We all know that ESXi is the future for VMware are regards their Hypervisor strategy, however most of you are more that aware of my dislike of the current interation. Now that I have got that off my chest, what has prompted this latest outburst?
Cloud Computing ...
• • 2 Comments
VMware and SalesForce.com have come together to provide a robust, scalable PaaS offering for Java Developers. Existing Force.com developers will now have the ability to use Java to build and extend their applications and all Java developers will have a significant and productive new run time option for their applications. VMware and SalesForce.com have both ratcheted up the pressure on Microsoft in a significant manner.
• • 0 Comments
I recently spoke at the InfoSec World 2010 Summit on Virtualization and Cloud Security and also attended the main conference sitting in on many Virtualization discussions. Perhaps it was the crowd, which was roughly 30-40% auditors. Perhaps it was the timing as SourceBoston was also going on, as well as CloudExpo in NY. But I was surprised to find that people are still ‘just starting’ to think about Virtualization Security. Since I think about this subject nearly every day, this was disappointing to me at best. I found ideas around virtualization security ranging from:
* Virtualization Security is not part of an architecture/design, what do I bolt on?
* My Physical Security will work
* Virtual Environments NEED More security than physical environments
* There are no new threats, so why have something more
* Security is a hindrance
VMware, Citrix, EMC, NetApp and Intel have all reported strong earnings for Q1/2009. This suggests that virtualization is helping the technology sector lead the economy out of the recession. This trend should continue as economies improve worldwide and these vendors can start to chalk up global growth.
During the last Virtualization Security Podcast, our guest had to postpone so we discussed to several interesting topics all related to Digital Forensics and how encryption would best work within the virtual environment. Our very own Michael Berman, in a previous life was a forensic investigator and had some great insights into the problem of digital forensic within the virtual environment.
One thing I have learned in the time I have spent working in IT is that no software product, out of the box, will do everything that you want it to do. This especially goes for VMware’s vCenter Server. This is a great product but yet still has its shortcoming. vCenter will perform a lot of the tasks that we need to do and has the ability to report on a information we need to know about in our virtual environments but unfortunately not everything we need to know about can be easily found in bulk about multiple servers.
Infrastructure Performance Management is the single most important performance and capacity management issue that owners of a virtual environment need to address. The reason for this is that since the low hanging fruit has been virtualized, what is left is business critical and performance critical applications in the hands of applications owners and their business constituents. In order to convince these groups that the virtual infrastructure is performing acceptably in support of these important applications Operations groups in charge of virtual environments need to move beyond trying to infer infrastructure performance from resource utilization patterns.
• • 1 Comment
VMware intends to in an 18 to 24 month period come out with a true management stack that addresses capacity management, infrastructure performance, applications performance (and service assurance), configuration management, lifecycle management, extended provisioning and wrap all of that into a service catalog that lets IT provide a menu of services that can then be automatically provisioning on a dynamic (or even a cloud based) virtual infrastructure.
Security baselines and security health checks are an important part of any modern day infrastructure. These checks are done periodically throughout the year, usually ever quarter. In my opinion this is a good thing to check and make sure your security settings are following the guidelines that the company has set out to achieve. Here is where I do have a problem. When setting up the guidelines for the different technologies in your infrastructure it would make the most sense that the people establishing the guidelines need to fully understand the technology they are working with. After all, would you really want the midrange or mainframe group to write the policies and guidelines for the Microsoft Windows Servers in your environment?