If you ever want to polarize a group of IT professionals, all you need do is drop ITIL into the conversation. For some people ITIL is the devil incarnate. For others it is the Holy Grail–an unattainable symbol of union with the divine.
For VMWare it’s clearly the devil. In his VMworld keynote last month, VMware CEO Pat Gelsinger said that the company is “putting aside ITIL and CMDB in favour of process that works for cloud,” a position that Citrix clearly disagrees with after announcing that it had completed the acquisition of New Zealand-based startup Beetil, which is rapidly making a name for itself with a SaaS-based service management offering that delivers a readily accessible pragmatic approach to ITIL.
I keep asking myself, can any of the current batch of virtualization security products replace my existing virtual firewall setup, I keep on coming back to my modest requirements:
- Network Address Translation
- Port Redirection
- Logging of bad traffic (and filtering)
- Web Proxy
These Edge Firewall requirements push many of the security tools away from me, but then I started thinking what happens to the products if I did not use their firewall technology, what are the benefits and could this actually be done?
So let’s look at each of the virtualization security products and ignore the firewall and networking access control components which are part of their firewall products.What I realized was that the firewall is intrinsic and a major component of each of these tools and while you can disable policy settings, most of the unique functionality of each tool does not work with out it. Even so, what does each give me as a useful tool without the firewall in use? To me this implies that any VMsafe network introspection is not in use.
Configuration Management Databases (CMDB’s) have been a linchpin of the offerings from the enterprise systems management vendors like CA, IBM, BMC and HP. These products have been marketed as the foundation of both the ITIL framework for management processes, and the Business Service Management frameworks offered by these vendors. While these offerings occupy very important parts of the product strategies from the various vendors who offer them, it is also the case that CMDB’s are enormously expensive to purchase and implement – and due to the time required to implement them have a long time to value for the customer. For these reasons, relatively few enterprise customers have implemented CMDB’s.