The Virtualization Practice

1145 search results for "vmware"

SMBVirtualization

As a small business we run a 100% virtualized environment and looking to migrate to a cloud, but the investment in IT to do this has been pretty substantial and for a cash strapped small business can be a many year process due to budget constraints and immediacy of other business needs. That is the key to a small business, the immediacy of business needs, but if you can step back and do a little planning, any small business can proceed along the journey from a physical environment to a software defined environment. There are many choices available to a small business depending on when they started this journey, existing investment, and where they wish to go. What choices are available now for a small business and where should we go as small business owners?

The Hybrid Cloud has 100s if not 1000s of APIs in use at any time. API security therefore becomes a crucial part of any hybrid cloud environment. There are only so many ways to secure an API, we can limit its access, check the commands, encrypt the data transfer, employ API level role based access controls, ensure we use strong authentication, etc. However, it mostly boils down to depending on the API itself to be secure because while we can do many things on the front end, there is a chance that once the commands and actions reach the other end (cloud or datacenter) that the security could be suspect. So how do we implement API security within the hybrid cloud today?

DataCenterVirtualization

There has long been a debate about testing products within a virtual environment. Not just on how, but the why as well as the what to test. There are limits in some EULA’s as well on the reporting of such testing. This was the subject of the 7/25 Virtualization Security Podcast (#112 – Virtualization Security Roundtable) held Live from NSS Labs in Austin, TX. Where we delved into the issues of testing within a virtual environment. While the discussion was about security products, it is fairly straight forward to apply the concepts to other products within the virtual environment.

DataCenterVirtualization

The benefits of virtualizing networking and storage will be very different than were the benefits of virtualizing CPU and memory. VMware’s success to date has not come at the expense of server vendors. However VMware’s success with virtualized networking will come at the expense of Cisco. The success with virtualizing storage will come at the expense of enterprise storage vendors. By commoditizing networking and storage VMware will deliver substantial benefits to its customers, and create strained relationships with vendors who used to be partners.

Checking Out The Possibilities Of A Storage Cloud Platform With Atmos and Panzura

Checking out the possibilities of a storage cloud platform with Atmos and Panzura: The advancement, acceptance and continued growing use of the public cloud storage and backup services gives us, the end users, options and capabilities that we just did not have available to us before the birth of the cloud. How many times have we used services like Drop Box to move, share or store some form a data that we might been working on. Having this kind of capability really helps to make our lives easier but is also a nightmare of corporate security folks whose job is to protect and secure the corporate data.

SDDC.Management.Stack.Reference.Architecture

Legacy management frameworks are going to get replaced by SDDC Management Platforms that combine big data back ends, analytics and ecosystem friendly data collection and integration strategies to give customers the best of both worlds. Customers will be able to choose from among best of breed solutions, and then integrate them at the data level via a big data back end data store. This will revolutionize the management software industry, give rise to a new set of leaders in this industry, and completely destroy the legacy management frameworks.

When it comes to the secure hybrid cloud, Identity has many different definitions from a device a user is using to the combination device, location, password, and other multi-factor authentication means. Even with all the technology there is still the question of where the identity store lives (the bits that contain the identity for all users, devices, etc.) as well as how do you prove identity once the user goes somewhere within the cloud which is outside your control?

SDDC.Management.Stack.Reference.Architecture

The handwriting is on the wall. Managing the SDDC and the cloud will upend the management software industry. BMC has been taken private because it has to go through changes to adapt to the new world that cannot be done as a public company. IBM’s revenues have declined for five straight quarters. CA has resorted to lawsuits against vendors (New Relic and AppDynamics) that have out innovated CA, and who are walking away with the new APM market.