Virtualization Monitoring and Analytics Virtualization and cloud computing make datacenters more nimble but also create new complexities. Additional layers of abstraction in datacenters make problem investigation, resolution and avoidance difficult. Datacenter administrators want the ability to link user or application related issues to events happening in the infrastructure tiers. Conversely, they need the ability to … Continue reading Splunk

Microsoft’s Three Pronged Windows Azure Strategy

The combination of Microsoft’s own Azure cloud, Service Provider offered Azure Clouds, and Azure services in Windows Server 2012 creates a formidable Windows Azure strategy. Someone once said that it takes Microsoft three tries to get something right. Well here comes Hyper-V 3 along with Windows Server 2012, and a whole bunch of new Azure services.

Storage Hypervisors: Worth the Hype

Just what are storage hypervisors? There are several companies that claim to have storage hypervisors. Wikipedia states that a hypervisor is “conceptually one level higher than a supervisory program”. We also know that from our normal use of hypervisors that they manage the underlying resources that a guest uses. Do these definitions work for a storage hypervisor?

Defense in Depth: Know Your Attack Surfaces

The 6/28 Virtualization Security Podcast we spoke about attacks, defense in depth, and compliance with Davi Ottenhiemer and Matt Wallace. Davi and Matt just published a book on how to defend your virtual environment against attack. Unlike other books, this approaches the problem from the point of view of well know attacks. It even gives examples of some of the more interesting attacks against any of the virtual environments, not just VMware vSphere. The discussion eventually found its way to even newer attacks and their impact on the environment.

Defense in Depth: Storage Security in a Hybrid Cloud

Storage Security is not only about Encryption, which is just one aspect of Storage Security requirements for the virtual and cloud environments. It is also about increasing defense in depth and knowledge of what is touching your storage environment. As well as providing security around those touch points and to a great extent auditing and protecting the data residing within the storage devices regardless of where the devices live: within the virtual environment or within a cloud.