HyTrust has announced Series B Financing in the amount of $10.5 Million with participation from Cisco, Granite Ventures as well as existing investors Trident Capital and Epic Ventures. This is very good news for HyTrust. While the Series B Funding was not much of a surprise given that HyTrust fits into the Virtualizaiton Security within its own niche. What is surprising is that Cisco is one of the backers of this innovative product.
TVP Strategy Archives
Reflex Systems vTrust Technology in Use by Third Parties
When I first interviewed Reflex System’s CEO he had a desire for the vTrustTM VMsafe-Net driver be the defacto standard for all such VMsafe-Net drivers. While others may not agree with this desire and will create their own VMsafe-Net drivers, TippingPoint is the first to integrate into Reflex’s VMC product to leverage the vTrust VMsafe-Net Driver and puts Reflex System’s on the second step of the path for vTrustTM to be the defacto standard. At the same time TippingPoint adds an Intrusion Protection System to the Reflex System VMC family of products with Tipping Point vController.
Virsto Promises More than Linked Clones for Hyper-V
Aimed for those who use medium sized storage for virtualization loads, Virsto will add quite a bit of needed functionality to Hyper-V to reduce disk space requirements, improve general disk IO performance, as well as provide faster high availability failover. The disk space saving Linked Clone technology available for VMware ESX and ESXi has been missing from Hyper-V, Virsto provides this.
Rethinking vNetwork Security
Brad Hedlund of Cisco asked the question, should the physical network security policy be different than the virtual network security policy? The answer is obviously no, but why are they treated separately? I and other have pushed the concept that to gain performance, redundancy, and security that you should use multiple network links to your virtualization host to separate traffic. However, does this really give you security?
Backup Strategy – Continuous Backup Needed?
I had an interesting conversation with Vizioncore yesterday about how backup is not as much a decision about what software to use but what process to use. In addition, this process needs to be considered from the very beginning of your virtualization architecture. With the quantity of virtual machines being used today by the SMB and Enterprise customers, the backup window has grown to nearly an all day event. What you say? An all day event? My backups happen with the window I set.
Virtualization and Cloud Missing Key Features: Auditing and Forensics
There are two key features missing from Virtualization and Cloud Computing. Those are auditing and forensics. The A6 project aims to fix this problem for auditing, but there is only some research into forensics. The issue is about discovering who did what when, where, how, and hopefully why. Auditing plays into this for Compliancy but also for forensics. Forensics has two major components in its arsenal: Audit Trails, and Disk Images.