Recently when I was in Las Vegas for HP Discover1 I realized that the Venetian/Palazzo complex is really a cloud: Vegas as a Service. IT could learn a lot from Las Vegas, actually; I think that each hotel complex is a private cloud, and that taken together the strip is one big cloud. Granted it is a cloud that has a single purpose, but has all the earmarks of a good cloud.
Continue reading Vegas as a Service
I recently read the book Project Phoenix by Gene Kim, Kevin Behr, and George Spafford. If you are in development, IT, or security it should be #1 on your reading list. In this book the authors discuss all the horrors we hear about in IT with a clear direction on how to fix them. There is politics, shadow IT, overzealous security professionals, overworked critical employees, lots of finger pointing. But there is a clear solution, at least as far as the story goes. We also know that DevOps works, most of the time. Continue reading DevOps and Security
On the May 30th Virtualization Security Podcast, Shaun Donaldson, Director of Alliances at Bitdefender Enterprise, joined us to discuss end user computing (EUC) security and how their new Gravity Zone product ties their enterprise products together under one scalable management umbrella. We had a very interesting conversation on the subject of EUC security, Bring Your Own Device (BYOD) security, and all aspects of the the EUC stack. There are quite a few moving pieces in the EUC stack. It is greater than your mobile device and the system it is accessing; there is a complete networking and political stack between the two, and perhaps many systems you have to jump through to access your data. Continue reading EUC Security: Much More Than VDI
As you know we have a cloud presence; we have had one for several months. Now we are evaluating the cloud to determine whether to maintain that cloud presence or move back to our local data center. We also documented some early teething problems within this cloud presence. What should be our evaluation the cloud criteria? Now that our data center is moved and fully functional, should we keep our cloud presence? Continue reading Evaluating the Cloud: Keeping your Cloud Presence
By far, the lowest hanging fruit of virtualization and cloud environment security is the segregation of your management control from your workloads. Separation of data and control planes has been recommended for everything from storage (EMC ViPR) up to the workloads running within virtual machines. The same holds true for cloud and virtual environment management tools, tasks, and functions. Up to now there have been very few choices in how such segregation could be implemented. They have been limited to using properly placed firewalls or to using some form of proxy, and the only proxy available was HyTrust. But this has changed. There are some other tools that will help with this segregation of data from control; do they give the level of auditing we require to solve the delegate user problem? Continue reading Delegate User Problem and Proxies
In a recent set of announcements, the virtualization backup and data protection companies have announced support for tape. Tape has always been supported indirectly by virtualization backup companies such as Veeam, Quantum, and PhD Virtual as well as directly by Symantec, HP, CommVault, etc. It is interesting to note that there is a convergence on tape support using two distinct methods. The first is to add support for tape libraries directly into their products: Veeam. The second is to add tape support by better integration with their existing product suite: Quantum. Even so, we know that tape still reigns for storing of large amounts of data. We just cannot seem to be rid of it, nor do I think we ever will be. Continue reading Virtualization Backup: Tape Still Around