Virtualizing Business Critical Applications – Security and Compliance

Virtualizing Business Critical Applications is often stopped either by the sudden involvement of security and compliance, a need to better understand, or a need to gain visibility into the underlying security of the virtual environment in order to build new security and compliance models.

End User Computing: Using just a Tablet

Recently I have been trying to lighten my conference going load. To do that, I have been thinking about ways to do without my laptop and all the accessories for it, which got me thinking about what it takes to completely use such a device; to fully embrace the next generation of end-user computing using gesture computing and smaller devices. Other than the technical hurdles, there are also training hurdles as full tablet computing, today, has some serious limitations with respect to security, functionality, and in some ways capability. So how does one embrace tablet computing as their next-gen end user computing?

Bromium release vSentry 1.1: trustworthiness for more desktops in the enterprise?

Bromium have released vSentry 1.1 which will brings Bromium’s benefits of micro-virtualization and hardware based security to a far wider range of enterprise desktops. New features include wider OS Support: Live Attack Visualization and Analysis (LAVA) and the Bromium Management Server. There are still components of an enterprise desktop strategy that aren’t accommodated, but vSentry 1.1 has components that broaden the use cases deploying Bromium’s trustworthy computing service and expand the capabilities for those managing the service.