Every year, VMware has new product and strategy announcements that steal the show at VMworld, so vendors tend to make their own announcements in the two weeks leading up to the conference. This year is no different, with nearly all vendors in the virtualization space announcing and readying their latest wares for the 25,000+ people who attend. Let’s look at the bigger themes in play this year and think about how to differentiate the competition at VMworld 2014.
It is that time of the year again when we make our annual pilgrimage to San Francisco’s Moscone Center for VMworld. I am looking forward to talking with all the friends and colleagues I only see in person once a year. This time around, VMworld will be a little different for me in that I will be one of the Tech Field Day delegates on Monday and Wednesday. Each year before the conference, I like to share some tips on surviving the show and offer some thoughts on what I believe will be the up-and-coming tech to look out for.
It is that time of year again, when we see all the new toys, tools, ideas, and processes that make up the show called VMworld. This year, quite a few changes in virtualization security will be discussed by VMware and other organizations that work with virtual and cloud environments. One of the key messages will be that everyone needs to stop treating virtualization security as something unique and different. Instead of this type of treatment, we have been seeing the extension of existing tools and techniques into virtual and cloud environments. Virtualization and cloud security is a natural progression of all organizational security.
Continue reading Virtualization Security at VMworld
Come on, let’s get real here. The software-defined data center may become the norm in two years in the gilded cages of Silicon Valley, North Carolina’s Research Triangle, and the other “centers of excellence” out there. But in the real world—you know, the one where companies are still using NT4 servers to deliver real and useful work—surely this is not the case. Continue reading Will the SDDC Be the Norm in Two Years?
As your software-defined data center (SDDC) grows, so does the quantity of privileged accounts. This was the discussion on the Virtualization Security Podcast of February 13, 2014, where we were joined by Thycotic Software. Privileged accounts are used by administrators and others to fix issues, set up new users, add new workloads, move workloads around your SDDC, harden those workloads, and perhaps even log in to just pull down logs for further use. The list of reasons to use privileged accounts is as endless as your system administrator’s stack of work. Yet today, almost always, access to these accounts is made by those who know the password. Continue reading Privileged Accounts within SDDC
Many network virtualization products appear to be aimed at the top 10,000 customers worldwide, accounting for their price as well as their published product direction. While this is a limited and myopic view, many claim it is for the best, their reason being that network virtualization is only really needed by the very large networks. The more I think about this approach, the more I believe it is incorrect. Let us be frank here. Most networking today, within many different organizational sizes, is a hodgepodge of technologies designed to solve the same problem(s) over and over: how to get data quickly from point A to point B with minimum disruption to service. Continue reading Network Virtualization: Not Just for the Service Provider