Testing within the Virtual Environment

DataCenterVirtualizationThere has long been a debate about testing products within a virtual environment. Not just on how, but the why as well as the what to test. There are limits in some EULA’s as well on the reporting of such testing.  This was the subject of the 7/25 Virtualization Security Podcast (#112 – Virtualization Security Roundtable) held Live from NSS Labs in Austin, TX.  Where we delved into the issues of testing within a virtual environment. While the discussion was about security products, it is fairly straight forward to apply the concepts to other products within the virtual environment. Continue reading Testing within the Virtual Environment

The Benefits of Virtualizing Networking and Storage

DataCenterVirtualizationVMware, Microsoft, Red Hat, and Citrix have all successfully virtualized CPU and memory in their respective hypervisors. VMware is building a Software Defined Data Center with the intention of virtualizing networking and storage as well. Perhaps it is time to take a step back and think about what exactly it means to virtualize these various resources, and what benefits come from the virtualization of each one. Continue reading The Benefits of Virtualizing Networking and Storage

Checking Out The Possibilities Of A Storage Cloud Platform With Atmos and Panzura

Checking out the possibilities of a storage cloud platform with Atmos and Panzura:  The advancement, acceptance, and continued growth in use of the public cloud storage and backup services gives us, the end users, options and capabilities that we just did not have available to us before the birth of the cloud.  How many times have we used services like Dropbox to move, share, or store some form of data that we might been working on. Having this kind of capability helps to make our lives easier, but it is also a nightmare for corporate security folks whose job is to protect and secure the corporate data.  Continue reading Checking Out The Possibilities Of A Storage Cloud Platform With Atmos and Panzura

Three Things To Consider About Virtual Storage Appliances

StorageNetworkingMany people seem to think that in this brave new world of converged infrastructure and software-defined everything, the era of standalone storage and networking is coming to an end. Indeed, it’s becoming quite popular to think differently about storage. There are new types of clustered and distributed storage options, like Ceph and Gluster, that rethink the way storage is delivered and built. There are virtual storage appliances (VSAs), like the HP StoreVirtual VSA and NexentaVSA, that essentially replicate standalone hardware in a virtual machine. There are also hybrid approaches, where companies like Nutanix, Scale Computing, and Simplivity deliver a clustered file system that’s tightly integrated, via virtual machine, with their products. Continue reading Three Things To Consider About Virtual Storage Appliances

How to Prevent Agile Initiatives from Failing

agilecloudIn my previous post I highlighted a number of patterns that lead to failures of agile initiatives. The post generated a lot of conversation and a few comments, so instead of responding to everyone individually I will address all of the questions and comments in this post. Let’s look at each fail pattern and discuss strategies to prevent agile from failing. Continue reading How to Prevent Agile Initiatives from Failing

Big Data Security

CloudComputingAt the recent Misti Big Data Security conference many forms of securing big data were discussed from encrypting the entire big data pool to just encrypting the critical bits of data within the pool.  On several of the talks there was general discussion on securing Hadoop as well as access to the pool of data. These security measures include RBAC, encryption of data in motion between hadoop nodes as well as tokenization or encryption on ingest of data. What was missing was greater control of who can access specific data once that data was in the pool. How could role based access controls by datum be put into effect? Is such protection too expensive given the time critical nature of analytics or are there other ways to implement datum security? Continue reading Big Data Security