Edward L. Haletky, the President, CEO, and principle consultant for AstroArch Consulting, Inc., graduated from Purdue University in 1988 with a degree in Aeronautical and Astronautical Engineering. Since then, he has worked with programming graphics and other lower-level libraries on various UNIX platforms. When at Hewlett-Packard, Edward worked in the Virtualization, Linux, and High-Performance Technical …
Search results for: vmware
Papers, Publications, and Presentations
Presentations 2018: InfoSec World (Impact of Scale on Security), Tech Field Day Austin, Dallas VMUG, VMworld vBrownbag Tech Talks (Security 201, Data Flow Through the Hypervisor and Beyond) 2017: DELL EMC World vBrownbag Sessions, VMworld Opening Acts, VMworld SER1361BU, VMworld vBrownbag Tech Talks (Hacking Public Speaking) December 4, 2016, LISA16, Hybrid Cloud Reference Architectures Workshop …
Books
To purchase any of these books, and others, please visit the Virtualization Bookshelf, if you have any questions please contact us VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers, Feb 2011, Copyright 2011 Pearson Education. VMware vSphere(TM) and Virtual Infrastructure Security: Securing the Virtual Environment, July 2009, Copyright 2008 Pearson Education. …
Security Products
Our Security Product Portfolio follows, contact us with any questions: SecureESX Virtual and Cloud Environment: SecureESX
Virtualization & Cloud Products
Our Virtualization and Cloud Product Portfolio follows, contact us with any questions: SecureESX Problem Solving and Root Cause Analysis Best Practices Healthcheck Implementation In-Depth Training Virtualization and Cloud Architecture and Design Review of Existing Documentation Writing of New Documentation
TPM/TXT Redux
On the third Virtualization Security Podcast of 2011 we were joined by Charlton Barreto of Intel to further discuss the possibility of using TPM/TXT to enhance security within the virtual and cloud environments. We are not there yet, but we discussed in depth the issues with bringing hardware based integrity and confidentiality up further into the virtualized layers of the cloud. TPM and TXT currently provide the following per host security: