Virtualization Security

Virtualization Security focuses upon end-to-end security, integrity, auditability, and regulatory compliance for virtualization and clouds. Virtualization Security starts where the cloud and virtual environments begin: the end user computing device.|We follow the user through the virtual and cloud stacks until they reach the application the user wishes to use to retrieve the data that is important to them. Virtualization and cloud security is implemented where there is an intersection between user, data, and application while maintain strict control of management interfaces. As such virtualization security looks into all aspects of security devices, tools, controls, and guides that impact or can be used to secure virtual and cloud environments.

Most Recently added Virtualization Security Resources: (See More...)

News: Less than a week to VM Expo in London

October 2, 2009
By

In its second year, VM Expo is the UK’s first and largest event dedicated to Virtualization.  From 7th – 8th of October in London at Earls Court Two, this free to attend event has over 190 seminars and 180 vendors. This year’s virtualization keynote address will be delivered by Stephen Herrod, CTO and Senior VP…

Read more »

40,000 Firewalls! Help Please!?

September 21, 2009
By

While at VMworld I was suddenly hit with a blast of heat generated by the 40,000 VMs running within the VMworld Datacenter of 150 Cisco UCS blades or so. This got me thinking about how would VMsafe fit into this environment and therefore about real virtualization security within the massive virtual machine possible within a…

Read more »

VMsafe – Vendor Implementations at VMworld

September 18, 2009
By
VMsafe – Vendor Implementations at VMworld

With the advent of existing VMsafe products from Altor Networks, Reflex Systems, and ones on the horizon from Trend Micro and others in the security space, all administrators should have a clear understanding of how they work under the covers. Where does VMsafe appear within the stack? Is VMsafe on the incoming physical NICs, within…

Read more »

Reflex VMC — The First VMsafe Certification

August 26, 2009
By

Reflex Systems announced today that they have the first VMware VMsafe Certification for their Reflex VMC product.   This announcement brings two things to light. The first is that VMware has made a very smart move to certify VMsafe drivers for their hypervisor, which is a much needed step I have written about previously. The second…

Read more »

Measuring Hypervisor Footprints

August 25, 2009
By

There have been several interesting posts in the blogosphere about virtualization security and how to measure it. Specifically, the discussions are really about the size of the hypervisor footprint or about the size of patches. But hypervisor footprints from a security perspective are neither of these. The concern when dealing with hypervisor security is about…

Read more »

Hosted Virtualization Security – Type 2 Hypervisors

August 17, 2009
By

There is quite a bit of documentation on bare metal or Type 1 hypervisors, including my own book, VMware vSphereTM and Virtual Infrastructure Security: Securing the Virtual Environment, but there is not much material on the proper security of hosted environments, or Type 2 hypervisors, such as Microsoft Virtual Server, VMware Workstation, Fusion, Player, or…

Read more »

vSphere enters Common Criteria testing.

August 3, 2009
By

VMware vSphere has started its journey to Common Criteria certification,

Read more »

VMsafe Firewalls, Are They Real Firewalls or Something More?

July 22, 2009
By

The biggest question I ask myself when I see VMsafe appliances is: will it replace my current virtual firewall setup? Replace my Anti-virus? or Both? I am seeing a trend that gives me pause. That is a VMsafe appliance being more than one thing. For example, Trend Micro is an Anti-Virus company that bought Third…

Read more »

ThinApp Security Concerns

July 10, 2009
By

Since I last blogged ThinApp I have been thinking about the security aspects of ThinApp and came up with a set of questions to which I searched for some answers. In essence could ThinApp be used to subvert existing system security? What about other similar technologies like Microsoft App-V.

Read more »

Featured Solutions