One year after announcing that he and XenSource co-founder Ian Pratt were leaving Citrix to launch Bromium with former Pheonix Technologies CTO Gaurav Banga; Simon Crosby was back at the GigaOM Structure conference in San Francisco today to unveil Bromium’s micro-virtualization technology together with its plans to transform enterprise endpoint security. Bromium, despite the occasional blog post calling into question the security limitations of current desktop virtualization solutions and despite today’s announcement of the Bromium Microvisor, has very little to do with desktop virtualization. Desktop virtualization whether it be VDI, or IDV or anything in between, is a management technology, a means of getting an appropriately specified endpoint configuration in front of the user. Bromium has set itself a bigger challenge, one that is applicable to every endpoint and every operating system – the extension of the precepts of trustworthy computing to mainstream operating systems.
Articles Tagged with Hypervisor
Toronto based start-up Gridcentric, is developing a technology that it refers to as Virtual Memory Streaming that has the potential to reshape the economics of VDI, and deliver the holy Grail of a VDI desktop for less than the price of a PC. It should come as no surprise to hear that the single biggest performance challenge that all large VDI environments face is the boot storm. The Windows boot and logon processes generate many times more IOPS traffic than steady-state user operations. So much so that in poorly specified systems a boot storm will overload the storage infrastructure, starving Windows of resources and leading to excessively long start-up times.
During the Virtual Thoughts podcast on 6/29/2010, the analysts discussed various hardware aspects of virtualization trying to determine if the hypervisor was to move into the hardware? and if so how much of it? as well as whose hypervisor? and lastly such a move part of any business model?
Virtual Thoughts is a monthly podcast that looks at the entire scope of virtualization to discuss new trends and thoughts within the virtualization and cloud communities.
Like all good remakes this is best served cold. After an hiatus of several months The Virutalization Practice are pleased to bring back to life the Virtual Thoughts podcast. The subject for the first program is as follows:-
Is the Hypervisor being pushed into hardware, why/why not?
So add the time and date into your calendar and join the Analysts of the The Virtualization Practice for an hour of thoughts and maybe even a little bit of insight into the dark arts that is the virtualisation world
That is Tuesday the 29th June 2010 @ 7:00pm (BST)that is 2:00pm EST and 11:00am PST
Hope to see you there!
During the last Virtualization Security Podcast, our guest had to postpone so we discussed to several interesting topics all related to Digital Forensics and how encryption would best work within the virtual environment. Our very own Michael Berman, in a previous life, was a forensic investigator and had some great insights into the problem of digital forensic within the virtual environment.
We discussed forensic from the perspective of evidence necessary for the court of law. In other words, forensically sound data acquisition prepared for forensic analysis. This is the an interesting aspect of virtualization. Some of which I have discussed before.
Out of this discussion came some fairly straight forward advice that many may find difficult to perform due entirely to the additional cost and requirements:
- Have a Written Incident Response Policy and Procedure
Microsoft’s announcement yesterday of Massachusetts based Sentillion extends its reach into healthcare solutions and added a new component to its virtualization portfolio. Sentillion’s vThere is a type-2 hypervisor (hosted virtual machine) built on Parallels virtualization whose strength is in its ability to provide a highly secured desktop image on a normally non-secured solution.
Hosted virtual desktops such as Microsoft Virtual PC and VMware Workstation offer great features and flexibility for providing localized virtual desktops but have not been able to provide the level of security on the virtual disk images themselves to make them suitable for more that development and test environments.