The security companies are looking into all aspects of virtual environment introspection to label, tag, or mark all objects for compliance reasons, inspect the contents of virtual machines for asset management (CMDB), and an early form of Root Kit detection.
Virtualization Security is not just about the firewall, it is about the entire ecosystem, auditing, compliance, and object management.
TVP Strategy Archives
To Cloud or not to Cloud, Better Yet, What is a Cloud?
While doing a quick Google search to find what a Cloud is, I have found several different definitions which depend on which vendor site you pull up. One thing is for sure despite the frequent use of the term, it still means different things to different people and or companies. For my reference point I am going to use the National Institute of Standards and Technology definition referenced by Texiwill’s NIST Cloud Computing Definitions Final article.
KVM in SUSE, what is going on at Novell?
As of Service Pack 1, SUSE Linux Enterprise Server 11 (SLES) supports KVM for SUSE guests. This post follows on from our previous post regarding the demise of Xen in Red Hat Enterprise Linux, and perhaps suggests the beginning of the end for Xen-based virtualization in Linux, but the story is far from clear. A complex set of agreements with Microsoft mean that Novell is bound to preferentially support Windows guests, and it may be a while before KVM support is adequate, although Novell has a project called Alacrity to help get it there. In the meanwhile Novell may get split up into pieces by a private equity house and SLES find itself a new owner.
Can you Transform your desktop with Turnkey VDI?
Can you transform your desktop estate by migrating to VDI solution and expect that “savings will be made”? You should ask not what you can do for VDI, but what VDI can do for you. The process of transforming your desktop needs to begin with understanding what each user has in their workspace. Being able to minimize your desktop device spend should not come with increased costs due to complexity and lost productivity. Be sure you fully assess what it is that you have now before considering transforming your environment.
Virtualization Security Technologies… Pushing the Envelope
During the Virtualization Security Podcast on 5/13, IBM’s David Abercrombie joined us to discuss IBM’s Virtualization Security Protection for VMware (VSP) which contains several exciting uses of the VMsafe API for VMware vSphere. These being:
* Network: Network Monitoring, Firewall, Access Control, and a Protocol Analysis Module
* Memory: Rootkit Detection
VMware Advanced Certifications
VMware has now announced two new advanced certifications that will be available for registration in the very near future. VMware Certified Advanced Professional 4 – Datacenter Administrator (VCAP4-DCA) and VMware Certified Advanced Professional 4 – Datacenter Design (VCAO4-DCD). Both these certification and exams are a stepping stone for the VMware Certified Design Expert on vSphere 4. These new exams are in all intensive purposes an updated version of the exams needed for the VCDX certification for ESX 3 but with the added bonus of advanced certifications during the journey to achieving the coveted VCDX certification. Let’s take a quick overview of the new certifications.