Virtualization Security

Virtualization Security focuses upon end-to-end security, integrity, auditability, and regulatory compliance for virtualization and clouds. Virtualization Security starts where the cloud and virtual environments begin: the end user computing device.|We follow the user through the virtual and cloud stacks until they reach the application the user wishes to use to retrieve the data that is important to them. Virtualization and cloud security is implemented where there is an intersection between user, data, and application while maintain strict control of management interfaces. As such virtualization security looks into all aspects of security devices, tools, controls, and guides that impact or can be used to secure virtual and cloud environments.

Most Recently added Virtualization Security Resources: (See More...)

Cyber Defense: Using Virtual Desktops?

April 29, 2013
By
DesktopVirtualization

There was recently a rather heated twitter discussion between @Guisebule, @VirtualTal, and @Texiwill (myself) about using virtual desktops as a part of cyber defense. While this could be true, there is a need to ensure you know where your virtual desktop(s) start and end, not only within the network, but your applications in use. In…

Read more »

How Will VMware Win Against Microsoft?

April 26, 2013
By
DataCenterVirtualization

A VMware win against Microsoft simply requires VMware to turn the pricing tables on Microsoft, and to leverage its highly differentiating functionality in its Software Defined Data Center strategy. VMware could re-establish technical dominance in the data center virtualization space as early as the end of this year by leveraging its software defined networking, software…

Read more »

Virtual Desktop Patching and Data Protection

April 23, 2013
By
DesktopVirtualization

Data Protection and patch management of virtual desktops, while not a sexy topic, is one that should happen on a regular basis within any organization implementing or working to implement virtual desktops. Recently, we have been testing virtual desktop software and there is a huge difference between patching and protecting data in a small number…

Read more »

Cloud Tenant PCI-DSS Dilemma

April 17, 2013
By
VirtualizationSecurity

There is a dilemma for all tenants of a public or private cloud: Scope. For the tenant, they want everything to be in scope. For the Cloud Service Provider (CSP) they want to limit scope to the bare minimum. What does it mean for a Cloud to be 'PCI Compliant' and why is this a…

Read more »

How VirtuStream does Cloud Security

April 11, 2013
By
Virtustream100x30

On the 4/4 Virtualization Security Podcast, Pete Nicoletti, the chief information security officer for Virtustream, joined us to discuss how VirtuStream does cloud security. VirtuStream runs some of, if not the largest SAP installations in the cloud for very large enterprises around the world. The key to VirtuStream is that they are an Enterprise Cloud…

Read more »

Technology Update from the Field

April 10, 2013
By
CloudComputing

There have been a spate of press releases and news in and around the industry over the last few weeks that bear further consideration. They could actually solve some of your current cloud and virtual environment issues while opening new doors for future expansion. As an architect and analyst I find these technology very interesting…

Read more »

SDDC and the Ever Expanding Control Plane

April 4, 2013
By
ITasaService

The software defined data center has the potential to expand the control plane well outside of anyone's control by the simple fact that we do not yet have a unified control mechanism for disparate hardware (networking, storage, and compute), for disparate hypervisors (vSphere, KVM, Xen, Hyper-V), new types of hypervisors (storage and networking), and new…

Read more »

Security is not compliance and compliance will not get you security. Or does it?

April 3, 2013
By
VirtualizationSecurity

Security is not compliance and compliance will not get you security. At least that is what I hear from security teams. Conversations with security focal team members from non-security focal people can be quite interesting and has its unique challenges and hurtles to overcome. You can find yourself speaking the same language but not fully…

Read more »

Training and More Training for EUC Security

April 2, 2013
By
VirtualizationSecurity

End User Computing security seems to be in the hands of the users not actually the IT Security department. At least not yet. So what can we do about this? IT security can be draconian and not allow EUC devices into the office, but the users will be up in arms. They use their smart…

Read more »

Featured Solutions