Security and Compliance only when Auditor is at the door

I was privileged to speak at the 3rd Annual South Florida ISACA WoW! Event with Robert Stroud, Alan Shimel, and other great speakers. What I discovered from this conference is something I have feared for quite a number of years. Compliance actions are not continuous but often only enacted when the auditor shows up at the door. Secondly, very few auditors raised their hand when I asked if they are working with Virtualization or have customers that virtualize, this was quite a surprise.

Do Citrix and VMWare fail to deliver a complete centralised desktop offering?

Hosting desktops or applications on servers located in the data center, and implementing centralized computing technologies is one of the best ways to cut IT costs while also improving security, reliability, productivity and efficiency. Both Citrix and VMWare have high profiles offering their respective virtualisation solutions that enable centralisation. Yet if you are considering centralisation, do they offer your organisation a focused solution for your needs?

Virtualizing Linux on IBM Mainframe – Now more affordable than ever!

IBM has reduced the price of its Mainframe/Linux platform, providing an IBM price point and feature benchmark against which to compare the consolidated offerings which are starting to emerge from competing vendors, such as the Acadia group (Cisco, EMC, or VMware) and HP/Microsoft.

End-To-End Virtual Environment Security

Have you ever wondered how all the virtualization security tools fit together? Wait no longer as we have a new White Paper that will tell you this information. How do products from Altor Networks, Catbird Security, Reflex Systems, HyTrust, Tripwire, and others fit within your virtual environment?

Backup Security

When you think of backup security, many people think of ensuring tapes are offsite or even encryption on media, but what is really required for backup security? There is quite a bit going on when someone performs a backup within the virtual environment, so where does security begin and end for making a single or multiple backups?