Recently I have been trying to lighten my conference going load. To do that, I have been thinking about ways to do without my laptop and all the accessories for it, which got me thinking about what it takes to completely use such a device; to fully embrace the next generation of end-user computing using gesture computing and smaller devices. Other than the technical hurdles, there are also training hurdles as full tablet computing, today, has some serious limitations with respect to security, functionality, and in some ways capability. So how does one embrace tablet computing as their next-gen end user computing?
VMware (and Microsoft) continue to make excellent progress driving the penetration of their data center virtualization offerings. Over half of the servers run by VMware customers are now virtualized. The progress has been so good that now it is time to ask two important questions. Is what is left to virtualize different that what already has been virtualized? And, if what is left is virtualizing business critical applications, will running them on the virtualization platform be any different than what we experience today? Continue reading Virtualizing Business Critical Applications – The Performance and Capacity Sizing Problem
The 12/13 Virtualization Security Podcast featured George Reese, CTO on enStratus, as our guest panelist. We discussed Cloud API security or more to the point the lack of real cloud API security. To paraphrase George: Some got it, others do not. So what makes up a good cloud API? how can we fix broken cloud APIs? Continue reading Cloud API: In-Security?
Bromium have released vSentry 1.1 which will brings Bromium’s benefits of micro-virtualization and hardware based security to a far wider range of enterprise desktops. This is the release you’ve been waiting for: and if you’ve not been waiting, this is definitely the release to consider.
We’ve spoken before about Bromium when they unveiled their micro-virtualization trustworthy security vision. Bromium’s message and focus was simple “standard workspace security is reactive, not proactive“. Whatever you have in terms of anti-virus or malware detection is only good once a new threat is found, understood, a patch created and deployed. This poses the very important question “what is the impact of the time delay between threat found and threat contained?”. Bromium’s goal was to dramatically reduce that “and”.
You may contest, “ah, but I can solve this workspace threat issue by making physical desktops, virtual desktops”. This is not the case. We evidenced this in Virtual desktops (VDI) are different, but not hugely better in terms of security, than physical desktops. You do not deliver better security by simply virtualizing the desktop.
So what does vSentry v1.1 bring? How is it better than v1? What can this mean for your organisation?
It is time to expand the virtual playing field. Since the release of both Hyper-V 2012 and vSphere 5.1, there have been an abundant amount of posts comparing the two hypervisors in a head to head fashion. All the different charts, graphs, and tables point to the fact that when comparing maximum values head to head. This has been the way the two different hypervisors have been compared against each other all along and Microsoft and VMware have gotten to the point where things are pretty much even across the board. It was just a matter of time until we got to this point where Hyper-V catches up with vSphere and now that we have, I believe we need to change the scope of the comparisons beyond the maximum values. After all, how many people actually get anywhere close to those maximums deployed in your production environments? “Just because you can do something, does not mean you should.” Continue reading It Is Time To Expand The Virtual Playing Field
There have been quite a few new products announced in the last few months. Some I have received as briefings, others I have researched. These security and data protection products show the changing face of virtualization and cloud. Continue reading Technology Roundup: Security and Data Protection