Desktop Lifecycle Managment and what Novell has to offer

Mainstream virtual desktop solutions have focused their efforts on providing the best platform for hosting virtual desktop environments. Hypervisors, image management, and connection brokers are the top feature sets that companies have looked at during their comparisons. Moving up the stack, these vendors are now focusing on user personalization management, but do not have what is considered to be a full desktop management solution. So are our end-to-end virtual desktop solutions really complete?

Threat Analysis: Layers upon layers

When we think of the threat to a virtual environment or the cloud, what do we think about? First it is important to understand how the cloud is layered ontop of the virtual environment. Given a cloud stack, where are the entry points for SaaS, PaaS, IaaS, and Cloud management? At the recent Minneapolis VMUG I attempted to relay that information to the attendees. Once we understood the layers we could then concentrate on the threat vectors to the cloud and virtual environment.

IT as a Service Reference Architecture

Implementing IT as a Service requires a virtualization platform, and virtualization aware configuration and change management, secure multi-tenancy, provisioning and lifecycle management, orchestration and automation, and service catalog. These capabilities are available from VMware, DynamicOps, Embotics, Eucaplyptus, ManageIQ, newScale, Quest, rPath and Reflex Systems.

VMware Discusses vShield Zones and Secure Multi-Tenancy

The Virtualization Security Podcast on 8/5 was all about VMware vShield Zones and how the currently beta version will provide defense in depth, be a lever to achieve Secure Multi-Tenancy, and its impact on the virtualization security echo system. Dean Coza, Director of Product Management for Security Products at VMware joined us to discuss the vShield Zones Beta which consists of 3 parts given names and a nameless third part that was hinted at and we shall see more about at VMworld.

Safe way to Encrypt within a VM – Need for Technology

Encryption is important, encryption within a VM even more important. But the question is how to do this securely without allowing the encryption keys to be seen by an administrator of the virtual environment and that supports vMotion or LiveMigration. The solution is per VM encrypted memory, but something more robust that makes use of hardware, out of band key exchange, and supports vMotion or LiveMigration.

Virtualization Backup Security still Missing the Mark

During the Virtualization Security Podcast on 7/8, Vizioncore’s Thomas Bryant joined us to discuss the state of virtualization backup security and forensic use of such backups. In the world of virtualization, backups are performed mostly by 4 distinct vendors: VMware Data Recovery (VDR) and VMware Consolidated Backup (VCB), Vizioncore vRanger, Veeam, and PHD Virtual Backup for vSphere. Each of these provide the most basic of security capabilities:

* Encrypted tunnels for data movement (SSL)
* Encryption of the backup

But in the increasing global nature of businesses and the difference in privacy laws between townships, states, and the need for Secure Multi-Tenancy, backup companies fall short with their products while making it increasing harder to use backups as a source of forensically sound data.