Too many times, virtualization and cloud security folks hear that VM Escape is the main worry of security teams. This is far harder to do than most people realize, and requires the attacker to bust through multiple layers of defense in depth! If security teams are worried about VM Escape, then they really do not …
TVP Strategy Archives
Comparison: IT as a Service Event Management
Part of any IT management platform is the handling of events, whether that is aggregating external events, creating its own events, or passing those events on to others. There seems to be a common set of criteria for those events. So, let us look into these common criteria for handling events and compare some of the vendors …
Continue reading “Comparison: IT as a Service Event Management”
Security: What to Do Before and After
Recently, we recorded two virtualization and cloud security podcasts. These podcasts covered what to do after Black Friday and, more recently, what to do before the holiday break. What do you do before and after events? While targeted to specific events, the actionable advice is valid for all events that impact your business. Above all, …
2016–2017 Hypervisor Cost Comparison
Although it is becoming less interesting over time, the hypervisor is still the cornerstone of the modern data center. As we enter the age of the hybrid cloud, that data center is stretching into the cloud. With the rise of containers, we are seeing clouds move to bare metal once more. While this works for …
Comparison – Hybrid Cloud Data Protection – Mechanisms
This is the first of many comparisons and commentaries on data protection within the hybrid cloud. We are looking at the mechanisms used to achieve data protection. Mechanisms—how boring—yet from an architectural and data management view, mechanisms become increasingly important. The mechanisms available can impact the costs of your data protection. One example: it is often …
Continue reading “Comparison – Hybrid Cloud Data Protection – Mechanisms”
Common Product Security Questions
When investigating the security of various products used on-site, in the cloud, or for clouds, I tend to ask the same set of questions. These focus on identity, compliance, logging, and the like. Specifically, I want to know how the product will integrate with security policy and requirements, as well as with other tools and …