• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Virtualization.com

Virtualization.com

News and insights from the vibrant world of virtualization and cloud computing

  • News
  • Featured
  • Partnerships
  • People
  • Acquisitions
  • Guest Posts
  • Interviews
  • Videos
  • Funding

Search Results for: virtualization security

Trend Micro Introduces Advanced Server Security Strategy

October 28, 2009 by Robin Wauters 1 Comment

Trend Micro is introducing an advanced server security strategy that encompasses protection for the cloud, as well as products and solutions that help corporations address the challenging data protection, security and compliance needs of today’s datacenters that stretch across physical, virtualized and cloud-computing environments.

Trend Micro Deep Security, the flagship product for advanced server security at Trend Micro, introduces a new paradigm for server security where the entire server is protected, including the operating system, network and applications layers for superior and comprehensive security, regardless of computing environment, virtualization platform or storage location.

It emphasizes:

  • Preventing data breaches and disruptions by providing a layer of defense at the server itself, whether physical, virtual or cloud.
  • Lowering the cost of security management for virtual and cloud computing environments.
  • Helping to make possible compliance over a wide range of regulations and standards, including PCI, SAS 70, FISMA, HIPAA, and more.
  • Addressing immediate security concerns plaguing enterprises in physical and virtual worlds such as SQL injection and cross-site scripting attacks perpetrated by sophisticated, for-profit hackers.

Trend Micro Deep Security provides advanced protection for servers right from the operating system to resident applications with a modular architecture that includes: A deep packet inspection engine with intrusion detection/prevention (IDS/IPS), Web application protection and network-level application control; firewall, integrity monitoring and log inspection modules. This protection is available for both physical and virtual systems using server-based software agents and, coming soon with Deep Security 7.0, using virtual security appliances specifically designed for VMware VI3 and vSphere 4 environments. Trend Micro Deep Security 7.0, the latest version, is the world’s first security software that coordinates VMsafe API-based security applied at the hypervisor with additional protection on virtual machines to protect VMware environments. This version also includes new features designed to improve management and simplify compliance for a lower total cost of ownership such as: Event tagging to enable better workflow of security incident handling, the ability to create a “reference system” or known good state to reduce false positive alerts resulting from normal system updates such as patching. Other enhancements include integrity monitoring, log inspection, and SIEM integration capabilities.

Trend Micro Deep Security combines with Trend Micro ServerProtect and Core Protection for Virtual Machines, the company’s anti-malware products designed for physical servers and VMware virtual servers respectively. This unique blend delivers layered and comprehensive server security now vital to business continuity. Trend Micro Deep Security, with advanced anti-malware protection, further adds to Trend Micro’s ability to broadly deliver layered and comprehensive server security now vital to business continuity.

Trend Micro Deep Security 7 will be available in November 2009 with two pricing models designed to deliver maximum value to organizations. Deep Security is available for traditional physical servers on a per server basis starting at $885 per server. A virtual server license is also available for VMware environments with unlimited agents per host machine starting at $2100 per socket.

Trend Micro advanced server security solutions are part of Trend Micro Enterprise Security – a tightly integrated offering of content security products, services and solutions which is powered by the Trend Micro Smart Protection Network. Trend Micro Enterprise Security delivers maximum protection from emerging threats while greatly reducing the cost and complexity of security management.

Filed Under: News

The future of Linux and Virtualization

October 19, 2009 by Kris Buytaert 1 Comment

While catching up on my reading backlog I ran into an article over at Ostatic titled, “Linux and Virtualization will March Forward Together” ,

Bob Sutor from IBM is quoted in that article stating

“I think Linux is such a natural for virtualization, both as a host and as a guest, and this will drive Linux even deeper into datacenters. Why? Linux and virtualization increase efficiency, allow consolidation, help reduce power and heat generated, and reduce server footprint. When you combine this with the quality of service offered by mainframes, you get even more benefits. When you open all this up to new ways of scheduling and managing applications, clouds emerge. So I think virtualization is key to what will foster greater use of Linux in the next decade.”

Apparently some study figured out that there are even better TCO savings for Linux virtualization as compared to Windows Virtualization and that Linux users Virtualize more . Obviously the license issues with other platforms make it much easier to deploy , and that’s what makes it the default platform in the cloud

Now the really strange thing is that the Linux platform is probably the platform that thad didn’t need Virtualization in the virst place.
All the claims for security, isolation , dll conflicts, finer process isolation etc might be relevant on different platforms but Unix and Linux already had chroots, cpu locking, nice, ionice and others. Good practice can get you pretty far in creating an strict and managable isolated environment, don’t get me wrong there are lot of valid reasons to virtualize on Linux, but the number of reasons not to is probably equally long

As @Beaker also realized adding the extra os layer each time add another factor , a potential performance penalty, another layer to manage, secure and update

So are Bob Sutor and Matt Asay right on their future of Linux Virtualization ? Will it continue to grow, will Linux Virtualization grow bigger than any other platform ?

Off course it will , Linux is the ideal open source platform in the cloud, it’s the perfect light JeOS on a thin Bare Metal Hypervisor , or even Linux as the Hypervisor ? But the average user won’t notice, just as he doesn’t notice now . Virtualization will become invisible again it will become a part of your infrastructure like a CPU or a Switch ,Typical Virtualization management platforms will disappear, or blend in with platforms that manage your infrastructure as a whole.
By then it’s time for a new hype.

Filed Under: News

GlassHouse Buys SGI to Broaden Virtualization Offerings

September 30, 2009 by Robin Wauters Leave a Comment

GlassHouse Technologies has announced it has acquired UK-based virtualization infrastructure consulting company, Systems Group Integration (SGI). The acquisition broadens GlassHouse’s existing virtualization capabilities by combining vendor experience with analysis tools, helping customers realise ROI, increase efficiencies and reduce carbon emissions in their IT environments.

SGI has specialized in Microsoft and virtualization technologies for over 15 years. Its services and solutions for all aspects of distributed IT architecture will be integrated into GlassHouse’s existing and complementary platform business to help customers build effective, service centric infrastructures and realize ROI on their virtualization investments. The timely acquisition responds to increased customer demand for wide scale adoption to include server, desktop and storage virtualization over the coming years.

The move will also increase the depth of GlassHouse’s vendor relationships to optimize GlassHouse consultants’ access and knowledge of the very latest product developments. GlassHouse remains completely vendor independent and will use vendor information, alongside its Transom™ methodologies to advise customers on the best strategies for individual business needs.

The acquisition will also strengthen GlassHouse’s relationship with partners such as Dell; both SGI and GlassHouse are approved Dell partners, with SGI being a preferred partner for virtualization practice. GlassHouse partners will now have access to its broader virtualization resources as well as expertise in storage, back up, data centers, security and managed services.

Filed Under: News

Guest Post By Greg Ness: “Virtualization’s Golden Spike”

September 24, 2009 by Robin Wauters Leave a Comment

This is a cross-post of a blog article written by Gregory Ness, former VP of Marketing for Blue Lane Technologies who is currently working for InfoBlox.

It only makes sense that the steam locomotive existed before the completion of the Transcontinental Railroad. One breakthrough created the need for another. The power of the VM (virtual machine) introduced unprecedented mobility and flexibility, albeit within the confines of a VLAN container. That mobility and flexibility has created new demands for larger, unified and intelligent network infrastructures or infrastructure 2.0.

An Historical Perspective on Network Innovation

The steam engine, the locomotive and the rail are perfect examples of synergistic developments. Greater speed and mobility pushed the limits of infrastructure and created a compelling case for longer stretches of track. More cities became connected by rail lines over time, and soon even towns sprang up “in the middle of nowhere” along the tracks.

The increasing reach of the railroad opened up massive opportunities for development and trade and helped to forge national identities. From towns to industries the railroad shifted competitive advantage based on the sheer power and influence of transport and created massive wealth redistribution.
Today’s technology leaders, especially in the network and server and virtualization space (like Cisco, HP, VMware and others) will achieve strategic advantage if they get the spike before their competitors. Let me explain as we glimpse back at a strategic moment in US history defined by a spike of gold.

The Golden Spike Ceremony: 1869

ness

Thanks to Wikipedia for the photo.

Virtualization’s virtual machine is pushing the limits of today’s static networks just as the steam locomotive drove the construction of iron rails to connect the coasts.

Perhaps today, like those who think that virtualization ends with the VLAN, there were some who didn’t understand the need for a rail system to connect both coasts.

Full VMotion is Virtualization’s Golden Spike

Yet the questions we ask today regarding our static, manually managed networks need to be answered before we can fulfill the full potential of VMotion. Many of the questions may ultimately be answered by the newly formed infrastructure 2.0 working group.

Addressing and automation are core issues; solving them will deliver new potentials in security, application delivery and disaster avoidance/recovery and create entirely new IT business models and applications. They will also help to minimize the impact of the necessary complexity that VMware’s Thiele talks about in his latest blog:

The network is a great example of “hidden” complexity. Today the average network administrator can plug in a switch to another switch and then plug devices into the new switch and expect that in most cases the network will work. Imagine if before he could get the server to talk to the switch he had to create a new address from scratch or spell out the switch port in the server’s network interface card. The fact is networks have been hiding complexity for years, but they still have a long way to go. When you can log into a console and use your mouse pointer to drag a server into a network or resource pool and have the appropriate network security and routing policies applied, you’ll be getting close to IT nirvana. Although you might disappoint the hardcore network administrator who was hoping to spend some late nights and weekends tweaking the environment.

(Mark Thiele, VMware, “Complexity in IT Systems…” Sep 17, 2009)

Ironically, Bob Grossman, who is considered to be one of the fathers of cloud computing, kicked off the infrastructure 2.0 working group with a preso highlighting a train at the Russian/Chinese border undergoing a manual gauge change. Talk about a “tin spike” connecting the two systems; each train is lifted by a team of laborers so that the undercarriage can be adjusted for a different sized track.

Bob has been building clouds (multi-site grids of computing power) for decades. His understudy, Stuart Bailey, founded Infoblox (my employer).

Bob Grossman Briefing the Infrastructure 2.0 Work Group

ness 2

Yet rail systems are incredibly linear, especially in those days. Today’s networks are more like pulsing meshes. So if a VM takes off from one VLAN for another determining its location (security, delivery, management policies require foreknowledge of the VM’s location) is strategic to a stateful trip. If you can preserve the state (security, etc) of the VM while it moves great distances you deliver the golden spike, full VMotion.

That spike is strategic to the fortunes of networking vendors, cloud providers and enterprises because it enables new levels of flexibility, scale, automation and security across data centers, transforming the economics of IT, in the same way that the Transcontinental Railroad helped to unify a nation and create new towns and cities, and grow established ones.

Railroads were a critical fabric for the industrial revolution and the global emergence of nationalism. Networks are the critical and often overlooked fabric for the most powerful form of cloud computing the next stage of the computer revolution, sometimes called the intercloud.

This makes addressing strategic to the golden spike. That was one of the critical cloud problems discovered decades ago when the University of Illinois (Bob Grossman’s team) switched from circuit to packet switched networks and inspired Stu to launch Infoblox. And that brings us back to the dust covered worlds of DNS, DHCP and IP address management automation and an emerging technology called IF-MAP.

When this golden spike is driven into the network it will enable a new generation of cloud operating systems layered on top of sophisticated cloud positioning systems with real-time intelligence on systems, location, policy, etc. We’ll see hyper-efficient and intelligent networks that are as fast and up-to-date as individual hypervisor and VLAN tools today.

From President Kennedy’s undelivered speech intended to be delivered at the Dallas Trade Mart on November 22, 1963: “Except the Lord keep the city, the watchman waketh yet in vain.”

You can follow my rants and reads at: www.twitter.com/Archimedius. I am a Senior Director at Infoblox.

Filed Under: Featured, News

Virtacore Introduces New Virtualization Website / Community

September 24, 2009 by Robin Wauters Leave a Comment

Virtacore Systems has launched a new website and community to help solve the complexities of virtualization and cloud computing technologies for businesses of all sizes.

Thomas Kiblin, CEO and Founder, believes the complexities of virtualization can be explained and tailored to each individual business.

“We view our relationship with our customers as a partnership to leverage the best web technologies to help improve their business. Whether businesses are new to web technology or familiar with hosting concepts, we will educate and explain everything needed in order to maximize their hosting experience.”

Virtacore Systems provides a customized approach to virtualization technologies. Benefits include increased flexibility, reliability, and security as well as reduced infrastructure, footprint, and facility costs. Virtacore’s consultative process gives company IT managers peace of mind and a virtual engineering team to assist them with feasibility, day-to-day management, disaster recovery, and capacity planning.

Filed Under: News

Citrix to Establish Virtual Infrastructure Security Validation Together With SignaCert

September 10, 2009 by Robin Wauters Leave a Comment

Citrix Systems recently announced it is working with SignaCert, a provider of IT compliance solutions based on whitelisting methods, to include Citrix Systems software measurements in the SignaCert Global Trust Repository (GTR).

This collaboration will provide objective, third-party validation of Citrix-built software for IT security, compliance and systems management of virtual infrastructures, enabling Citrix customers and partners to explore innovative uses for Citrix desktop and server virtualization products such as XenDesktop, XenApp and XenServer, including dynamically managing applications and packages in workloads. Additionally, SignaCert will license the Data Exchange Format (DEF) to customers at no charge to help them leverage the whitelist data method for custom uses in their Citrix environments.

The SignaCert Global Trust Repository uses known-provenance and vendor-independent software measurements, or whitelists, to enable new enterprise IT security methods. These whitelists provide a standardized way to enforce security and compliance of third-party software for enterprise computing environments, as well as more advanced uses such as software attestation in high-assurance platforms. The technology permits virtual machines (VM) and their applications to be securely authenticated, so that when a VM is moved – between the enterprise data center and a cloud, for example – the user can be confident that the workload originated with their enterprise customer and it has not been altered outside of policy in any way, and that there have been no file and structure changes, additions or deletions to the application stack.

Filed Under: News

  • « Go to Previous Page
  • Go to page 1
  • Interim pages omitted …
  • Go to page 8
  • Go to page 9
  • Go to page 10
  • Go to page 11
  • Go to page 12
  • Interim pages omitted …
  • Go to page 65
  • Go to Next Page »

Primary Sidebar

Tags

acquisition application virtualization Cisco citrix Citrix Systems citrix xenserver cloud computing Dell desktop virtualization EMC financing Funding Hewlett Packard HP Hyper-V IBM industry moves intel interview kvm linux microsoft Microsoft Hyper-V Novell oracle Parallels red hat research server virtualization sun sun microsystems VDI video virtual desktop Virtual Iron virtualisation virtualization vmware VMware ESX VMWorld VMWorld 2008 VMWorld Europe 2008 Xen xenserver xensource

Recent Comments

  • C program on Red Hat Launches Virtual Storage Appliance For Amazon Web Services
  • Hamzaoui on $500 Million For XenSource, Where Did All The Money Go?
  • vijay kumar on NComputing Debuts X350
  • Samar on VMware / SpringSource Acquires GemStone Systems
  • Meo on Cisco, Citrix Join Forces To Deliver Rich Media-Enabled Virtual Desktops

Copyright © 2025 · Genesis Sample on Genesis Framework · WordPress · Log in

  • Newsletter
  • Advertise
  • Contact
  • About