I recently participated in the InformationWeek Dark Security Virtual Event as a panel member with Hoff, Craig Balding, Chris Wolf, Glenn Brunette, and Jon Oberheide. A very far ranging group of individuals from research, security organizations, analysts, and authors. What is interesting is that most of these same people have joined me on the Virtualization Security Podcast, and the others I hope to have as guests next year. There was one question that set me to thinking even more, do we need a new way of thinking about virtualization security?
TVP Strategy Archives
PCI discussed on the Virtualization Security Podcast
The last Virtualization Security Podcast covered PCI, Kurt Roemer and Jeff Elliot who were guests represented PCI. PCI as you hopefully know is working on compliance guidance for payment systems running within virtual machines and the cloud. This early discussion is a plea for people to get involved in reviewing the currently developing white-paper. While …
Continue reading “PCI discussed on the Virtualization Security Podcast”
End User Environment Management for VDI
When considering your VDI deployment hosting your workspaces is not the only consideration. Careful consideration needs to be made on the management of the performance, license use and user’s environment to give, not only a good user experience, but a timely return on your investment.
Microsoft Adds Sentillion’s vThere to its Virtualization Portfolio
Microsoft’s announcement yesterday of Massachusetts based Sentillion extends its reach into healthcare solutions and added a new component to its virtualization portfolio. Sentillion’s vThere is a type-2 hypervisor (hosted virtual machine) built on Parallels virtualization whose strength is in its ability to provide a highly secured desktop image on a normally non-secured solution.
Virtualization Related SSL MiTM Attack, chances?
There has been quite a bit of discussion between myself, Tim Pierson, and other with respect to SSL man-in-the-middle attack possibilities within the virtual environment. But what are the chances that such an attack will happen, or that someone would know how to perform the attack? What does the attack depend upon?
Ulteo – Open Source Desktop Broker
Ulteo has just released Version 2 of its Open Virtual Desktop (OVD), an Open Source desktop broker product which is designed to deliver GUI applications running on Linux, Terminal Services and Windows to java-enabled browsers. Ulteo’s appeal is likely to be to more cost-conscious and linux-oriented organizations than the large enterprise customers of Citrix, VMware, Ericom, Systancia or Quest, but within these potentially new markets it can deliver many of the mangeability benefits of the existing proprietary products, and it has few competitors for its key feature of delivering both Linux and Terminal Services desktop applications through the same portal.