Virtualization Security

Virtualization Security focuses upon end-to-end security, integrity, auditability, and regulatory compliance for virtualization and clouds. Virtualization Security starts where the cloud and virtual environments begin: the end user computing device.|We follow the user through the virtual and cloud stacks until they reach the application the user wishes to use to retrieve the data that is important to them. Virtualization and cloud security is implemented where there is an intersection between user, data, and application while maintain strict control of management interfaces. As such virtualization security looks into all aspects of security devices, tools, controls, and guides that impact or can be used to secure virtual and cloud environments.

Most Recently added Virtualization Security Resources: (See More...)

Cloud and Virtualization Security: An After Thought

November 7, 2011
By

The October conference schedule is now complete and it was a tough one but very rewarding. The events that happened in October were numerous and overlapping in some cases. Travel was one week here and the next week there, yet we managed to get through it. Of the mass of conferences, I attended two, IPexpo…

Read more »

Life without the Cloud or Reasons to use a Hybrid Cloud

November 4, 2011
By

The Virtualization Practice was recently offline for two days, we thank you for coming back to us after this failure. The reason, a simple fibre cut that would have taken the proper people no more than 15 minutes to fix, but we were way down on the list due to the nature of the storm…

Read more »

Application Performance Management – Our New Relic Details

October 25, 2011
By and
Application Performance Management – Our New Relic Details

iven the complexity of modern web sites, tools such as New Relic RPM are incredible assets and a valuable tool to determine what is happening within your environment. While your data does go into their SaaS offering, all SQL and other statements are scrubbed. The results of using this tool are incredible.

Read more »

Virtualization Security Announcements: Architecture Concerns

October 20, 2011
By

There have been a large number of Announcements that have been made for VMworld Copenhagen with respect to virtualization and cloud security. This shows quite an interesting growth in the market, and that even 1 month apart there is still more to be announced within the virtual and cloud security spaces. There are three very…

Read more »

Going to the Cloud Safely

October 5, 2011
By

Whether or not to put data into the cloud has been a debate since clouds were first formed. At a recent conference I was asked: with all the security issues you brought up, why should I go to the cloud, I do not know the administrators, nor can I gain cloud visibility, so why go…

Read more »

Link your Clouds using AFORE Cloudlink

October 3, 2011
By
Link your Clouds using AFORE Cloudlink

AFORE Solutions has created AFORE Cloudlink, which won the Best of VMworld for Security at VMworld 2011 in the United States. Yet, many people were scratching their head saying, who are AFORE and why did they win. AFORE moved from a physical appliance to a virtual appliance about 3 years ago providing a way to…

Read more »

State of Secure Multitenancy Today

September 30, 2011
By

On 9/22 was held the Virtualization Security Podcast featuring Anil Karmel, Solutions Architect at Los Alamos National Library (LANL), to discuss their implementation of secure multi-tenant Cloud. LANL makes extensive use of the entire VMware product suite from vCloud Director down to the vShield components to implement their SMT cloud. They have also added into…

Read more »

Automating Cloud Security

September 27, 2011
By

On 9/8 was held the Virtualization Security Podcast featuring Phil Cox, Director of Security and Compliance at RightScale, to discuss the impact of and need for automation of cloud security. Given that we create clouds by automating deployment of workloads we also need to automate the security of those workloads during the same deployment. This…

Read more »

Security in the Cloud Era

September 21, 2011
By

"The latest challenge on the security front isn't necessarily an exotic new threat vector: it's the attackers themselves. They're organized, well-resourced and patient. And there's no silver technology bullet to effectively combat them." This is a very important point, and one that I have seen at other security conferences for the last 5 years or…

Read more »

Featured Solutions