Virtualization Security

Virtualization Security focuses upon end-to-end security, integrity, auditability, and regulatory compliance for virtualization and clouds. Virtualization Security starts where the cloud and virtual environments begin: the end user computing device.|We follow the user through the virtual and cloud stacks until they reach the application the user wishes to use to retrieve the data that is important to them. Virtualization and cloud security is implemented where there is an intersection between user, data, and application while maintain strict control of management interfaces. As such virtualization security looks into all aspects of security devices, tools, controls, and guides that impact or can be used to secure virtual and cloud environments.

Most Recently added Virtualization Security Resources: (See More...)

IT Automation: Where is the Center?

February 26, 2013
By
ITasaService

The network binds it all together, the network could be the center of IT Automation.

Read more »

Building a Management Stack for Your Software-Defined Data Center

February 25, 2013
By
SDDC.Management.Stack.Reference.Architecture

The Software Defined Data Center (SDDC) will require a completely new management stack - one suited to the highly dynamic nature of an environment in which every key resource (CPU, memory, networking and storage) is abstracted from its underlying hardware.

Read more »

Public Cloud Reality: Application Security is in your Hands

February 18, 2013
By
VirtualizationSecurity

We recently moved workloads to the public cloud and the public cloud reality does not match the hype, nor does it match the application security requirements of a small or even large organization.

Read more »

Public Cloud Reality is Much Different than the Hype

February 14, 2013
By
CloudComputing

The public cloud reality is much different than the hype. You only get from the public cloud what you bring to it. You need to bring your own security, performance monitoring, knowledge, and expertise.

Read more »

VMware’s Fourth Quarter and 2012 Financial Results

January 29, 2013
By
VMware100x30

VMware has delivered impressive growth in revenue, and lackluster growth in earnings. Growing earnings while addressing VMware's numerous strategic challenges will prove to make 2013 a demanding year for Pat Gelsinger and his team.

Read more »

Security Automation = Good Security Practice

January 24, 2013
By
VirtualizationSecurity

As I shoveled even more snow, I was starting to think about automation, as in how could I get something to shovel the snow for me, which lead to thinking about automation within the cloud. I see lots of discussion about automation in the cloud. Many of my friends and colleagues are developing code using…

Read more »

Virtualizing Business Critical Applications – Integrity & Confidentiality

January 14, 2013
By
VirtualizationSecurity

Recently I discussed Virtualizing Business Critical Applications and security, which includes availability, confidentiality, and integrity. However, that discussion was more about visibility into the environment for security operations. I purposely left off the discussion of gaining integrity and confidentiality of the data housed within those business critical applications.

Read more »

SaaS Auditing: Knowing who did what

January 11, 2013
By
CloudComputing

Rightscale has been running into a problem with the simplest of auditing requirements: how to know when someone has logged in. This problem spans nearly all their 100s of SaaS providers used to run their business. Where is the ability to do SaaS Auditing?

Read more »

Featured Solutions