Blog Archives

Edward Haletky
Edward HaletkyEdward L. Haletky, aka Texiwill, is the author of VMware vSphere(TM) and Virtual Infrastructure Security: Securing the Virtual Environment as well as VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers, 2nd Edition. Edward owns AstroArch Consulting, Inc., providing virtualization, security, network consulting and development and The Virtualization Practice where he is also an Analyst. Edward is the Moderator and Host of the Virtualization Security Podcast as well as a guru and moderator for the VMware Communities Forums, providing answers to security and configuration questions. Edward is working on new books on Virtualization. [All Papers/Publications...]

Monitoring – The basics of the Cloud

May 3, 2010
By and

"What do you wish to monitor?", is often my response when someone states they need to monitor the virtual environment. Monitoring however becomes much more of an issue when you enter the cloud. Some of my friends have businesses that use the cloud, specifically private IaaS clouds, but what should the cloud provider monitor and…

Read more »

ESXi – Closer but still no Cigar

April 29, 2010
By and

We all know that ESXi is the future for VMware are regards their Hypervisor strategy, however most of you are more that aware of my dislike of the current interation. Now that I have got that off my chest, what has prompted this latest outburst?

Read more »

Virtualization Security @ InfoSec World 2010: Go for the Low Hanging Fruit!

April 27, 2010
By

I recently spoke at the InfoSec World 2010 Summit on Virtualization and Cloud Security and also attended the main conference sitting in on many Virtualization discussions. Perhaps it was the crowd, which was roughly 30-40% auditors. Perhaps it was the timing as SourceBoston was also going on, as well as CloudExpo in NY. But I…

Read more »

Forensics: Guidance for Virtual Environments

April 21, 2010
By

During the last Virtualization Security Podcast, our guest had to postpone so we discussed to several interesting topics all related to Digital Forensics and how encryption would best work within the virtual environment. Our very own Michael Berman, in a previous life was a forensic investigator and had some great insights into the problem of…

Read more »

GestaltIT Tech Field Day: Virtualization Line Up

April 19, 2010
By
GestaltIT Tech Field Day: Virtualization Line Up

I participated in GestaltIT's TechFieldDay which is a sort of inverse conference, where the bloggers and independent analysts go to the vendors and then discuss the information they have received. We visited the following virtualization vendors: * vKernel where we were introduced to their Predictive Capacity Planning tools * EMC where we discussed integration of…

Read more »

GestaltIT Tech Field Day: Storage Line Up

April 15, 2010
By
GestaltIT Tech Field Day: Storage Line Up

I participated in GestaltIT's TechFieldDay which is a sort of inverse conference, where the bloggers and independent analysts go to the vendors and then discuss the information they have received. We visited the following storage vendors: * Data Robotics where we were introduced to the new Drobo FS * EMC where we discussed stretched storage…

Read more »

Virtualization Forensics: How different is it?

April 12, 2010
By

Since coming out with VMware vSphere and Virtual Infrastructure Security: Securing the Virtual Environment, I have continued to consider aspects of Digital Forensics and how current methodologies would be impacted by the cloud. My use case for this is 40,000 VMs with 512 Servers and roughly 1000 tenants. What I would consider a medium size…

Read more »

Drobo FS, Your Link to the Cloud

April 7, 2010
By

Data Robotics just announced the Drobo FS. Drobo FS via Drobo Apps (which are free) will have a link to the Oxygen Cloud. This could lead to several interesting options for the small business to large enterprise with respect to data storage and accessibility. Not to mention protection.

Read more »

Anti-This, Anti-That, getting into the Virtualization Security Game with Introspection

April 1, 2010
By

Virtualization Security vendors are starting to seriously investigate the possibilities of the various introspection APIs available to the hypervisors. Introspection APIs allow security groups to now investigate the security of a virtual network, virtual machine, and other components from without. In other words, why rely on an agent within the VM to protect your network,…

Read more »

Google Circle
Join my Circle on Google+

Plugin by Social Author Bio

Featured Solutions