At nearly every conference, we talk about the lowest-hanging fruit of virtualization security, but we often miss the discussion about the lowest-hanging fruit of cloud security. They are not the same. Are we talking about good SSL hygiene? That is a part of it, but there is something even more basic than that. John Dickson, …
TVP Strategy Archives
A Tale of Two Clouds
Recently I have had the pleasure of discussing security with a number of cloud providers. Specifically, we talked about what security they implement and how they inform their tenants of security-related issues. In other words, do they provide transparency? I have come to an early conclusion that there are two types of clouds out there: …
Upgrade to the Clouds
Quite a few upgrades and new products have come out over the last few months. Some have forced many people to rethink their stance toward the cloud, management of resources, and technologies involved. For many, upgrades should upgrade but not change major functionality (or at least the way they use the upgraded tool). When this …
The Cloud: Looking Forward
It is the day after Thanksgiving in the United States, and as technologists, we have quite a bit for which to be thankful, as we live in interesting times. We live between the computing that was (mainframes, PCs, etc.) and the computing of tomorrow (fully functioning cloud). We live within a hybrid world. We are …
SDDC Security Tools of the Future
The software-defined data center (SDDC) requires a new breed of security tools that not only handle the velocity of data being generated within a secure hybrid cloud but also handle the volume and variety of data. In fact, this new breed of security tools uses big data backends to manage the data being received, though …
Network Virtualization: Not Just for the Service Provider
Many network virtualization products appear to be aimed at the top 10,000 customers worldwide, accounting for their price as well as their published product direction. While this is a limited and myopic view, many claim it is for the best, their reason being that network virtualization is only really needed by the very large networks. The more I think about this approach, the more I believe it is incorrect. Let us be frank here. Most networking today, within many different organizational sizes, is a hodgepodge of technologies designed to solve the same problem(s) over and over: how to get data quickly from point A to point B with minimum disruption to service.