Last week, there were several major virtualization security announcements, that taken singularly may only apply to the specific products, but taken together show the growth of the virtualization security ecosystem.
- VMware vSphere has attained CC EAL 4+ certification. To view the certificate and completion letter, visit http://www.vmware.com/security/certifications/
- Trend Micro has shipped Deep Security 7.5 with vShield Endpoint support for Anti-Virus. To download visit http://downloadcenter.trendmicro.com/
- HyTrust releases HyTrust Appliance 2.1. For the Press Release visit http://www.hytrust.com/news/press-releases/hytrust-releases-hytrust-appliance-update/
Continue reading Major Virtualization Security Annoucements
For as long as there have been important applications, there have been Application Performance Management tools for monitoring these applications. APM tools have gone through two very distinct paths of evolution. The first path involved tools that really monitored the operating system that the applications ran on, and looked at interactions between the application and the OS in the form of abnormal resource utilization platters to find problems with the operation of the application. These tools were typically application agnostic, and supported every application that ran on the operating system that the tool supported. They therefore offered a great deal of breadth, but were not able to look deeply into applications to find problems within the applications themselves. Continue reading New Relic Rocks the APM as a Service World
When I first got started in virtualization it was a very new technology and during that time there were not that many resources available to the virtualization administrator and sometimes it would have been nice to be able to see what others were doing and to be able to share my thoughts and ideas with others to make sure I was presenting the best possible solution to my customers. During these early years the VMTN Community Forum was established and these forums were the place to do this collaboration. I found this to be one of the best arenas to ask questions and share ideas. The VMTN Community area quickly took off and in a lot of cases was the quickest way to find an answer, solution to your problem or issue you were trying to resolve.
Although the Community Forums were a great place to present and answer questions about virtualization, it would have been better to meet with others in person to be able to talk virtualization shop. Around this time VMware was starting to establish a local user group in the major cities around the United States. During this time I was living in South Florida and thought this would be great to be a part of. I contacted VMware and founded the Miami Area VMware User Group or Miami VMUG. At the first meeting we had about twenty people show up and it really grew from there. Continue reading My Experience with VMUGs
Desktop Virtualization is not an easy undertaking. There – I’ve said it. “But,” you may say, “I take a copy of the desktops I have, I run them on servers in the data-centre. Once that’s done, I don’t need to update those desktop devices; I can update the virtualized workspace instead far more quickly. The desktops are running on server hardware so they will be more reliable. Eventually, someone may well offer to host these workspaces on some infrastructure out in The Cloud”.
“Really, how hard can it be?”
If you are steering your organisations desktop strategy you need to consider that what may seem like a straightforward undertaking can in fact be a much larger and complex task. As with with any obstacle, understanding the size of the problem early gives a greater chance of avoiding it.
Lets consider the hosted desktop iceberg – how complex can a VDI solution be?
Continue reading The Desktop Virtualization Iceberg
The Virtualization Security Podcast on 10/21 was the third in a series of Virtual Desktop Security discussions we are having. The special guest panelist was Chris Mayers of one of the Chief Security Architects for Citrix, the makers of XenServer, XenClient, and the FlexCast solutions. FlexCast provides an all encompassing method to provide virtual desktop and applications that include the following mechanisms:
Let us look at each of these mechanisms in a bit of detail then discuss how they work to provide Security and how to secure them. Continue reading Citrix FlexCast – Interesting Security Considerations