Virtualization Security

Virtualization Security focuses upon end-to-end security, integrity, auditability, and regulatory compliance for virtualization and clouds. Virtualization Security starts where the cloud and virtual environments begin: the end user computing device.|We follow the user through the virtual and cloud stacks until they reach the application the user wishes to use to retrieve the data that is important to them. Virtualization and cloud security is implemented where there is an intersection between user, data, and application while maintain strict control of management interfaces. As such virtualization security looks into all aspects of security devices, tools, controls, and guides that impact or can be used to secure virtual and cloud environments.

Most Recently added Virtualization Security Resources: (See More...)

Catbird will OEM VMware vShield App

August 22, 2011
By

Last week there was a bit of a surprise when someone announced Catbird Security made an agreement to purchase vShield App and only App from VMware. This left quite a few of us scratching our heads wondering why VMware would let this particular security software go. This announcement was incorrectly relayed and quite far from…

Read more »

Secret Consoles — Multiple Management Interfaces — Security Nightmare

August 17, 2011
By

While looking on twitter this morning I discovered a tweet that pointed to the following article, which is relatively devoid of details but none-the-less extreme interesting to those who follow virtualization security: Fired techie created virtual chaos at pharma company. This article points out an external attack that lead to management access of a virtual…

Read more »

Mitre – Two New Tools to Help with PaaS and Risk Assessment

August 15, 2011
By

On the 7/28 Virtualization Security Podcast, we were joined by Robert Martin of Mitre to discuss Mitre's new CWE, CWSS, and CWRAF tools to aid in software and system security evaluation. We put a decidedly cloud based discussion around these tools to determine how they would be used by those that program within a PaaS…

Read more »

vSphere 5 Licensing – The Role of Cross Platform Management Tools and the Hotlink SuperVISOR

August 12, 2011
By
vSphere 5 Licensing – The Role of Cross Platform Management Tools and the Hotlink SuperVISOR

So you are a loyal VMware customer. You have licenses for vSphere 4 and you are about 40% virtualized. Based upon the revised vRAM entitlements in the revised vSphere 5 licensing, you think you are going to be OK as you progress through the more demanding business critical purchased and custom developed applications that lie…

Read more »

Trend Micro: Info Graphic on Journey to the Cloud

August 8, 2011
By
Trend Micro: Info Graphic on Journey to the Cloud

Trend Micro provided us a very interesting info graphic on a Journey to the Public Cloud with a list of which of their tools secure that Journey. What is interesting about this info graphic is the steps outlined in this journey to the Cloud and the threats and issues as you step along this path.…

Read more »

Virtualization & Cloud Backup News & New Players

August 3, 2011
By

At the NE VMUG, while walking the floor I saw a new virtualization backup player, perhaps the first generic Replication Receiver Cloud: TwinStrata. And information gained while not at the NE VMUG. There is also a new virtualization backup player just for Hyper-V: Altaro. As well as a new release of Quest vRangerPro. The Virtualization…

Read more »

ROI/TCO of Virtualization and Cloud Security

July 22, 2011
By

The 7/7 Virtualization Security Podcast with Steve Kaplan, Vice President of INX's Data Center Virtualization Practice and well known ROI/TCO expert within the virtualization and cloud space, joined us to talk about the ROI and TCO of virtualization and cloud security. We discussed someways to view virtualization and cloud security, but mostly the fact that…

Read more »

vSphere 5 – Virtualize Business Critical Applications with Confidence

July 12, 2011
By
vSphere 5 – Virtualize Business Critical Applications with Confidence

Just in time for the adoption of vSphere 5 by enterprises seeking to virtualize business critical and performance critical applications, AppFirst, BlueStripe, and ExtraHop have pioneered a new category of APM solutions. This new category is focused upon allowing IT to take responsibility for applications response time for every application running in production. This is…

Read more »

Start with SaaS Security: End with Data Security

July 6, 2011
By

The 6/30 Virtualization Security Podcast with Simon Crosby Founder and CEO of Bromium started with a discussion of SaaS security but soon went to a discussion of Data Security. Simon left Citrix not to long ago to form a new company, Bromium, to seriously look into how the hypervisor itself can provide better security for…

Read more »

Featured Solutions