The Virtualization Practice

Rethinking vNetwork Security

Brad Hedlund of Cisco asked the question, should the physical network security policy be different than the virtual network security policy? The answer is obviously no, but why are they treated separately? I and other have pushed the concept that to gain performance, redundancy, and security that you should use multiple network links to your virtualization host to separate traffic. However, does this really give you security?

Let’s start this analysis with a basic question. Is there any rational reason for VMware and Citrix to make peace with each other, and develop the desktop virtualization market in concert with one another instead of in competition with each other? In other words if Citrix were to add its value to the core pieces of VMware View, would this be a good thing or a bad thing?

The End of ESX is Near – Is ESXi Ready for the Enterprise?

Well the worse kept secret in virtualisation is now finally out in the open, have a read of VMware ESX to ESXi Upgrade Center:Planning your Upgrade to the next-generation hypervisor architecture where they state that “In the future, the superior architecture of ESXi will be the exclusive focus of VMware’s development efforts. This means that not only will the ESXi hypervisor superceed the classic ESX hypervisor in a new version of vSphere; what the time scale is, is currently unknown however it is most likely to be vSphere 5 or whatever they decide to call the next major release. What is more interesting in statement is that VMware expects their customers to upgrade their existing installations of vSphere based on the ESX hypervisor to the new ESXi hypervisor.

I had an interesting conversation with Vizioncore yesterday about how backup is not as much a decision about what software to use but what process to use. In addition, this process needs to be considered from the very beginning of your virtualization architecture. With the quantity of virtual machines being used today by the SMB and Enterprise customers, the backup window has grown to nearly an all day event. What you say? An all day event? My backups happen with the window I set.

Those of you who attended VMworld this year will remember the stack of servers and storage on display happily serving VM’s to the vistors, exhibitors and Staff at the conference, well one of the key components of that stack was provided by Xsigo. Their product the I/O Director offers signficant savings in large environments by effectively virtualising the I/O stack. I am not going to go into the ins and outs of I/O virtualization in this article. Well it now appears that they are expanding their partnerships.

There are two key features missing from Virtualization and Cloud Computing. Those are auditing and forensics. The A6 project aims to fix this problem for auditing, but there is only some research into forensics. The issue is about discovering who did what when, where, how, and hopefully why. Auditing plays into this for Compliancy but also for forensics. Forensics has two major components in its arsenal: Audit Trails, and Disk Images.

Can your businesses increase productivity and save money by implementing a Bring your own Computer (BYOC) program? Are there benefits in giving staff a free choice of PC technology (be that a Windows, Mac, Linux, or other devices – perhaps even an iPad) if you give them a cash allowance to purchase and use their own PC for company and personal use? Are there pitfalls?