End-To-End Virtual Environment Security

Have you ever wondered how all the virtualization security tools fit together? Wait no longer as we have a new White Paper that will tell you this information. How do products from Altor Networks, Catbird Security, Reflex Systems, HyTrust, Tripwire, and others fit within your virtual environment?

The End-to-End Virtual Environment Security white paper is a living document that will change as the market space changes. One thing that has changed recently (last month) was the decision from Tripwire to drop their vWire product which was very useful for diagnostics and possible early detection of issues even so diagnostics of this nature did not jive with the security and compliance direction of the company.

Many diagnostic tools can be used for virtualizaiton security however, this is mainly a “off label” use of a given tool. There are very few true virtualization security tools, and this white paper fits them within your virtual environment.

[dm]41[/dm]

Share this Article:

The following two tabs change content below.
Edward Haletky
Edward L. Haletky, aka Texiwill, is the author of VMware vSphere(TM) and Virtual Infrastructure Security: Securing the Virtual Environment as well as VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers, 2nd Edition. Edward owns AstroArch Consulting, Inc., providing virtualization, security, network consulting and development and The Virtualization Practice where he is also an Analyst. Edward is the Moderator and Host of the Virtualization Security Podcast as well as a guru and moderator for the VMware Communities Forums, providing answers to security and configuration questions. Edward is working on new books on Virtualization. [All Papers/Publications...]
Edward Haletky

Latest posts by Edward Haletky (see all)

Related Posts:

Leave a Reply

4 Comments on "End-To-End Virtual Environment Security"


Sort by:   newest | oldest | most voted
trackback

[…] This post was mentioned on Twitter by Stephanie Mode, InsideAxis . InsideAxis said: End-To-End Virtual Environment Security | The Virtualization Practice: Have you ever wondered how all the virtuali… http://bit.ly/5s9igM […]

trackback
End-To-End Virtual Environment Security | The Virtualization Practice | VirtualizationDir - Top Virtualization Providers, News and Resources
6 years 8 months ago

[…] the rest here: End-To-End Virtual Environment Security | The Virtualization Practice Plurk This Post Delicious Digg This Post MySpace Ping This Post Reddit This Post […]

Member
versace
6 years 8 months ago

An e2e virtual security environment my address data requirements, or the ability to apply data assurance policies and related practices/technologies as data moves from the client, through networks, databases, applications and infrastructure. Some of the technology options are encryption and key management, aliasing, bit splicing, data disbursal, de-identification, others.

I’d also like to see a TCO component added to the e2e paper. For example, how would an end user determine the cost and value of virtual security integrations? Maybe a model with a few examples?

Thanks

trackback

[…] a Cloud deployment.VideoSlidesI don’t have the slides specifically, however, they can be found here.Tagged as: BrownBag, cloud, recording, security, texiwill […]

wpDiscuz