Virtualization Security

Virtualization Security focuses upon end-to-end security, integrity, auditability, and regulatory compliance for virtualization and clouds. Virtualization Security starts where the cloud and virtual environments begin: the end user computing device.|We follow the user through the virtual and cloud stacks until they reach the application the user wishes to use to retrieve the data that is important to them. Virtualization and cloud security is implemented where there is an intersection between user, data, and application while maintain strict control of management interfaces. As such virtualization security looks into all aspects of security devices, tools, controls, and guides that impact or can be used to secure virtual and cloud environments.

Most Recently added Virtualization Security Resources: (See More...)

Virtualization Security for the SMB, Starting Point for All

March 16, 2010
By

The most recent Virtualization Security Podcast was on the subject of virtualization security for the SMB. Specifically cover the case where the customer wanting virtualization security could afford to purchase a hypervisor and perhaps one other security product. In the end the panelists came up with a list of suggestions for virtualization security for the…

Read more »

Virtualization Security Product Space Heating Up!

March 12, 2010
By

There are now more players in the virtualization security product space. While at RSA Conference 2010 I walked the show floor in search of these vendors to discover what they were doing. While some vendors do not address virtualization security, the vast majority are either looking to do so or actually have a virtualization security…

Read more »

Altor Networks wins RSA Innovation Sandbox

March 4, 2010
By

While at RSA Conference I visited the RSA Innovation Sandbox and noticed that three out of ten virtualization security vendors were finalists: * Altor Networks * Catbird Security * HyTrust Alto Networks won the Innovation Sandbox contest and all that goes with it. Congratulations to them, but Altor's win is actually a win for all…

Read more »

Cisco – VMware – NetApp an Interesting Approach to Secure Multi-Tenancy

March 3, 2010
By

The Cisco-VMware-NetApp (CVN) was discussed on the Virtualization Security Podcast as it pertains to Secure Multi-Tenancy (SMT). This is a major concern that was also discussed at RSA Conference 2010 within the Cloud Security Alliance Summit. The question still remains how to achieve this goal however. CVN is a very good start, but as we…

Read more »

HyTrust Funded by Cisco and Others

March 1, 2010
By

HyTrust has announced Series B Financing in the amount of $10.5 Million with participation from Cisco, Granite Ventures as well as existing investors Trident Capital and Epic Ventures. This is very good news for HyTrust. While the Series B Funding was not much of a surprise given that HyTrust fits into the Virtualizaiton Security within…

Read more »

Reflex Systems vTrust Technology in Use by Third Parties

February 25, 2010
By

When I first interviewed Reflex System's CEO he had a desire for the vTrustTM VMsafe-Net driver be the defacto standard for all such VMsafe-Net drivers. While others may not agree with this desire and will create their own VMsafe-Net drivers, TippingPoint is the first to integrate into Reflex's VMC product to leverage the vTrust VMsafe-Net…

Read more »

Rethinking vNetwork Security

February 16, 2010
By
Rethinking vNetwork Security

Brad Hedlund of Cisco asked the question, should the physical network security policy be different than the virtual network security policy? The answer is obviously no, but why are they treated separately? I and other have pushed the concept that to gain performance, redundancy, and security that you should use multiple network links to your…

Read more »

Virtualization and Cloud Missing Key Features: Auditing and Forensics

February 9, 2010
By

There are two key features missing from Virtualization and Cloud Computing. Those are auditing and forensics. The A6 project aims to fix this problem for auditing, but there is only some research into forensics. The issue is about discovering who did what when, where, how, and hopefully why. Auditing plays into this for Compliancy but…

Read more »

Featured Solutions