently I have had the pleasure of discussing security with a number of cloud providers. Specifically, we talked about what security they implement and how they inform their tenants of security-related issues. In other words, do they provide transparency? I have come to an early conclusion that there are two types of clouds out there:…

Read more »

Upgrade to the Clouds

December 3, 2013
By
CloudComputing

Quite a few upgrades and new products have come out over the last few months. Some have forced many people to rethink their stance toward the cloud, management of resources, and technologies involved. For many, upgrades should upgrade but not change major functionality (or at least the way they use the upgraded tool). When this…

Read more »

The Cloud: Looking Forward

November 29, 2013
By
CloudComputing

It is the day after Thanksgiving in the United States, and as technologists, we have quite a bit for which to be thankful, as we live in interesting times. We live between the computing that was (mainframes, PCs, etc.) and the computing of tomorrow (fully functioning cloud). We live within a hybrid world. We are…

Read more »

SDDC Security Tools of the Future

November 19, 2013
By
SDDC Security Tools of the Future

The software-defined data center (SDDC) requires a new breed of security tools that not only handle the velocity of data being generated within a secure hybrid cloud but also handle the volume and variety of data. In fact, this new breed of security tools uses big data backends to manage the data being received, though…

Read more »

Network Virtualization: Not Just for the Service Provider

November 14, 2013
By
DataCenterVirtualization

Many network virtualization products appear to be aimed at the top 10,000 customers worldwide, accounting for their price as well as their published product direction. While this is a limited and myopic view, many claim it is for the best, their reason being that network virtualization is only really needed by the very large networks.…

Read more »

Google Circle
Join my Circle on Google+

Plugin by Social Author Bio

Featured Solutions