Virtualization Security

Virtualization Security focuses upon end-to-end security, integrity, auditability, and regulatory compliance for virtualization and clouds. Virtualization Security starts where the cloud and virtual environments begin: the end user computing device.|We follow the user through the virtual and cloud stacks until they reach the application the user wishes to use to retrieve the data that is important to them. Virtualization and cloud security is implemented where there is an intersection between user, data, and application while maintain strict control of management interfaces. As such virtualization security looks into all aspects of security devices, tools, controls, and guides that impact or can be used to secure virtual and cloud environments.

Most Recently added Virtualization Security Resources: (See More...)

Cloud Security: On Moats

January 4, 2013
By
VirtualizationSecurity

This got me thinking about cloud security. The ongoing desire to put moats between us and the attackers. But what is us, in the cloud? Can we prevent the attacks? What are the current moat style technologies in play today?

Read more »

2013 Virtualization and Cloud Computing Predictions

CloudComputing

Herewith we offer our 2013 Virtualization and Cloud Computing Predictions. May we also wish everyone a Happy Holiday Season and a prosperous 2013.

Read more »

End User Computing: Using just a Tablet

December 18, 2012
By
DesktopVirtualization

Recently I have been trying to lighten my conference going load. To do that, I have been thinking about ways to do without my laptop and all the accessories for it, which got me thinking about what it takes to completely use such a device; to fully embrace the next generation of end-user computing using…

Read more »

Cloud API: In-Security?

December 14, 2012
By
VirtualizationSecurity

The 12/13 Virtualization Security Podcast featured George Reese CTO on enStratus as our guest panelist. We discussed Cloud API security or more to the point the lack of real cloud API security. To paraphrase George: Some got it, others do not. So what makes up a good cloud API? how can we fix broken cloud…

Read more »

Bromium release vSentry 1.1: trustworthiness for more desktops in the enterprise?

December 13, 2012
By
PresentationVirtualization

Bromium have released vSentry 1.1 which will brings Bromium's benefits of micro-virtualization and hardware based security to a far wider range of enterprise desktops. New features include wider OS Support: Live Attack Visualization and Analysis (LAVA) and the Bromium Management Server. There are still components of an enterprise desktop strategy that aren't accommodated, but vSentry…

Read more »

Technology Roundup: Security and Data Protection

December 11, 2012
By
CloudComputing

There have been quite a few new products announced in the last few months. Some I have received as briefings, others I have researched. These security and data protection products show the changing face of virtualizaiton and cloud.

Read more »

News: Citrix to get Zenier in 2013: Acquires MDM Specialist Zenprise

December 7, 2012
By
zenpriselogo

Citrix yesterday announced it has entered into a definitive agreement to acquire Zenprise, a leading innovator in mobile device management (MDM).

Read more »

12 Step Program to Enter the Cloud

December 6, 2012
By
VirtualizationSecurity

On the 11/29 Virtualization Security Podcast Omar Khawaja the global managing principle at Verizon Terremark Security Solutions joined us to discuss Verizon's 12 step program for entering the cloud. This 12 step program concentrates on the IT and Security admins working together with the business to identify all types of data that could be placed…

Read more »

Information Superhighway

November 30, 2012
By
CloudComputing

I can remember back in the day when we connected to the Internet via a modem and were charged by the minute while accessing the “Information Superhighway”. Now, the Internet and really, the network it runs on, has pretty much become invisible to the naked eye. Just as we expect the lights to turn on…

Read more »

Featured Solutions