Blog Archives

Edward Haletky
Edward HaletkyEdward L. Haletky, aka Texiwill, is the author of VMware vSphere(TM) and Virtual Infrastructure Security: Securing the Virtual Environment as well as VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers, 2nd Edition. Edward owns AstroArch Consulting, Inc., providing virtualization, security, network consulting and development and The Virtualization Practice where he is also an Analyst. Edward is the Moderator and Host of the Virtualization Security Podcast as well as a guru and moderator for the VMware Communities Forums, providing answers to security and configuration questions. Edward is working on new books on Virtualization. [All Papers/Publications...]

Cloud Scale Apps, Cloud Scale Testing

May 24, 2013
By
Agile Cloud Development

While at Interop I participated in a Tech Field Day event where Spirent was talking about their new Axon product as well as the possibility of usage of Blitz.io. It was an interesting discussion but gave me some food for thought. As we move to cloud scale apps based on platforms such as Pivotal (EMC…

Read more »

EMC ViPR as a Part of a SDDC

May 21, 2013
By
DataCenterVirtualization

At EMC World 2013, EMC announced ViPR as the answer to storage within the software defined data center. ViPR presents multiple types of storage while segmenting the control plane from the data plane. In addition, ViPR is a head end, fronting traditional storage arrays as an automation and control point and does not replace any…

Read more »

Can you Pivot to Pivotal?

May 16, 2013
By
Agile Cloud Development

At EMCworld 2013, one of the big stories was Pivotal and it's importance to the EMC2 family and the future of computing. Pivotal is geared to provide the next generation of computing. According to EMC2 have gone past the Client-Server style to a scale-out, scale-up, big data, fast data Internet of Things form of computing.…

Read more »

Internet of Things: Expectation of Privacy

May 15, 2013
By
VirtualizationSecurity

For years we have had an expectation of privacy while using our computers, tablets, phones, email, etc. However, with the advent of big data analysis and everything being on the internet, the internet of things, there is no longer the veil that makes up an Expectation of Privacy.

Read more »

Automation Weaknesses

May 6, 2013
By
DataCenterVirtualization

Over the last few weeks I have been struggling with automating deployment and testing of virtual desktops for my own edification. This struggle has pointed out automation weaknesses which need to be addressed for automation and the software defined data center to succeed and not only be deployed from software but also self-healing and all…

Read more »

News: Splunk App for Enterprise Security Updated

May 3, 2013
By
Splunk100x30

Splunk is well known for analyzing data in large volumes either within a local Splunk installation or within the Splunk Storm their cloud service. However, there has been a general lack of security related capability within both these tools. Yes they can correlate some security data, but requires a bit of hands on work to…

Read more »

Cyber Defense: Using Virtual Desktops?

April 29, 2013
By
DesktopVirtualization

There was recently a rather heated twitter discussion between @Guisebule, @VirtualTal, and @Texiwill (myself) about using virtual desktops as a part of cyber defense. While this could be true, there is a need to ensure you know where your virtual desktop(s) start and end, not only within the network, but your applications in use. In…

Read more »

Virtual Desktop Patching and Data Protection

April 23, 2013
By
DesktopVirtualization

Data Protection and patch management of virtual desktops, while not a sexy topic, is one that should happen on a regular basis within any organization implementing or working to implement virtual desktops. Recently, we have been testing virtual desktop software and there is a huge difference between patching and protecting data in a small number…

Read more »

Cloud Tenant PCI-DSS Dilemma

April 17, 2013
By
VirtualizationSecurity

There is a dilemma for all tenants of a public or private cloud: Scope. For the tenant, they want everything to be in scope. For the Cloud Service Provider (CSP) they want to limit scope to the bare minimum. What does it mean for a Cloud to be 'PCI Compliant' and why is this a…

Read more »

Google Circle
Join my Circle on Google+

Plugin by Social Author Bio

Featured Solutions