Teenager’s View of Cloud Security: Expectations of Privacy

June 1, 2012
By
VirtualizationSecurity

The 5/3 Virtualization Security Podcast had a very special guest, a teenager. This surprise guest told us about how she and her friends use their smartphones and cloud services such as FaceBook, Twitter, SMS, etc. For the panelist, it gave us a new look at our existing problems; expanding our viewpoint for end-user computing security,…

Read more »

All Paths Down!

May 31, 2012
By
StorageNetworking

I recently had the joys of helping deal with an All Paths Down (APD) situation which presented itself when removing a LUN from all the hosts in a cluster. If you do not detach the device first, which will also initiate an unmount operation before you physically unpresent the LUN from the ESX, it causes…

Read more »

Dell Transforms Virtualization Management with Quest Buy

May 30, 2012
By
Dell_Circle_100x30

If Dell in fact buys Quest then Dell will Transform Virtualization Management. Dell's presence in the market, customer base, and market reach combined with its product set will put Dell in a strong position to compete not only with VMware, but also to create serious pain for IBM, HP, CA, and BMC. Furthermore, the opportunities…

Read more »

Dell-Quest deal will strengthen Dell enterprise services and force shakeout in desktop virtualization market

May 29, 2012
By
Dell_Circle_100x30

According to Bloomberg News Dell is in discussions to acquire Quest Software in a bid to strengthen its enterprise software services portfolio. Dell has been shopping, with five acquisitions announced so far this year, to add software, computer storage and networking gear to its lineup of PCs, which account for 52% of its sales. With…

Read more »

End User Computing: Protecting Data From the Device

May 25, 2012
By
siri

Some of us have multiple cloud endpoints in the form of mobile devices all trying to access our personal and corporate data to do our daily jobs. These incredibly useful devices (smartphones, tablets, etc.) are now a part of our organizations life. So how do we protect our data from them. IBM recently took a…

Read more »

Filling the Gaps: Focus on Application Security

May 24, 2012
By
VirtualizationSecurity

Symantec and others are providing more products that fill the gaps in current End-to-End Hybrid Cloud Security. These solutions range to improved log analysis through multi-layer security for critical systems. If these solutions are rolled out would we finally have secure environments? Would we be approaching the dream of secure multi-tenancy? But first what are…

Read more »