Citrix acquire Podio – Podio’s focus is to provide a platform for small/medium sized organisations to get up and running with standard business function applications offered from Podio’s own App Store. Does this mark the a Citrix foray to better accomodate mobility and consumerisation while stepping outside the microsoft windows desktop delivery environment.
While at InfoSec World 2012’s summit on Cloud and Virtualization Security, the first talk was on Securing your data. The second was on penetration testing to ensure that data was secure. In essence it has always been about the data but there is a huge difference between what a tenant can do and what the cloud or virtual environment provider can do with respect to data protection and security. This gap is apparently becoming wider instead of smaller as we try to understand tenant vs cloud provider security scopes. There is a lack of transparency with respect to security, but at the same time there are movements to gain that transparency. But secret sauces, scopes, legislation, and lack of knowledge seem to be getting in the way.
There is a difference between outsourcing layers of your infrastructure and making the organization to whom you have outsourced those layers responsible for them, and losing all rights to change those layers in support of your business and application needs. Careful contract and product decisions need to be made in order to ensure that when you used a managed cloud service, you are not giving up the control you need to be agile and responsive to you business constituents.
Citrix has given up Project Olympus which was based on the Open Source OpenStack platform in favor of its own Open Source CloudStack initiative (formerly known as Cloud.com), which it is contributing to the Apache foundation and has re-licensed under the partner-friendly Apache Open Source license (rather than the GPL).
VMware’s Project Octopus and others like ownCloud and Oxygen Cloud have stirred some interesting ideas about Application Security. Those applications that make use of SSL, nearly every web application, can make use of secure data storage for certificate verification means. What makes SSL MiTM attacks possible, is mostly related to poor certificate management. If there was a way to alleviate the need for the user to be involved in this security decision, then SSL MiTM attacks would be significantly reduced.
Quantum recently announced a ‘Flexible path to Next Generation Backup and Disaster Recovery’, which dovetails nicely with my thoughts on future proofing data protection. Quantum has created, with the help of Xerox, a way to have multi-tenant data protection at the level of the tenant and not just the cloud provider.
• • 2 Comments
Numecent believe Cloudpaging has the potential to impact all connected devices where software needs to be delivered rapidly and securely. Cloudpaging isn;t just a fancy marketing term for a re-branded application virtualisation. Numecent have delivered a new application delivery technology that is poised to open up a new application delivery mechanism not only for enterprises, but for both ISVs and MSPs.
The 3/8 Virtualization Security Podcast held a discussion on the happenings as the 2012 RSA Conference in San Francisco as well as a discussion of the features of Bitdefender’s entry into the virtualization and cloud space with their SVE product. RSA Conference high lights not just those security tools for the virtualization and cloud spaces but the entire industry and each year there is always a common theme. Was there one this year? Was there any surprises at the conference?
Cloud Computing ...
• • 1 Comment
With vFabric Application Director, vFabric AppInsight and the rest of the vFabric product line we are seeing VMware’s application level strategy come to life. It is clear that VMware is making an enormous and strategic investment on this front, probably second only in priority to the continued investment in vSphere’s domination of data center virtualization. The combination of vFabric and vSphere also brings into clear focus the fullness of the VMware software stack, and the degree to which VMware seriously threatens established OS vendors like Microsoft and Red Hat.