The virtualization industry is growing incredibly fast, and the lack of common nomenclature and acronyms has given rise to a variety of distinct dialects. It’s no wonder that we who speak 0s and 1s don’t understand each other at times, and industry marketing often causes even more confusion.
TVP Tag Archives
Rewatching Computer Chronicles: Everything Old Is New Again
It has been thirty-one years since the first Computer Chronicles show, and that first show depicted many interesting things that were not considered new at the time. Today, we find them new and interesting, or more to the point, improved such that they are usable in ways only dreamed of then. Computer Chronicles discussed touchscreens, …
Continue reading “Rewatching Computer Chronicles: Everything Old Is New Again”
Cloud Security Monitoring
Have you ever wondered what was going on within a cloud regardless of type? SaaS? PaaS? IaaS? Do you need to audit these environments to ensure compliance with your security policy (not to mention the subset of your security policy that contains regulatory compliance)? To provide solutions for these issues, a number companies both new …
Application Security: What Is the First Step?
What is the first step of application security? What is this step regardless of whether the process involved is DevOps or traditional silos? We have heard many answers before, such as architecture, code analysis, hardening, risk analysis, etc. But we have not really talked about the intersection of the user, application, data, and system. Perhaps …
Continue reading “Application Security: What Is the First Step?”
EUC Security: Much More Than VDI
On the 5/30 Virtualization Security Podcast, Shaun Donaldson, Director of Alliances at Bitdefender Enterprise, joined us to discuss end user computing (EUC) security and how their new Gravity Zone product ties their enterprise products together under one scalable management umbrella. This was a very interesting conversation on the subject of EUC security, Bring Your Own Device (BYOD) security, and the all aspects of the the EUC stack. There are quite a few moving pieces in the EUC stack that is greater than your mobile device and the system it is accessing. There is a complete networking and political stack between the two and perhaps many systems you have to jump through to access your data.
Cyber Defense: Using Virtual Desktops?
There was recently a rather heated twitter discussion between @Guisebule, @VirtualTal, and @Texiwill (myself) about using virtual desktops as a part of cyber defense. While this could be true, there is a need to ensure you know where your virtual desktop(s) start and end, not only within the network, but your applications in use. In addition, it is very important to fully understand the scope of a virtual desktop architecture as well as use.