Posts Tagged ‘ vNetwork ’

vNetwork Security: Looking at VLANs

June 23, 2010
By

There is nothing like fully understanding the protections inherent within your vNetwork and the Roles and Permissions you can set within the virtualization management tool suites to ensure your vNetwork is secured, audited, and monitored for issues. Just like you do now within the pNetwork. Unlike the pNetwork, the vNetwork provides a certain amount of…

Read more »

Virtualization Security Technologies… Pushing the Envelope

June 4, 2010
By

During the Virtualization Security Podcast on 5/13, IBM's David Abercrombie joined us to discuss IBM's Virtualization Security Protection for VMware (VSP) which contains several exciting uses of the VMsafe API for VMware vSphere. These being: * Network: Network Monitoring, Firewall, Access Control, and a Protocol Analysis Module * Memory: Rootkit Detection

Read more »

Virtualization Security @ InfoSec World 2010: Go for the Low Hanging Fruit!

April 27, 2010
By

I recently spoke at the InfoSec World 2010 Summit on Virtualization and Cloud Security and also attended the main conference sitting in on many Virtualization discussions. Perhaps it was the crowd, which was roughly 30-40% auditors. Perhaps it was the timing as SourceBoston was also going on, as well as CloudExpo in NY. But I…

Read more »

Virtualization Security for the SMB, Starting Point for All

March 16, 2010
By

The most recent Virtualization Security Podcast was on the subject of virtualization security for the SMB. Specifically cover the case where the customer wanting virtualization security could afford to purchase a hypervisor and perhaps one other security product. In the end the panelists came up with a list of suggestions for virtualization security for the…

Read more »

Rethinking vNetwork Security

February 16, 2010
By
Rethinking vNetwork Security

Brad Hedlund of Cisco asked the question, should the physical network security policy be different than the virtual network security policy? The answer is obviously no, but why are they treated separately? I and other have pushed the concept that to gain performance, redundancy, and security that you should use multiple network links to your…

Read more »

Featured Solutions