Virtualization Security

Virtualization Security focuses upon end-to-end security, integrity, auditability, and regulatory compliance for virtualization and clouds. Virtualization Security starts where the cloud and virtual environments begin: the end user computing device. (Read More)

We follow the user through the virtual and cloud stacks until they reach the application the user wishes to use to retrieve the data that is important to them. Virtualization and cloud security is implemented where there is an intersection between user, data, and application while maintain strict control of management interfaces. As such virtualization security looks into all aspects of security devices, tools, controls, and guides that impact or can be used to secure virtual and cloud environments.

Public Cloud Reality: Application Security is in your Hands

VirtualizationSecurityWe recently moved workloads to the public cloud and the public cloud reality does not match the hype, nor does it match the application security requirements of a small or even large organization. There are two sides to the public cloud security discussion, the one that covers management access and the other that covers application security. For the former, you must trust the cloud, however for the later, you basically get the security you bring to the cloud. The public cloud reality is that you do not magically gain application security when using a cloud. Continue reading Public Cloud Reality: Application Security is in your Hands

Public Cloud Reality is Much Different than the Hype

CloudComputingThe Virtualization Practice recently moved their systems to the Cloud, being cost conscious we chose one of the public clouds to use. The reality of such a move is much different than the hype. We expected stellar support, better performance, improved security, improved DR, and 5 9s uptime, and the hypervisor is a commodity. In essence, it should be better than we could do ourselves. That is the promise of the cloud; the hype of the cloud. What we have seen is something far different. Continue reading Public Cloud Reality is Much Different than the Hype

VMware’s Fourth Quarter and 2012 Financial Results

VMware100x30VMware has announced financial results for the fourth quarter of 2012 and for the entire year of 2012. Fourth quarter revenue came in at $1.29B growing 22% over the fourth quarter of 2011. Full year revenue came in at $4.61B also growing 22% over 2011. The full results are detailed in the table below:

Continue reading VMware’s Fourth Quarter and 2012 Financial Results

Security Automation = Good Security Practice

VirtualizationSecurityAs I shoveled even more snow, I was starting to think about automation, as in how could I get something to shovel the snow for me, which lead to thinking about automation within the cloud. I see lots of discussion about automation in the cloud. Many of my friends and colleagues are developing code using Puppet, Chef, vCenter Orchestrator, etc. This development is about producing the software defined datacenter (SDDC). However, I see very little in the way of security automation associated with SDDC. Continue reading Security Automation = Good Security Practice

News: ProjectVRC Releases New White Paper about Impact of Antivirus on VDI

www.projectvrc.comProject Virtual Reality Check (ProjectVRC) have finally released their ‘Phase V’ white paper which provides an independent insight into the impact and best practices of various antivirus (AV) solutions on VDI performance. Continue reading News: ProjectVRC Releases New White Paper about Impact of Antivirus on VDI

Virtualizing Business Critical Applications – Integrity & Confidentiality

VirtualizationSecurityRecently I discussed Virtualizing Business Critical Applications and security, which includes availability, confidentiality, and integrity. However, that discussion was more about visibility into the environment for security operations. I purposely left off the discussion of gaining integrity and confidentiality of the data housed within those business critical applications.   Security encompasses a great number of technologies, and those that provide integrity and confidentiality often differ from those that provide visibility into an environment which differ from those that provide availability. Continue reading Virtualizing Business Critical Applications – Integrity & Confidentiality