VLANs/FCoE/CNA – Mixed Security Data on One Wire

Over the past year or so I have been thinking pretty heavily about the direction networking is taking within virtualization. In some ways, it appears security has been forgotten or relegated to ‘encrypt’ and forget. However, it takes quite a bit of knowledge and time to properly set up the backbone of an ‘encrypt’ and forget approach to network security, so it does not happen. Instead, we have a proliferation of technologies being used to cut down on cable clutter and thereby consolidate the network. These are all very important concepts. Security practitioners like myself realize that this type of consolidation WILL happen. So what tools are required to either ‘encrypt and forget’ or to protect these consolidated networks?

News: Systancia launches AppliDis Fusion 4

Systancia announce the launch of AppliDis Fusion 4, their first solution that incorporates both application and desktop virtualisation in a single product with management through a single web console. AppliDis Fusion 4 joins solutions such as Ericom’s Powerterm Webconnect and Quest Provision’s vWorkspace to offer solution that gives simplified management of typical agile workspace solution that encompasses both presentation, application and desktop virtualisation to deliver dynamic and scalable services to users.

User Installed Applications – Dream or Nightmare?

A corporate desktop application installation is far from the consumer experience of adding an application to say your iPhone. What is the impact of enabling User Installed Applications in a virtualised environment – is it a compliance nightmare.

Intrusion Protection and Detection within the Virtual Environment

Intrusion Protection Systems (IPS) differ quite a bit from Intrusion Detection Systems (IDS). An IPS is designed to modify some form of security setting when an intrusion is detected, thereby preventing the intrusion from being successful. An IDS on the other hand is just the detection component used by an IPS. Like all security tools used within a virtual environment there are four major ways to implement such devices. We will discuss later some best practices for managing a security tool. We will look at what is currently shipping over products hinted at for the future such as the OpenVSwitch, Xen Instropection API.

Desired End State for the Next Generation Desktop

Enterprises and mid-sized businesses (SME’s) face two significant challenges and opportunities with respect to the end user desktops in the next two years. The first opportunity and challenge is how to replace the aging Windows XP installed base with the recently released Windows 7 platform. The second is how to end up with a desktop environment that is inherently more flexible and manageable than what is in place today.