Licensing your Private Cloud

Both Microsoft and VMware have revamped their product suites and therefore their licensing once more and how you buy will dictate how you license (as always). It has taken a bit of time for all the information to percolate through to each corporate site and all the issues to be addressed. As we did before, let us look at licensing. We will look at first the old model of Hyper-V vs VMware vSphere vs Citrix Xen vs RedHat KVM. Then in a follow-on article we will look at the new cloud suite models.

Microsoft and VMware: Two Different Paths to the Future

Now that VMword 2012 San Francisco is over and I have some time to reflect on my virtualization thoughts in general before getting ready for VMworld Barcelona. One thing I took noticed with the recent announcements about vSphere 5.1 and Hyper-V 2012. Microsoft and VMware both released a specific new feature to each platform respectfully at basically the same time. Is this a sign that Microsoft is really closing the gap on VMware? I think we are getting there but I have also made some other personal observations on how I think both see virtualization in the future and I foresee a completely different method and mindset for the future between these two companies.

Defense in Depth: Encryption within the Virtual Environment

The 5/31 Virtualization Security Podcast we spoke to High Cloud Security about encryption as a defense in depth, and where to place encryption within the virtual environment. This lead to an intriguing discussion about what is actually missing from current virtual environments when it comes to encryption. We can encrypt within each VM and we can encrypt within the networking fabric, as well as within the drives themselves, but currently that leaves several vulnerabilities and unencrypted locations that can be used as attack points. While we concentrated on vSphere, what we are discussing applies equally to all hypervisors.

Will access to VMware's source code change the hypervisor threat landscape?

Many of the virtualization security people I have talked to are waiting patiently for the next drop of leaked VMware hypervisor code. But the real question in many a mind is whether or not this changes the the threat landscape and raises the risk unacceptably. So let’s look at the current hypervisor threat landscape within the virtual environment to determine if this is the case, and where such source code will impact. Are there any steps one can take now before the code drop is complete to better secure your environment?