I recently participated in the InformationWeek Dark Security Virtual Event as a panel member with Hoff, Craig Balding, Chris Wolf, Glenn Brunette, and Jon Oberheide. A very far ranging group of individuals from research, security organizations, analysts, and authors. What is interesting is that most of these same people have joined me on the Virtualization Security Podcast, and the others I hope to have as guests next year. There was one question that set me to thinking even more, do we need a new way of thinking about virtualization security?
Cloud Computing ...
• • 0 Comments
The last Virtualization Security Podcast covered PCI, Kurt Roemer and Jeff Elliot who were guests represented PCI.Â PCI as you hopefully know is working on compliance guidance for payment systems running within virtual machines and the cloud. This early discussion is a plea for people to get involved in reviewing the currently developing white-paper. While…
• • 1 Comment
2010 will be the year that many enterprises confront two very important changes to how they will use server virtualization. The first change is that as VMware vSphere has proven its maturity, performance and scalability enterprises will increasingly put business critical tier applications, at least in part on virtualized platforms. The second change is that at the same time, these very same enterprises will start to evaluate virtualization platforms from other vendors, in particular Hyper-V from Microsoft.
• • 2 Comments
When considering your VDI deployment hosting your workspaces is not the only consideration. Careful consideration needs to be made on the management of the performance, license use and user’s environment to give, not only a good user experience, but a timely return on your investment.
Microsoft’s announcement yesterday of Massachusetts based Sentillion extends its reach into healthcare solutions and added a new component to its virtualization portfolio. Sentillion’s vThere is a type-2 hypervisor (hosted virtual machine) built on Parallels virtualization whose strength is in its ability to provide a highly secured desktop image on a normally non-secured solution.
• • 0 Comments
There has been quite a bit of discussion between myself, Tim Pierson, and other with respect to SSL man-in-the-middle attack possibilities within the virtual environment. But what are the chances that such an attack will happen, or that someone would know how to perform the attack? What does the attack depend upon?
• • 1 Comment
The support for multiple virtualization platforms on the part of these third party virtualization managements vendors also raises an issue and an opportunity for enterprises with large scale VMware deployments. The issue is to determine if the enterprise is going to end up with more than one hypervisor. If the answer is yes, then the opportunity is to look at a virtualization management solution from a vendor like Dynamic Ops, Fortisphere, ManageIQ, Platform Computing, Surgient, or VizionCore.
• • 4 Comments
Ulteo has just released Version 2 of its Open Virtual Desktop (OVD), an Open Source desktop broker product which is designed to deliver GUI applications running on Linux, Terminal Services and Windows to java-enabled browsers. Ulteoâ€™s appeal is likely to be to more cost-conscious and linux-oriented organizations than the large enterprise customers of Citrix, VMware, Ericom, Systancia or Quest, but within these potentially new markets it can deliver many of the mangeability benefits of the existing proprietary products, and it has few competitors for its key feature of delivering both Linux and Terminal Services desktop applications through the same portal.
• • 1 Comment
With the announcement of V-Block and Cisco UCS as a major component, is more hypervisor functionality going to end up in hardware? UCS adds some interesting features into the hardware that were traditionally within the purview of the hypervisor. Now it looks like V-Block is the assembly of myriad components that taken as a whole look remarkably like the beginnings of a hardware based hypervisor.