The last Virtualization Security Podcast covered PCI, Kurt Roemer and Jeff Elliot who were guests represented PCI. PCI as you hopefully know is working on compliance guidance for payment systems running within virtual machines and the cloud. This early discussion is a plea for people to get involved in reviewing the currently developing white-paper. While…
• • 1 Comment
2010 will be the year that many enterprises confront two very important changes to how they will use server virtualization. The first change is that as VMware vSphere has proven its maturity, performance and scalability enterprises will increasingly put business critical tier applications, at least in part on virtualized platforms. The second change is that at the same time, these very same enterprises will start to evaluate virtualization platforms from other vendors, in particular Hyper-V from Microsoft.
• • 2 Comments
When considering your VDI deployment hosting your workspaces is not the only consideration. Careful consideration needs to be made on the management of the performance, license use and user’s environment to give, not only a good user experience, but a timely return on your investment.
Microsoft’s announcement yesterday of Massachusetts based Sentillion extends its reach into healthcare solutions and added a new component to its virtualization portfolio. Sentillion’s vThere is a type-2 hypervisor (hosted virtual machine) built on Parallels virtualization whose strength is in its ability to provide a highly secured desktop image on a normally non-secured solution.
• • 0 Comments
There has been quite a bit of discussion between myself, Tim Pierson, and other with respect to SSL man-in-the-middle attack possibilities within the virtual environment. But what are the chances that such an attack will happen, or that someone would know how to perform the attack? What does the attack depend upon?
• • 1 Comment
The support for multiple virtualization platforms on the part of these third party virtualization managements vendors also raises an issue and an opportunity for enterprises with large scale VMware deployments. The issue is to determine if the enterprise is going to end up with more than one hypervisor. If the answer is yes, then the opportunity is to look at a virtualization management solution from a vendor like Dynamic Ops, Fortisphere, ManageIQ, Platform Computing, Surgient, or VizionCore.
• • 4 Comments
Ulteo has just released Version 2 of its Open Virtual Desktop (OVD), an Open Source desktop broker product which is designed to deliver GUI applications running on Linux, Terminal Services and Windows to java-enabled browsers. Ulteo’s appeal is likely to be to more cost-conscious and linux-oriented organizations than the large enterprise customers of Citrix, VMware, Ericom, Systancia or Quest, but within these potentially new markets it can deliver many of the mangeability benefits of the existing proprietary products, and it has few competitors for its key feature of delivering both Linux and Terminal Services desktop applications through the same portal.
• • 1 Comment
With the announcement of V-Block and Cisco UCS as a major component, is more hypervisor functionality going to end up in hardware? UCS adds some interesting features into the hardware that were traditionally within the purview of the hypervisor. Now it looks like V-Block is the assembly of myriad components that taken as a whole look remarkably like the beginnings of a hardware based hypervisor.
• • 0 Comments
Over the past year or so I have been thinking pretty heavily about the direction networking is taking within virtualization. In some ways, it appears security has been forgotten or relegated to ‘encrypt’ and forget. However, it takes quite a bit of knowledge and time to properly set up the backbone of an ‘encrypt’ and forget approach to network security, so it does not happen. Instead, we have a proliferation of technologies being used to cut down on cable clutter and thereby consolidate the network. These are all very important concepts. Security practitioners like myself realize that this type of consolidation WILL happen. So what tools are required to either ‘encrypt and forget’ or to protect these consolidated networks?