Dell has joined the the highly competitive and technically diversified single box desktop virtualization market in partnership with Citrix to package VDI-in-a-Box as a virtual appliance. The somewhat awkwardly named Dell “DVS Simplified 1010” appliance is built on the Dell PowerEdge R710 rack server that comes pre-installed with Citrix XenServer 5.6 and VDI-in-a-Box 5.0.
Search results for: vmware
Application Aware Virtualization Backup
While participating in the GestaltIT Virtualization Field Day #2, I was asking Symantec about Application Aware Backups. In other words, could one backup an entire application, regardless of how the application was defined. This concept goes hand in hand with Application Aware Security measures. We can always backup VMs and their data to remote locations, but can we backup or maintain the application interactions within a multi-VM Application regardless of how it is defined.
Wouldn’t It Be Nice To Have … Appliances for All?
I was involved with the design and deployment of a small proof of concept that would introduce virtualization to a local SMB in my area. The idea was to build them something small that they would grow into and at the same time demonstrate all the really cool things that virtualization can bring to the table. I built a couple of hosts and deployed virtual center virtually, as well as added the VMware Management Appliance and the VMware Mobile appliance. It is really fun to get a chance to introduce virtualization to people, it is almost as fun as bringing a child to a candy store. Showing the client what they can do with virtualization as well as what they can do on their iPad is just priceless.
Application Security within the Virtual and Cloud Environments
Virtualization and Cloud Security architects, pundits, and writers like myself often talk about protecting the data within the virtual and cloud environments. However, in order to protect that data we need to be able to determine how the data will be used, accessed, modified, and eventually removed. So, how can we understand data security without understanding the application around it. But there is an even more fundamental problem, how do we define the application and the security measures we should take?
HP Delivers High Performance and Security to Thin Client Line
As Virtual Desktops become standard components of the entire desktop environment there are increasing demands on the end point devices to provide the performance of legacy desktop computers they are replacing. Devices with more memory, faster processors and expandable peripheral device support are quickly replacing the utility devices most associated with thin clients. On Monday February 13, 2012 HP announced the release a new class of thin client devices that are designed to address the end user performance needs and adds security architecture to combat increasing security threats.
When to use a Virtual Firewall
The 2/9 Virtualization Security Podcast was a discussion on when would one use a virtual firewall. This was in response to being told that there are some people that would never use a virtual firewall for anything, and that got me thinking. Outside of the politics involved with using virtual vs physical firewalls, when would you use one? What are the cut offs, and best practices around using virtual firewalls. We were joined by Rob Randell of VMware to discuss this point.