Citrix has acquired client hypervisor segment leader Virtual Computer. Citrix now has a new client hypervisor solution XenClient Enterprise featuring extremely strong management capabilities. Integration with Citrix’s existing client hypervisor is sure to come, providing customers with the best of both worlds.
There are many SaaS and Security SaaS cloud services out there, but they all lack one thing: full visibility. Why do these cloud offerings limit the ability to perform compliance auditing, forensics, and basic auditing against an organizations data retention, protection, and other necessary policies? Why not just grant the “right to audit”, or better yet, build a way for each tenant to perform their own audit down to the hardware? Why limit this by leaving it out of contracts as well as the technology? It is all feasible.
• • 1 Comment
• • 2 Comments
Kind to come just one week before the Citrix Synergy conference in San Francisco, VMware announced the next step towards its vision for end user computing today by unveiling the latest updates to VMware View and Horizon Application manager, as well as sharing more news about its Project Octopus beta.
Business Agility ...
• • 0 Comments
Desktone have architected a platform to allow resellers and service providers to deliver and support heterogeneous end user-environments. With a Desktone v5.0 platform, it is possible to deliver a hybrid desktop environment, manage multiple datacentres and utilise a set of APIs. For service providers and resellers alike, Desktone is offering a platform that can be managed and maintained with Linux based appliances and a single view of services that will be compelling.
Cloud Computing ...
• • 1 Comment
Many of the virtualization security people I have talked to are waiting patiently for the next drop of leaked VMware hypervisor code. But the real question in many a mind is whether or not this changes the the threat landscape and raises the risk unacceptably. So let’s look at the current hypervisor threat landscape within the virtual environment to determine if this is the case, and where such source code will impact. Are there any steps one can take now before the code drop is complete to better secure your environment?