Brad Hedlund of Cisco asked the question, should the physical network security policy be different than the virtual network security policy? The answer is obviously no, but why are they treated separately? I and other have pushed the concept that to gain performance, redundancy, and security that you should use multiple network links to your virtualization host to separate traffic. However, does this really give you security?
• • 2 Comments
Well the worse kept secret in virtualisation is now finally out in the open, have a read of VMware ESX to ESXi Upgrade Center:Planning your Upgrade to the next-generation hypervisor architecture where they state that “In the future, the superior architecture of ESXi will be the exclusive focus of VMware’s development efforts. This means that not only will the ESXi hypervisor superceed the classic ESX hypervisor in a new version of vSphere; what the time scale is, is currently unknown however it is most likely to be vSphere 5 or whatever they decide to call the next major release. What is more interesting in statement is that VMware expects their customers to upgrade their existing installations of vSphere based on the ESX hypervisor to the new ESXi hypervisor.
Read this post for a rich set of Desktop Virtualization White Papers, Desktop Virtualization Webinars, Desktop Virtualization Podcasts, and a complete set of VMware View 4 product brochures.
Those of you who attended VMworld this year will remember the stack of servers and storage on display happily serving VM’s to the vistors, exhibitors and Staff at the conference, well one of the key components of that stack was provided by Xsigo. Their product the I/O Director offers signficant savings in large environments by effectively virtualising the I/O stack. I am not going to go into the ins and outs of I/O virtualization in this article. Well it now appears that they are expanding their partnerships.
Hosted Virtual Desktop (aka VDI) environments are sufficiently complex and different from either physical desktops or virtualized servers to warrant a dedicated approach to planning and assessing the migration from physical desktops to virtual desktops, and a dedicated approach to monitoring the resulting HDV environment in production.
• • 0 Comments
Can your businesses increase productivity and save money by implementing a Bring your own Computer (BYOC) program? Are there benefits in giving staff a free choice of PC technology (be that a Windows, Mac, Linux, or other devices – perhaps even an iPad) if you give them a cash allowance to purchase and use their own PC for company and personal use? Are there pitfalls?
I was posed with a question today, “I’m looking for some info on account & password management for consultants that visit a lot of customers where they have to do admin stuff.” with a secondary question of “how to manage the account if a constultant leaves?” This was specific to the VMware vSphere but would apply to any hypervisor.
VMware has just announced the End of Availability but not End of Life (EOL) for some of its pre-vSphere ESX products (Announcing End of Availability), specifically all but the latest releases of ESX 3.x and vCenter 2.x however, it has dropped availability for the ESX 2.x products completely.
The future of Virtualization and Cloud Security is being worked on today and there are several projects worth watching. Early guidance from these projects will aid your current virtualization and cloud security policies, procedures, plans, and architectures. (A6, DMTF, CSA, PCI, FDIC, etc.)