In supporting increasing needs for agility in a world driven by the increasing consumerization of IT (CoIT), desktop transformation can no longer be seen as an infrequent process. To quickly deliver change, you need to best understand what the impact of that change is. Auditing should be continuous as seasonal or limited use applications that may be missed through manual processes will be identified and flagged as they occur. Centrix look to assist with the latest release of Workspace IQ which includes Management Reporting, Business Group Reporting, Integration with License Dashboard and Windows 7 hardware compatibility assessment.
The 3/22 Virtualization Security Podcast brought to light the capabilities of Symantec Critical System Protection (CSP) software. This software successfully implements a manageable version of mandatory access control policies based on role-based and multi-level security functionality within the virtual environment. More specifically on those systems that are critical to the well being and health of your virtual and cloud environments such as all your management and control-plane tools (VMware vCenter, Microsoft SCVVM, XenConsole, etc.). In addition, Symantec CSP will monitor your virtualization hosts for common security issues. This in itself is great news but why are we just hearing about this now? Is this a replacement for other security tools?
There has been a lot of buzz and coverage about Windows 8 since its consumer preview. There will be some very cool features with this release and one feature that really stands out with me is that Microsoft added an additional supported processor type in that Windows 8 will run on Intel, AMD and now ARM based processors. That gives Windows 8 the ability to run on desktops as well as mobile phones and tablets.
One of the areas where VMware vSphere has had a large advantage over Microsoft Hyper-V has been in the architecture and capabilities of the VMware vSphere Virtual Switch. The most important of these capabilities has been the ability to designate one or more ports on the switch as promiscuous or mirror ports. These ports make a read only copy of all of the data flowing through the switch available to whatever virtual machine is sitting on that port. This is an essential capability for many security products and also performance management solutions like those from ExtraHop Networks that rely upon deep packet inspection to work.
Virtualizing Presentation Virtualization Workloads is increasingly seen as beneficial and more acceptable. As Citrix XenApp customers move into 2013 it is likely they’ll move more physical instances to virtual. To enhance RDS VM workloads with shared storage – Atlantis release ILIO for XenApp, the first solution designed specifically to accelerate provisioning, boot time and application response time
Numecent believe Cloudpaging has the potential to impact all connected devices where software needs to be delivered rapidly and securely. Cloudpaging isn;t just a fancy marketing term for a re-branded application virtualisation. Numecent have delivered a new application delivery technology that is poised to open up a new application delivery mechanism not only for enterprises, but for both ISVs and MSPs.