Blog Archives

Edward Haletky
Edward HaletkyEdward L. Haletky, aka Texiwill, is the author of VMware vSphere(TM) and Virtual Infrastructure Security: Securing the Virtual Environment as well as VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers, 2nd Edition. Edward owns AstroArch Consulting, Inc., providing virtualization, security, network consulting and development and The Virtualization Practice where he is also an Analyst. Edward is the Moderator and Host of the Virtualization Security Podcast as well as a guru and moderator for the VMware Communities Forums, providing answers to security and configuration questions. Edward is working on new books on Virtualization. [All Papers/Publications...]

Virtualization and Cloud Missing Key Features: Auditing and Forensics

February 9, 2010
By

There are two key features missing from Virtualization and Cloud Computing. Those are auditing and forensics. The A6 project aims to fix this problem for auditing, but there is only some research into forensics. The issue is about discovering who did what when, where, how, and hopefully why. Auditing plays into this for Compliancy but…

Read more »

End of Availability for ESX all but vSphere

January 28, 2010
By

VMware has just announced the End of Availability but not End of Life (EOL) for some of its pre-vSphere ESX products (Announcing End of Availability), specifically all but the latest releases of ESX 3.x and vCenter 2.x however, it has dropped availability for the ESX 2.x products completely.

Read more »

Virtualization and Cloud Security Projects to Watch

January 26, 2010
By

The future of Virtualization and Cloud Security is being worked on today and there are several projects worth watching. Early guidance from these projects will aid your current virtualization and cloud security policies, procedures, plans, and architectures. (A6, DMTF, CSA, PCI, FDIC, etc.)

Read more »

Security and Compliance only when Auditor is at the door

January 22, 2010
By

I was privileged to speak at the 3rd Annual South Florida ISACA WoW! Event with Robert Stroud, Alan Shimel, and other great speakers. What I discovered from this conference is something I have feared for quite a number of years. Compliance actions are not continuous but often only enacted when the auditor shows up at…

Read more »

End-To-End Virtual Environment Security

January 18, 2010
By

Have you ever wondered how all the virtualization security tools fit together? Wait no longer as we have a new White Paper that will tell you this information. How do products from Altor Networks, Catbird Security, Reflex Systems, HyTrust, Tripwire, and others fit within your virtual environment?

Read more »

Backup Security

January 14, 2010
By
Backup Security

When you think of backup security, many people think of ensuring tapes are offsite or even encryption on media, but what is really required for backup security? There is quite a bit going on when someone performs a backup within the virtual environment, so where does security begin and end for making a single or…

Read more »

Virtual Disk Encryption

January 6, 2010
By

In the article End-to-End Virtual Machine Backup I mentioned the new VMware Workstation 7.0 feature that creates an encrypted disk but in reality it is an encrypted virtual machine, which also implies encrypting the virtual disk. This one option to VMware Workstation is something that is needed within VMware vSphere as well as the other…

Read more »

End-to-End Virtual Machine Backup

January 4, 2010
By

As of the end of last year, there are a new breed of virtualization backup tools (Veeam, vRangerPro, esXpress) now available, end-to-end backup tools (Acronis, Symantec). These tools will backup a virtual machine to tape using built in mechanisms instead of requiring scripting, or multiple backup tools. The question is: is this necessary? Should virtual…

Read more »

Google Circle
Join my Circle on Google+

Plugin by Social Author Bio

Featured Solutions