Hurricane Irene and Some Thoughts on Disaster Recovery

This week I have been paying close attention to the developments of Hurricane Irene. In the beginning, Hurricane Irene looked like she was going visit Florida on her journey to the north. Even though it looked like Florida was going to get hit by this storm, it was still early and there was time for the storm to change course. It was also time to go out and make sure my Hurricane Supply Kit at least had the basics like batteries and flashlights as well as filling up the gas tanks of the cars. I have different levels of preparedness which depends on how close the storm is and the projected path. Just like I have steps in place to be prepared for the storm, most companies that I have worked for in Florida have a storm plan in place and like myself, do not sound the real alarm until the storm is 48 – 72 hours away from a hit but start to prepare for the alarm in case it is needed.

5 Starting Steps to Protect Your Virtual and Cloud Environments

More and more is coming out about the attack from a MacDonald’s that left an organization crippled for a bit of time. The final tally was that the recently fired employee was able to delete 15 VMs before either being caught or he gave up. On twitter, it was commented that the administrator must not have been a powershell programmer because in the time it takes to delete 15 VMs by hand, a powershell script could have removed 100s. Or perhaps the ‘Bad Actor’ was trying to not be discovered. In either case, this has prompted discussions across the twitter-sphere, blog-sphere, and within organizations about how to secure from such attacks.

Secret Consoles — Multiple Management Interfaces — Security Nightmare

While looking on twitter this morning I discovered a tweet that pointed to the following article, which is relatively devoid of details but none-the-less extreme interesting to those who follow virtualization security: Fired techie created virtual chaos at pharma company. This article points out an external attack that lead to management access of a virtual environment. Now we do not know if the attack was using antiquated credentials or some other means. But what we do know is that VMs were deleted by an external source that used to be a former employee. Hoax or not, this is a very serious issue brought to light.

If Citrix is on a buying spree – should its next purchase be Virtual Computer?

Like a new college student, fresh from the flush of new found freedom to expand their horizons, Citrix appear to have had a case of the munchies. First Citrix’s portfolio was extended with the acquitisition of Kaviza. More recently, the purchase of RingCube. The desktop virtualisation techhnologies acquired will help strengthen Citrix’s virtualised desktop offering. VDI-in-a-box offering simplicity of deployment, providing options for the SMB and MSP spaces; and vDesk providing a layering functionality giving greater VDI scalability with an improved personalisation offering.

Does VDI need User Virtualization, or does User Virtualization need VDI?

VMware view to release RTO profile solution. Is this lagging behind Citrix who have bought Ringcube? View now has profile management – but that isn’t user virtualisation. Does VDI need User Virtualization, or does User Virtualization need VDI? User Virtualization has the capacity to extend across desktop delivery boundaries because the user workspace, their applications and data are no longer bound to the desktop OS. Solutions available from vendors such as AppSense, UniDesk and RES. To deliver virtual desktops for the enterprise, it is not simply a case of managing profile load time better: many users need greater customisation than a shared desktop can deliver. In an enterprise environment VDI is not the only method of delivering desktops. A complete user virtualization solution needs to be able to accommodate, not only centralised hosted desktops, but off-line use as well and standard desktops.