The Virtualization Practice

1048 search results for "vmware"

Today (see below) CA announced that it is acquiring NetQos. The combination of the previously acquired Cassatt and Wily assets with the NetQos assets now give CA the full set of components needed to field a comprehensive performance management solution for virtual and cloud environments. The only question that remains is whether or not CA will be able to effectively position and sell these solutions into the virtualization marketplace against experience competitors like VizionCore and Veeam who have signficant channel and customer presence in this market.

The Linux Kernel Virtual Machine (KVM) has been available for some time in, for example, Ubuntu 8.0.4 LTS (Released April 2008). KVM is widely used and stable and it is high time that Red Hat who acquired KVM when they purchased Qumranet in September 2008, started to move their customers onto it – at least to remove the uncertainty in the customer base.

Veeam, Vizioncore, and PhD Virtual all showed there latest released products as well as the future products that integrate with VMware vSphere at much deeper levels that previously available, ala the VMware vStorage API. Talk was also about expanding their products into Microsoft Hyper-V as well as Citrix XenServer. This space has become so important that even the traditional backup vendors such as Symantec (BackupExec) as well as HP (DataProtector) are getting into the act. This shows ecosystem as well as market maturity not seen at last years VMworld.

There have been several interesting posts in the blogosphere about virtualization security and how to measure it. Specifically, the discussions are really about the size of the hypervisor footprint or about the size of patches. But hypervisor footprints from a security perspective are neither of these. The concern when dealing with hypervisor security is about Risk not about the size of the hypervisor or the size of a patch it is purely about the Risks associated with the hypervisor in terms if confidentiality, availability, and integrity.