Last week I spoke with two different Security as a Service vendors, each with their own approaches to security as a service. The first company I spoke to was Cloud Passage who just exited stealth mode in time for RSA Conference, and Zscaler who is a well known company. Both provide Security as a Service with a similar approach by a different design. Both make use of large grids or computers to do all the heavy lifting of security, but from there they differ completely. While there is some overlap in the products, the different designs show us multiple ways to implement Security as a Service. Continue reading Security as a Service: Is it Safe?
When VMware announced vCenter Operations, it combined performance management, capacity management, configuration management with self-learning analytics into one product (right now this is achieved by bundling three VMware products, vC OPS, vC CapacityIQ, and vC Configuration Manger, but integration over time will likely reduce three databases and three consoles into one). VMware now joins the ranks of many vendors who can monitor virtual (and through integration adapters – physical) environments, and who provide performance and capacity management features. Continue reading Applications Performance Equals Response Time, not Resource Utilization
Virtual Computer are to optimize their NxTop client virtualization and management solution to operate with select models of Lenovo laptops and desktops PC platforms. For their part, Lenovo will allow customers to have Virtual Computer’s NxTop client loaded onto their custom images, direct from the factory. This announcement was an interesting for organisations considering changing their PC management model to use a client hypervisor. It not only promotes confidence in client hypervisors supporting a wider range of devices, it also demonstrates that device vendors themselves are willing to embrace client hypervisors as a deployment technology. Continue reading Virtual Computer collaborates with Lenovo-NxTop the industry’s best enterprise-class type 1 client hypervisor?
A couple of weeks ago, you could be forgiven for not ever having even heard of webOS, but now after HP CEO Leo Apotheker confirmed that starting in 2012, every HP PC will include the ability to run webOS in addition to Windows, if you profess to having any understanding of mobile platforms you have to profess to have at least some understanding of what webOS is and why it is important. Continue reading HP confirmed webOS will be on all new PCs
70 million individual dollars can buy you a lot of things. A 64 metre long super yacht. The services of an NFL linesman for two years. For $70 million you could entice an English Premier League striker to play for you, but not necessarily score goals. $70 million is 113,000 Apple iPads. If you spent $100 a day, it’d take you nearly 1,950 years to get fritter it away. Yet despite all these glittering prizes and goals, Goldman Sachs chose to invest their $70million in a chunk of AppSense.
Of all the things they could have invested in, why did choose AppSense? If the future is going to be full of cloud services, virtualised desktops, and mobile devices, why spend a not inconsiderable sum on something that sounds the stuff of science fiction?
What is User Virtualization and is it worth a $70 million dollar investment? Why would you need user virtualization? And indeed what makes AppSense stand out?
I just finished reading, yet another Multi-Tenancy Design/Overview that claims to be secure or trusted. While I will agree that this particular design does cover Availability and some GRC (Governance, Regulatory, and Compliance) it is severely lacking in Integrity and Confidentiality. The design even went as far as saying the cloud/virtual administrator requires “COMPLETE VISIBILITY.” I was really taken aback by those words. Why does an administrator need ‘COMPLETE VISIBILITY?’ Which leads me to the question is Integrity and Confidentiality possible within any cloud or virtual environment? Or is it purely based on TRUST?
If so this is an appalling state of virtual and cloud environment security. Continue reading Latest SMT design requires Complete Visibility by Admin! Yikes!