The 12/13 Virtualization Security Podcast featured George Reese, CTO on enStratus, as our guest panelist. We discussed Cloud API security or more to the point the lack of real cloud API security. To paraphrase George: Some got it, others do not. So what makes up a good cloud API? how can we fix broken cloud APIs? Continue reading Cloud API: In-Security?
It is time to expand the virtual playing field. Since the release of both Hyper-V 2012 and vSphere 5.1, there have been an abundant amount of posts comparing the two hypervisors in a head to head fashion. All the different charts, graphs, and tables point to the fact that when comparing maximum values head to head. This has been the way the two different hypervisors have been compared against each other all along and Microsoft and VMware have gotten to the point where things are pretty much even across the board. It was just a matter of time until we got to this point where Hyper-V catches up with vSphere and now that we have, I believe we need to change the scope of the comparisons beyond the maximum values. After all, how many people actually get anywhere close to those maximums deployed in your production environments? “Just because you can do something, does not mean you should.” Continue reading It Is Time To Expand The Virtual Playing Field
Two things have popped up recently. One is VMware’s full page ad campaign in the Wall Street Journal. The ad states that VMware has saved companies billions of dollars, and promises to save them billions more – through the Software Defined Data Center. The second that has has popped is rumors that Cisco is going to acquire Citrix. Which brings up an interesting question. Is buying Citrix part of Cisco’s reaction to VMware’s Software Defined Data Center (SDDC) strategy? Continue reading Will Cisco Buy Citrix in Reaction to VMware’s SDDC Strategy?
On the 11/29 Virtualization Security Podcast Omar Khawaja the global managing principle at Verizon Terremark Security Solutions joined us to discuss Verizon’s 12 step program for entering the cloud (found on slideshare). This 12 step program concentrates on the IT and Security admins working together with the business to identify all types of data that could be placed into the cloud, and to classify that data. Once this is complete, the next steps are to understand the compliance and security required to protect the data and to access the data. It is a Data Centric approach to moving to the cloud. Continue reading 12 Step Program to Enter the Cloud
VMware’s Cloud Foundry has been festering for the best part of a year now. It smells a little bit of lack of courage, and a lot of lack of focus. The body is still warm, but I fear EMC/VMware may have already snatched defeat from the jaws of victory.
So now we know what Paul Maritz’s real job is going to be. VMware has announced on its Executive Team Blog that they will form a new organization, The Pivotal Initiative, which will collect EMC’s and VMware’s application focused people and assets into one group. This will include the people and the technology assets from EMC’s Greenplum and Pivotal Labs organizations, and the people and technology assets from the VMware vFabric (Spring and Gemfire), Cloud Foundry and Cetas organizations. Continue reading The Pivotal Initiative — EMC and VMware’s Application Strategy