In the first Virtualization Security Podcast of 2011, we had Brad Hedlund with us once again. Not to talk about the Cisco Virtualization Security Gateway (VSG), but about the security of what I call physical-virtual devices that provide network virtualization within the hardware. Or what Brad Called Network ID Virtualization (NIV). Cisco has taken its VN-Link technology to extend the networking of a VM directly into the core switch when using vSphere.
Mainstream virtual desktop solutions have focused their efforts on providing the best platform for hosting virtual desktop environments. Hypervisors, image management, and connection brokers are the top feature sets that companies have looked at during their comparisons. Moving up the stack, these vendors are now focusing on user personalization management, but do not have what is considered to be a full desktop management solution. So are our end-to-end virtual desktop solutions really complete?
Cloud Computing ...
• • 0 Comments
Sooner or later that perfect landscape of white is marred by new mounds of snow and clear-cut paths through it to the various locations on the property. When you look at these paths and the snow is high enough, they look like tunnels. The large tunnels (driveway) meet smaller and smaller ones. The perfect landscape of snow is now marred. This is just how a firewall looks when you put holes in it to let through various services. The more services, the more tunnels and paths will be cut. When speaking about the cloud or virtual environments, the increase in paths and entry points becomes a serious issue.
The acquisition of Akorri by NetApp demonstrates the importance of Infrastructure Performance Management solutions as virtualization progresses into the realm of business critical applications, and as public clouds hope to do the same. However rather than signaling a “game over” this acquisition really raises both the visibility and the importance of both the problems that Akorri solved, and the true end-to-end problems that remain.
• • 3 Comments
Ericom has has won the race to deliver the first new product release of the “Year of Desktop Virtualization” with the launch of Ericom PowerTerm WebConnect 5.7.
WebConnect (sorry Ericom, but “PowerTerm WebConnect 5.7″ takes too much space on the page to type out every time) is Ericom’s answer to Citrix XenApp and XenDesktop, plus or minus a few bells and whistles. On the plus side WebConnect includes mainframe and midrange terminal emulation software to provide access to legacy systems, as well as offering support for mixed environments consisting of servers running Windows Server 2003, 2008, 2008 R2 grouped together in a single farm, and manages to do all this with a single product where Citrix still requires two.
• • 2 Comments
Given that vSphere provides significant benefits in terms of cost savings and business agility, those benefits are tied to and constrained by the ability of vSphere to provide backward compatibility with existing legacy enterprise systems. This backward compatibility makes it impossible for vSphere to provide infinite horizontal scalability. Moving to the same architecture as the most highly scaled out public cloud vendors provides for a more radical set of benefits, but at the cost of breaking backward compatibility for many applications.
The Nirvana Phone was intended to enable a user to use their small form factor device when on the move or in the office to access business applications and data by accessing a virtual desktop. Motorola’s ATRIX 4G is being hailed as a device that can enable any road warrior or knowledge worker more mobile and productive with an in-place virtualised desktop environment
It is the start of 2011 and I hope everyone has not broken their New Year’s Resolutions already. To start the year off, I would like to encourage and or challenge you to become a part of your local VMware User Group or VMUG as we like to call it. Last year I did a post on My Experience with VMUGs and I am a full supporter of this program and the good it can bring. Although I have a bias for the VMUGS over other types of user groups, the concept of people helping people rates high in my book and I would like to challenge you all to get involved.
When we think of the threat to a virtual environment or the cloud, what do we think about? First it is important to understand how the cloud is layered ontop of the virtual environment. Given a cloud stack, where are the entry points for SaaS, PaaS, IaaS, and Cloud management? At the recent Minneapolis VMUG I attempted to relay that information to the attendees. Once we understood the layers we could then concentrate on the threat vectors to the cloud and virtual environment.