Articles Tagged with Bromium

VirtualizationSecurity

Bromium Is a King Hit to the Anti-Virus Establishment

VirtualizationSecurity

I had the pleasure of speaking with Simon Crosby recently. For those of you who do not recognize the name or are not familiar with XenServer, let me enlighten you. Simon was a co-founder of XenSource (now XenServer), which is a hypervisor that Citrix acquired in order to compete in the VDI (virtual desktop infrastructure) space. He left to become one of the co-founders and the CTO of Bromium, and now I understand why! After you listen to our podcast conversation, so will you.

Read More

End User Computing within the Secure Hybrid Cloud

When we look at the secure hybrid cloud, the entry point to the hybrid cloud is the end user computing device, whether that device is a tablet, smart phone, desktop, laptop, google glass, watch, etc.  We enter our hybrid cloud from this device. From there we spread out to other clouds within our control, clouds outside our control, or to data centers. How these devices authenticate and access the data within these various places within the hybrid cloud becomes a matter of great importance and has been a concentration for many companies. How we protect the data that ends up on the end user computing device is also of great importance.

Read More

RSA Conference: What was Interesting

RSA Conference: What was Interesting

RSA Conference: What was Interesting

RSA Conference: What was InterestingAs I met with people at RSA Conference last week, the common question was: What was interesting and new? My view was from the world of virtualization and cloud security, which often differs from general or mobile security. This show was more about general and mobile security than it was about virtualization and cloud security due to the confluence of VMware Partner Exchange (PEX) and RSA Conference. There were quite a few things that were new from the show floor, RSA Innovation Sandbox, and other conversations.

Read More

VirtualizationSecurity

Security Automation = Good Security Practice

VirtualizationSecurity

As I shoveled even more snow, I was starting to think about automation, as in how could I get something to shovel the snow for me, which lead to thinking about automation within the cloud. I see lots of discussion about automation in the cloud. Many of my friends and colleagues are developing code using Puppet, Chef, vCenter Orchestrator, etc. This development is about producing the software defined datacenter (SDDC). However, I see very little in the way of security automation associated with SDDC.

Read More

VirtualizationSecurity

Cloud Security: On Moats

VirtualizationSecurity

After a recent snowstorm, and due to pending work on our generator, I had to dig out paths to the generator, the propane tank, etc. We normally dig out a few paths for moving wood around our yard, access to oil, the driveway, etc. But when we finished, we dug a moat around our entire house. This got me thinking about cloud security. The ongoing desire to put moats between us and the attackers. But what is us, in the cloud? Can we prevent the attacks? What are the current moat style technologies in play today?

Read More