AFORE Solutions has created AFORE Cloudlink, which won the Best of VMworld for Security at VMworld 2011 in the United States. Yet, many people were scratching their head saying, who are AFORE and why did they win. AFORE moved from a physical appliance to a virtual appliance about 3 years ago providing a way to move data between data centers in an encrypted fashion, which at the time was desperately needed. After three years they have made quite a few changes, but still have their core functionality, but now included data at rest encryption and the ability to stretch layer-2 and layer-3 networks between locations amongst others.
On 9/22 was held the Virtualization Security Podcast featuring Anil Karmel, Solutions Architect at Los Alamos National Library (LANL), to discuss their implementation of secure multi-tenant Cloud. LANL makes extensive use of the entire VMware product suite from vCloud Director down to the vShield components to implement their SMT cloud. They have also added into their cloud their own intellectual property to improve overall cloud security. It was a very interesting conversation about the state of SMT today.
Since the introduction of virtualization there has been sheer joy and excitement when having to work with application owners on the amount of resources they will need and not what they really think they want. I have seen all kinds of minimum, maximum, and special recommendation for all kinds of application over the years. In most cases, applications have evolved to be able to thrive in a virtual environment without too many limitations. Now it seems we have to verify which VMware features are fully supported with certain virtualized application also.
Business Agility ...
Consumerization of IT: AppSense and Centrix Software alliance recognise its more than just “how can my CFO justify their iPad”?
• • 1 Comment
AppSense, a leading provider of user virtualization technology, and Centrix Software, provider of unified end-user computing solutions, have announced a strategic partnership to provide organizations with a comprehensive, user-centric transformation program. Do you need a user-centric transformation program? How could this alliance help your business manage IT beyond the ‘single-PC-for-every-user’ era? If they can help you, are they your only hope? Will it justify your CFO’s iPad?
On 9/8 was held the Virtualization Security Podcast featuring Phil Cox, Director of Security and Compliance at RightScale, to discuss the impact of and need for automation of cloud security. Given that we create clouds by automating deployment of workloads we also need to automate the security of those workloads during the same deployment. This podcast delves into that need, and touches on where over automation is also a problem.
• • 0 Comments
Confio IgniteVM uniquely provides a consolidated view of resource utilization and latency across database servers like Oracle, SQL Server, DB2, and Sybase and the virtual machine layer, the physical host layer and the storage layer. This provides a valuable performance management perspective to DBA’s as well as to the virtualization team that often is held responsible for performance issues in database based applications.
Whether you use replication as a means of disaster avoidance or disaster recovery, replication of your virtual environment between hot sites has always been a win. With current technology it is even possible to replicate to a replication receiver cloud which could provide a measure of business continuity as well. So who are the players and who provides what service, and how do they do it?
• • 0 Comments
XenApp 6.5 is Citrix’s latest offering of their renowned Presentation Virtualisation (PV) service. Citrix are not alone in updating their feature set. Earlier in 2011 Microsoft introduced SP1 for 2008 enhancing the OS for the core Remote Desktop Services’ (RDS) session virtualization service, Ericom released PowerTerm WebConnect 5.7.1, ProPalms updated TSE to 6.5 and Quest announced vWorkspace 7.2 MR1.
“The latest challenge on the security front isn’t necessarily an exotic new threat vector: it’s the attackers themselves. They’re organized, well-resourced and patient. And there’s no silver technology bullet to effectively combat them.”
This is a very important point, and one that I have seen at other security conferences for the last 5 years or so. However, attacks are possible because there is a lack of confidentiality and integrity of the data held within the systems under attack. So the system becomes the week point.