Blog Archives

Edward Haletky
Edward HaletkyEdward L. Haletky, aka Texiwill, is the author of VMware vSphere(TM) and Virtual Infrastructure Security: Securing the Virtual Environment as well as VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers, 2nd Edition. Edward owns AstroArch Consulting, Inc., providing virtualization, security, network consulting and development and The Virtualization Practice where he is also an Analyst. Edward is the Moderator and Host of the Virtualization Security Podcast as well as a guru and moderator for the VMware Communities Forums, providing answers to security and configuration questions. Edward is working on new books on Virtualization. [All Papers/Publications...]

Training and More Training for EUC Security

April 2, 2013
By
VirtualizationSecurity

End User Computing security seems to be in the hands of the users not actually the IT Security department. At least not yet. So what can we do about this? IT security can be draconian and not allow EUC devices into the office, but the users will be up in arms. They use their smart…

Read more »

The Growing Divide between Security and Virtualization (Cloud)

March 29, 2013
By
VirtualizationSecurity

I asked @MrsYisWhy to join the podcast as she is from the other side of the world from virtualization and cloud security folks and has quite a different view. The rent we saw being sewn up is now a vast divide as we jump feet first into Cloud deployments, virtualization business critical workloads, and generally…

Read more »

Public Cloud Reality: Support Responsibility

March 28, 2013
By
CloudComputing

The Public Cloud Reality around support responsibility is not something often considered, instead we are looking at SLAs, legal documents, compliance documents, and many other items. Do we consider who is ultimately responsible when something goes wrong within the cloud? Is your Cloud provider a full partner or do they limit themselves to a small…

Read more »

News: Public Comment for VMware Hardening Guide

March 28, 2013
By
VirtualizationSecurity

Just entered my mailbox, there is a new rev of the vSphere 5.1 hardening guide which was spoken about on the last Virtualization Security Podcast. This version of the hardening guide creates a much needed new feature: Profiles.

Read more »

SDDC Data Protection

March 26, 2013
By
VirtualizationBackup

One aspect of SDDC that does not get a lot of attention is Data Protection, instead we are concentrating on SDN and automation. Yet, this leads me to Data Protection. There is a clear marriage between Data Protection and SDDC that needs to be added to any architecture. As with all things, we start with…

Read more »

Public Cloud Reality: Do we Stay or Do We Go?

March 19, 2013
By
CloudComputing

Soon the backup power will be available for our new datacenter and the redesign to make use of VMware vCloud Suite is nearing completion. Soon, our full private cloud will be ready for our existing workloads. These workloads however now run within a XenServer based public cloud.  So the question is, do we stay in…

Read more »

Cloud Conversations: Tweetchat and Serendipity

March 13, 2013
By
VirtualizationSecurity

The 3/7 Virtualization Security Podcast featured Andi Mann, VP of Strategic Solutions at CA Technologies, and RSA Conference. The conversation was lively and I invited Andi Mann due to a previous day tweet chat about cloud security. Lately I have had several serendipitous conversations on cloud security from TweetChat, to in face discussions with @Qthrul,…

Read more »

IT as a Service: Not Just for a Cloud

March 7, 2013
By
DataCenterVirtualization

I was going to write about how building a cloud is similar to moving, but the more I think about it, the more I think people are confusing an automated virtual environment with a cloud: IT as a Service is not just about cloud. Having automation does not imply your virtual environment is a cloud…

Read more »

Public Cloud Reality: Reinforced at CSA Summit

March 5, 2013
By
CloudComputing

I have written about the Public Cloud Reality and the need to bring your own security, monitoring, support. This was reinforced by Dave Asprey of Trend Micro at the last Cloud Security Alliance Summit held at this years RSA Conference. The gist of Dave Asprey's talk was that YOU are responsible for the security of…

Read more »

Google Circle
Join my Circle on Google+

Plugin by Social Author Bio

Featured Solutions