Have you ever wondered how all the virtualization security tools fit together? Wait no longer as we have a new White Paper that will tell you this information. How do products from Altor Networks, Catbird Security, Reflex Systems, HyTrust, Tripwire, and others fit within your virtual environment?

The End-to-End Virtual Environment Security white paper is a living document that will change as the market space changes. One thing that has changed recently (last month) was the decision from Tripwire to drop their vWire product which was very useful for diagnostics and possible early detection of issues even so diagnostics of this nature did not jive with the security and compliance direction of the company.

Many diagnostic tools can be used for virtualizaiton security however, this is mainly a “off label” use of a given tool. There are very few true virtualization security tools, and this white paper fits them within your virtual environment.

TVP: The End-to-End Virtual Environment Security provides a map to how all the virtualization security tools fit together.

  
http://www.virtualizationpractice.com/wp-content/plugins/downloads-manager/img/icons/pdf.gif download: End-to-End Virtual Environment Security (758.88KB)
added: 18/01/2010
clicks: 27817
description: TVP: The End-to-End Virtual Environment Security provides a map to how all the virtualization security tools fit together.

Share this Article:

Share Button
Edward Haletky (381 Posts)

Edward L. Haletky, aka Texiwill, is the author of VMware vSphere(TM) and Virtual Infrastructure Security: Securing the Virtual Environment as well as VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers, 2nd Edition. Edward owns AstroArch Consulting, Inc., providing virtualization, security, network consulting and development and The Virtualization Practice where he is also an Analyst. Edward is the Moderator and Host of the Virtualization Security Podcast as well as a guru and moderator for the VMware Communities Forums, providing answers to security and configuration questions. Edward is working on new books on Virtualization.

[All Papers/Publications...]

Connect with Edward Haletky:


Related Posts:

4 comments for “End-To-End Virtual Environment Security

  1. versace
    January 23, 2010 at 9:24 AM

    An e2e virtual security environment my address data requirements, or the ability to apply data assurance policies and related practices/technologies as data moves from the client, through networks, databases, applications and infrastructure. Some of the technology options are encryption and key management, aliasing, bit splicing, data disbursal, de-identification, others.

    I’d also like to see a TCO component added to the e2e paper. For example, how would an end user determine the cost and value of virtual security integrations? Maybe a model with a few examples?

    Thanks

Leave a Reply

Your email address will not be published. Required fields are marked *


+ 6 = eight