The Virtualization Practice

1062 search results for "vmware"

PerformanceManagement

The process of virtualizing business critical applications should start with using a modern APM tool to establish a response time and throughput baseline for the application while it is still on physical hardware. That baseline should then serve as the reference SLA once the application is virtualized. Performance needs to be defined as response time and throughput, not resource utilization.

PresentationVirtualization

Bromium have released vSentry 1.1 which will brings Bromium’s benefits of micro-virtualization and hardware based security to a far wider range of enterprise desktops. New features include wider OS Support: Live Attack Visualization and Analysis (LAVA) and the Bromium Management Server. There are still components of an enterprise desktop strategy that aren’t accommodated, but vSentry 1.1 has components that broaden the use cases deploying Bromium’s trustworthy computing service and expand the capabilities for those managing the service.

DataCenterVirtualization

Windows Server 2012 Hyper-V in your private cloud, specifically in a Microsoft Windows VM environment, can be delivered for cost effectively. With 2012 Hyper-V, any Microsoft edition has the exact same virtualization and fail-over clustering features & scalability. The key market play here is in the increased functionality that Microsoft has introduced however, Microsoft not only have to convince embedded and seasonsed VMware houses to move to a new release, but to convince those who saw Hyper-V in 2008 and 2008R2 that the product has a viable business maturity.

VirtualizationSecurity

VMware vCenter 5.1 implemented a new security feature, Single Sign-On (SSO), that uses the Security Assertion Markup Language (SAML) to exchange security tokens. This combats an extremely well known and prevalent attack within the virtualization management trust zones: SSL Man in the Middle (MiTM) attacks. However, vCenter still supports the old SSL methods as well for backwards compatibility and to allow management when SSO is not in use. However does this change how we look at virtualization and cloud management security best practices? Is this a launch point for implementing other authentication techniques?