The Virtualization Disaster Avoidance & Backup space has change fairly significantly within the last year. These changes are cumulative but have a great impact on the virtualization ecosystem. I include Disaster Avoidance in this review as there have been some great strides made in this arena that could impact the entire environment. Disaster Avoidance technologies were demonstrated at EMC World 2010 as well as at other conferences throughout the year. The impact was quite huge, but there are technological hurdles involved with its deployment within any organization.
Virtualization Backup vendors have pushed the envelope once more targeting fast backup and fast recovery of data as well as ensuring that the backups actually work. Here is a list of this years improvements in this space.
Virtualization Security: Year in Review
My conference schedule kept pace with the changes in the virtualization security ecosystem through out the year. What are those changes? This is the end of year review of the virtualization security ecosystem.
Entry into the Cloud…
In the last Virtualization Security Podcast on 12/16 we had with us James Urquhart who manages cloud computing infrastructure strategy for the Server Provider Systems Unit of Cisco Systems. Author of the popular C|NET Network blog, The Wisdom of Clouds. James shared with us some of his Wisdom over the hour. The discussion covered what is preventing people from Entry into the Cloud and why private and hybrid clouds are going to stick around for quite a while and are not a passing fad. We answered the question of why people are reluctant to enter the cloud.
Blade Physical-Virtual Networking and Virtualization Security
I have been thinking about blades and virtualization security for some time spurred on by a conversation with Brad Hedlund six months ago. Nearly all my customers use Blades and virtualization security is a big concern to them. In my Rethinking vNetwork Security article, I touched on some of the issues in response to Brad’s comments a while back. I would like to now expand that discussion to blades.
There are three sets of blade enclosures I would like to discuss, those that use pass thru networking, those that use standard switching fabric within the enclosures, and those that use flexible interconnects such as HP Flex-10 and Cisco Palo adapters. The last is the so called physical-virtual network device.
PCI DSS 2.0 discussed on The Virtualization Security Podcast
In the last Virtualization Security podcast on 12/2 we had with us members of the PCI DSS Virtualization Special Interest Group (SIG). Kurt Roemer of Citrix and Hemma Prafullchandra of HyTrust joined us to discuss the differences to the PCI DSS 2.0 with respect to virtualization. In essence, PCI DSS explicitly calls out the need to bring virtualization, people, and processes in scope.
As we discussed in a previous article, the PCI DSS 2.0 does not state exactly what needs to be assessed within the virtual environment, or even what part of the virtual environment is a concern of each aspect of the PCI DSS. What the PCI DSS 2.0 does do is change the language, however subtle, that technologies employing shared resources are now acceptable.
Virtualization Backup: Agent or Agent-less?
Many times we virtualization experts push for backups without the agents as these backups tend to be in our opinion, cleaner and faster. But what if you could get the benefits of your existing backup tools (such as Tivoli) but gain the power and advantages of using all the possibilities within the virtual environment. For VMware vSphere this is possible using the Pancetera backup tools.