Moving Up the Stack — Security Take

Moving up the stack, our security posture changes. The concepts stay the same, but the posture changes. The concepts of least privilege, limited access, etc. all apply. How we implement those controls changes. In the past, we could rely on a firewall at the edge. Yet, as we move up the stack, the edge has …

Tis All about Audit: HyTrust + DataGravity

HyTrust recently announced that it is purchasing DataGravity. While I do not know the details, the purchase is a pretty savvy one. Why? HyTrust is launching into the cloud, and DataGravity works in any cloud. A win-win, if you ask me. HyTrust has three major products, and with DataGravity, it will have a fourth, but …

The Encryption Layer Cake

Encryption is returning to the forefront, with Microsoft claiming its approach is better than others. VMware counters with its approach, and clouds counter with theirs. None of these approaches make sense unless you understand the layers in which you can encrypt, the risks associated with those layers of encryption, and the inherent problems with encryption …

ITOA Types of Data

Any part of any infrastructure, application, or cloud is data. Data is used by applications, and myriad data is presented to IT organizations for their use, edification, insights, and more. But what really is this data? Can we classify the types of data in some way? Data classifications should not be just “structured” and “unstructured”; they must go deeper than …

VMworld US 2015: Day 3 Recap

Welcome to The Virtualization Practice’s week-long coverage of VMworld US 2015. Tune in all week for our daily recap of the major announcements and highlights from the world’s premier virtualization and cloud conference. VMworld US 2015 continued yesterday, kicked off by the general session. End-User Computing’s Sanjay Poonen led the keynote, in which VMware fleshed …