Virtualization Security

Virtualization Security focuses upon end-to-end security, integrity, auditability, and regulatory compliance for virtualization and clouds. Virtualization Security starts where the cloud and virtual environments begin: the end user computing device.|We follow the user through the virtual and cloud stacks until they reach the application the user wishes to use to retrieve the data that is important to them. Virtualization and cloud security is implemented where there is an intersection between user, data, and application while maintain strict control of management interfaces. As such virtualization security looks into all aspects of security devices, tools, controls, and guides that impact or can be used to secure virtual and cloud environments.

Most Recently added Virtualization Security Resources: (See More...)

Public Cloud Reality: Application Security is in your Hands

February 18, 2013
By
VirtualizationSecurity

We recently moved workloads to the public cloud and the public cloud reality does not match the hype, nor does it match the application security requirements of a small or even large organization.

Read more »

Public Cloud Reality is Much Different than the Hype

February 14, 2013
By
CloudComputing

The public cloud reality is much different than the hype. You only get from the public cloud what you bring to it. You need to bring your own security, performance monitoring, knowledge, and expertise.

Read more »

VMware’s Fourth Quarter and 2012 Financial Results

January 29, 2013
By
VMware100x30

VMware has delivered impressive growth in revenue, and lackluster growth in earnings. Growing earnings while addressing VMware's numerous strategic challenges will prove to make 2013 a demanding year for Pat Gelsinger and his team.

Read more »

Security Automation = Good Security Practice

January 24, 2013
By
VirtualizationSecurity

As I shoveled even more snow, I was starting to think about automation, as in how could I get something to shovel the snow for me, which lead to thinking about automation within the cloud. I see lots of discussion about automation in the cloud. Many of my friends and colleagues are developing code using…

Read more »

Virtualizing Business Critical Applications – Integrity & Confidentiality

January 14, 2013
By
VirtualizationSecurity

Recently I discussed Virtualizing Business Critical Applications and security, which includes availability, confidentiality, and integrity. However, that discussion was more about visibility into the environment for security operations. I purposely left off the discussion of gaining integrity and confidentiality of the data housed within those business critical applications.

Read more »

SaaS Auditing: Knowing who did what

January 11, 2013
By
CloudComputing

Rightscale has been running into a problem with the simplest of auditing requirements: how to know when someone has logged in. This problem spans nearly all their 100s of SaaS providers used to run their business. Where is the ability to do SaaS Auditing?

Read more »

Virtualizing Business Critical Applications – Security and Compliance

January 10, 2013
By
VirtualizationSecurity

Virtualizing Business Critical Applications is often stopped either by the sudden involvement of security and compliance, a need to better understand, or a need to gain visibility into the underlying security of the virtual environment in order to build new security and compliance models.

Read more »

Cloud Security: On Moats

January 4, 2013
By
VirtualizationSecurity

This got me thinking about cloud security. The ongoing desire to put moats between us and the attackers. But what is us, in the cloud? Can we prevent the attacks? What are the current moat style technologies in play today?

Read more »

Featured Solutions