Virtualization Security

Virtualization Security focuses upon end-to-end security, integrity, auditability, and regulatory compliance for virtualization and clouds. Virtualization Security starts where the cloud and virtual environments begin: the end user computing device.|We follow the user through the virtual and cloud stacks until they reach the application the user wishes to use to retrieve the data that is important to them. Virtualization and cloud security is implemented where there is an intersection between user, data, and application while maintain strict control of management interfaces. As such virtualization security looks into all aspects of security devices, tools, controls, and guides that impact or can be used to secure virtual and cloud environments.

Most Recently added Virtualization Security Resources: (See More...)

Virtualizing Business Critical Applications – A Reference Architecture

July 26, 2010
By
Virtualizing Business Critical Applications – A Reference Architecture

Virtualization Security, Configuration Management, Service and Capacity Management, Provisioning and Lifecycle Management, and Backup/Recovery are essential functions that must be added to a virtualization platform when virtualizing business critical applications. VMware vSphere is clearly the market leading and most robust virtualization platform - and clearly the virtualization platform most suitable as the foundation of a…

Read more »

This Week in Virtualization Security News

July 23, 2010
By

The Virtualization Security Podcast on 7/22 was all about the news of the week with our panelists discussing how this news affects everyone and anyone with respect to Virtualization Security. The news discussed: * NIST Released their Guide to Security for Full Virtualization Technologies (Draft) * There is a Security issue with VMware vSphere 4.1…

Read more »

Implementing Policy in the Virtual Environment and Cloud

July 20, 2010
By

When you read books on virtualization, cloud computing, security, or software product sheets a common word that shows up is Policy. Tools often claim to implement Policy, while books urge you to read or write your Policy. But what does Policy imply? Webster (webster.com) defines policy as: 1 a : prudence or wisdom in the…

Read more »

Virtualization Security Team-Ups

July 16, 2010
By

Catbird and HyTrust have teamed up to deliver a product that provides front-end access and compliance control for well understood actions via HyTrust, for all other actions, including intrusions, Catbird Security provides compliance control, firewall, IDS, and IPS. In other words, proactive security via HyTrust and reactive security via Catbird.

Read more »

vSphere 4.1 Released – More Dynamic Resource Load Balancing

July 13, 2010
By and
vSphere 4.1 Released – More Dynamic Resource Load Balancing

With the release of vSphere 4.1, VMware has added to their Dynamic Resource Load Balancing (DRLB) suite of tools that I hinted at in my post on Dynamic Resource Load Balancing that I wrote last week as well as providing new memory over commit and other functionality. In essence, vSphere 4.1 is more than a…

Read more »

Safe way to Encrypt within a VM – Need for Technology

July 12, 2010
By

Encryption is important, encryption within a VM even more important. But the question is how to do this securely without allowing the encryption keys to be seen by an administrator of the virtual environment and that supports vMotion or LiveMigration. The solution is per VM encrypted memory, but something more robust that makes use of…

Read more »

Virtualization Backup Security still Missing the Mark

July 9, 2010
By

During the Virtualization Security Podcast on 7/8, Vizioncore’s Thomas Bryant joined us to discuss the state of virtualization backup security and forensic use of such backups. In the world of virtualization, backups are performed mostly by 4 distinct vendors: VMware Data Recovery (VDR) and VMware Consolidated Backup (VCB), Vizioncore vRanger, Veeam, and PHD Virtual Backup…

Read more »

vSecurity gets a boost from TPM/TXT

June 29, 2010
By

During the Virtualization Security Podcast on 6/22, Steve Orrin of Intel and Dennis Morreau of RSA joined us to discuss the impact of Intel Westmere chips built-in Trusted Platform Module (TPM) and Trusted Execution Technology (TXT) on Cloud and Virtualization Security. TPM is not all that new, but TXT's usage in virtualization security is new.…

Read more »

Announcement: Virtual Thoughts Podcast the rebirth

June 29, 2010
By

Virtual Thoughts Podcast the Rebirth, Join us Tuesday 29th June @ 7:00pm (BST), 2:00pm (EST), 11:00am (PST)

Read more »

Featured Solutions