Virtualization Security

Virtualization Security focuses upon end-to-end security, integrity, auditability, and regulatory compliance for virtualization and clouds. Virtualization Security starts where the cloud and virtual environments begin: the end user computing device. (Read More)

We follow the user through the virtual and cloud stacks until they reach the application the user wishes to use to retrieve the data that is important to them. Virtualization and cloud security is implemented where there is an intersection between user, data, and application while maintain strict control of management interfaces. As such virtualization security looks into all aspects of security devices, tools, controls, and guides that impact or can be used to secure virtual and cloud environments.

RSA Conference: What was Interesting

RSA Conference: What was InterestingRSA Conference: What was InterestingAs I met with people at RSA Conference last week, the common question was: What was interesting and new? My view was from the world of virtualization and cloud security, which often differs from general or mobile security. This show was more about general and mobile security than it was about virtualization and cloud security due to the confluence of VMware Partner Exchange (PEX) and RSA Conference. There were quite a few things that were new from the show floor, RSA Innovation Sandbox, and other conversations. Continue reading RSA Conference: What was Interesting

News: Sky High Networks provides Cloud Service Security Ratings

CloudComputingThere has been a dearth of intelligence reporting on cloud services and up until now we had to rely upon the Verizon Breach Report, Alert Logic’s State of the Cloud report, the Enisa and other reports, but even so there was nothing specifically about a given cloud service outside the lightly used Cloud Security Alliances STAR self-certification. Instead you must imply something about a given service. This has changed. Meeting this need is Sky High Networks. Continue reading News: Sky High Networks provides Cloud Service Security Ratings

IT Automation: Where Is the Center?

ITasaServiceWhere is the center of IT Automation today? The network is the nerve center, the workloads are the brains, and the normal storage, compute, and memory are the other internal organs. The heart of our IT machine is often a management tool such as VMware vCenter, System Center, or something else entirely, but should our IT automation live within the heart when the heart only controls virtual and some physical components, or should IT automation be tied to the nervous system that crosses boundaries?
Continue reading IT Automation: Where Is the Center?

Building a Management Stack for Your Software-Defined Data Center

SDDC.Management.Stack.Reference.ArchitectureData Center Virtualization has spawned several entirely new categories and variants of management software. This is largely because data center virtualization alone was a large enough change to create new requirements that legacy management products could not meet. This created a new constituency for management solutions—the virtualization team—which proceeded to purchase management solutions that met their needs. This trend was facilitated by the “easy to try and easy to buy” business model that many of the new vendors of virtualization management solutions adopted. Out of this a new management software industry arose. Continue reading Building a Management Stack for Your Software-Defined Data Center

Public Cloud Reality: Application Security is in your Hands

VirtualizationSecurityWe recently moved workloads to the public cloud and the public cloud reality does not match the hype, nor does it match the application security requirements of a small or even large organization. There are two sides to the public cloud security discussion, the one that covers management access and the other that covers application security. For the former, you must trust the cloud, however for the later, you basically get the security you bring to the cloud. The public cloud reality is that you do not magically gain application security when using a cloud. Continue reading Public Cloud Reality: Application Security is in your Hands

Public Cloud Reality is Much Different than the Hype

CloudComputingThe Virtualization Practice recently moved their systems to the Cloud, being cost conscious we chose one of the public clouds to use. The reality of such a move is much different than the hype. We expected stellar support, better performance, improved security, improved DR, and 5 9s uptime, and the hypervisor is a commodity. In essence, it should be better than we could do ourselves. That is the promise of the cloud; the hype of the cloud. What we have seen is something far different. Continue reading Public Cloud Reality is Much Different than the Hype