The Virtualization Practice

I just finished reading, yet another Multi-Tenancy Design/Overview that claims to be secure or trusted. While I will agree that this particular design does cover Availability and some GRC (Governance, Regulatory, and Compliance) it is severely lacking in Integrity and Confidentiality. The design even went as far as saying the cloud/virtual administrator requires “COMPLETE VISIBILITY.” I was really taken aback by those words. Why does an administrator need ‘COMPLETE VISIBILITY?’ Which leads me to the question is Integrity and Confidentiality possible within any cloud or virtual environment? Or is it purely based on TRUST?

If so this is an appalling state of virtual and cloud environment security.

Constructing a Best of Breed Alternative to VMware vCenter Operations Enterprise

With VMware vCenter OPS, VMware has stated that performance, capacity, and configuration data need to be integrated into a self-learning model in order to monitor a dynamic system. This model can be implemented as well using third party solutions like those from Quest, CA Technologies, AppDynamics, Bluestripe, dynaTrace, VKernel, NetApp, Netuitive, Net Relic, Coradiant, VMTurbo, Xangati, and Zenoss.

In July 2009 I wrote an article entitled Cloud Computing Providers — are they content providers or carriers? and in January of 2011 Chuck Hollis wrote an article Verizon To Acquire Terremark — You Shouldn’t Be Surprised. Now with the Terremark acquisition almost complete and RSA Conference 2011 also over, at which I talked to Terremark about the benefits of belonging to Verizon, a picture is starting to emerge. Yes, my predictions in 2009 make sense and still hold forth today, but is there more of an impact than we realize?

The phenomenal growth of the tablet market has left many industry analysts scrambling to reassess sales forecasts for both tablets and PCs. Last week Gartner was forced to acknowledge that its previous forecasts were way off the mark when it issued a revised 2011 sales forecast that reduced its November 2011 PC sales growth estimate by a staggering 25%. Gartner research director, Ranjit Atwal, said his company had not fully appreciated the impact that tablet devices were having on the market, and the new figures “reflect marked reductions in expected near-term unit growth based on expectations of weaker consumer demand, due in no small part to growing user interest in media tablets such as the iPad.” Given that this is the same Gartner that in September 2010 instructed CIOs everywhere to go out and buy iPads, it shows just how badly it underestimated the tablet’s impact on the PC market. As tablet sales (and for the moment we can read that as being almost exclusively iPad sales) continue to cut in to sales of PCs and laptops, PC manufacturers are under pressure to offer their own alternatives and IT organizations are under similar pressure to provide ways to integrate tablets into their core service offerings.

vCenter Operations – vSphere Performance, Capacity and Configuration Management with Self Learning Analytics

VMware has combined resource monitoring, capacity management, configuration management, with the self-learning analytics that came from Integrien into vCenter Operations – creating an attractive bundle of functionality for the management of the performance and capacity of vSphere environments.

On the 2/24 Virtualization Security Podcast we were joined by Davi Ottenheimer and Michael Haines of VMware to discuss vCloud security. This is of quite a bit of interest to many people these days. As VMware adds more and more Cloud functionality, how to secure the environment is becoming more and more important. The podcast started with the question what aspects of the cloud do customers want secured. The answer was intriguing to say the least.

On the third Virtualization Security Podcast of 2011 we were joined by Charlton Barreto of Intel to further discuss the possibility of using TPM/TXT to enhance security within the virtual and cloud environments. We are not there yet, but we discussed in depth the issues with bringing hardware based integrity and confidentiality up further into the virtualized layers of the cloud. TPM and TXT currently provide the following per host security: