About

Edward L. Haletky, the President, CEO, and principle consultant for AstroArch Consulting, Inc., graduated from Purdue University in 1988 with a degree in Aeronautical and Astronautical Engineering. Since then, he has worked with programming graphics and other lower-level libraries on various UNIX platforms. When at Hewlett-Packard, Edward worked in the Virtualization, Linux, and High-Performance Technical …

Papers, Publications, and Presentations

Presentations 2018: InfoSec World (Impact of Scale on Security), Tech Field Day Austin, Dallas VMUG, VMworld vBrownbag Tech Talks (Security 201, Data Flow Through the Hypervisor and Beyond) 2017: DELL EMC World vBrownbag Sessions, VMworld Opening Acts, VMworld SER1361BU, VMworld vBrownbag Tech Talks (Hacking Public Speaking) December 4, 2016, LISA16, Hybrid Cloud Reference Architectures Workshop …

Books

To purchase any of these books, and others, please visit the Virtualization Bookshelf, if you have any questions please contact us VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers, Feb 2011, Copyright 2011 Pearson Education. VMware vSphere(TM) and Virtual Infrastructure Security: Securing the Virtual Environment, July 2009, Copyright 2008 Pearson Education. …

Security Products

Our Security Product Portfolio follows, contact us with any questions: SecureESX Virtual and Cloud Environment: SecureESX

Virtualization & Cloud Products

Our Virtualization and Cloud Product Portfolio follows, contact us with any questions: SecureESX Problem Solving and Root Cause Analysis Best Practices Healthcheck Implementation In-Depth Training Virtualization and Cloud Architecture and Design Review of Existing Documentation Writing of New Documentation

TPM/TXT Redux

On the third Virtualization Security Podcast of 2011 we were joined by Charlton Barreto of Intel to further discuss the possibility of using TPM/TXT to enhance security within the virtual and cloud environments. We are not there yet, but we discussed in depth the issues with bringing hardware based integrity and confidentiality up further into the virtualized layers of the cloud. TPM and TXT currently provide the following per host security: