• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Virtualization.com

Virtualization.com

News and insights from the vibrant world of virtualization and cloud computing

  • News
  • Featured
  • Partnerships
  • People
  • Acquisitions
  • Guest Posts
  • Interviews
  • Videos
  • Funding

Search Results for: virtualization security

RingCube Technologies Joins McAfee Security Innovation Alliance

January 12, 2010 by Robin Wauters Leave a Comment

RingCube Technologies, a provider of managed virtual workspaces, today announced that it has joined the McAfee Security Innovation Alliance partner program.

Under the McAfee program, RingCube has integrated its vDesk workspace virtualization solution with McAfee Encrypted USB drives, enabling enterprise customers to increase the mobility of their workforce while lowering the cost of desktop management and support.

vDesk creates a virtual workspace on the McAfee Encrypted USB drive that contains the user’s desktop environment including applications, data and settings. When the user connects the USB drive to any PC, they instantly have access to their corporate desktop environment for remote access, for disaster recovery, or for temporary access by consultants, contractors and outsourcers.

vDesk works with McAfee Encrypted USB drives to ensure that vDesk virtual workspaces are isolated from host PCs, that all data is encrypted, and that only authorized users can access the encrypted workspace. vDesk provides network and file system isolation policies, granular host security policy enforcement and integration with active directory for user authorization. As part of host security scanning, vDesk can verify that McAfee VirusScan Enterprise or McAfee Total Protection Suite is updated and actively protecting the virtual workspace prior to allowing any user access. McAfee’s Encrypted USB drives ensure that RingCube’s workspaces are protected by 2-factor biometric user authentication and the strongest AES 256-bit hardware encryption to prevent data leakage and unauthorized access.

Filed Under: News

Crossbeam Systems CMO Shares 2010 Virtualization Predictions

November 25, 2009 by Robin Wauters Leave a Comment

“Virtualization holds enormous promise as the solution to the cost and complexity of managing security. In addition to a significant reduction in hardware and maintenance costs, as well as energy consumption, security virtualization also provides a flexible architecture that can help companies meet growing bandwidth demands, support cloud computing environments and effectively protect sensitive data from attacks.

But for all the benefits of virtualization, there remain key challenges when it comes to these high-performance, latency-sensitive applications. IT staff are wary about betting too much of their performance- and risk-sensitive IT infrastructure on a still-emerging technology. Also, because fewer people are virtualizing their security infrastructure, there is a general lack of experience—from both the vendors and the users—about the issues involved and know-how about how to solve them.

Securing network traffic in virtualized environments is extremely difficult for IT security staff to enforce and maintain as virtualized applications pass information back and forth and cross virtual “trust boundaries.” In an effort to enforce security policies between virtualized applications, IT staff end up creating virtual machine (VM) sprawl – caused by sets of security VMs for each boundary transition on the same servers – which has the potential to introduce even higher levels of risk to the organization as well as further degrade network performance. In short, IT has inadvertently transferred their problems from managing physical appliance sprawl to managing virtual appliance sprawl.”

Read the rest of this guest post by Jim Freeze, CMO at Crossbeam Systems over at VMblog.

Filed Under: Featured

IBM Leverages 40 Years Of Virtualization Experience To Secure Decade-Old VMware’s vSphere Platform

November 16, 2009 by Robin Wauters Leave a Comment

IBM last week introduced IBM Virtual Server Security for VMware vSphere, a software product designed to help organizations secure and protect their virtual server infrastructure. The software will help safeguard virtual server environments and allows businesses a more secure path for transitioning critical assets to virtual enterprise data centers.

IBM has been working with clients to manage this strategic shift and simplify and optimize client infrastructures. While the migration to virtual environments offers many benefits, it also requires businesses to take unique measures to combat the next generation of security threats and compliance challenges. These measures are required because of reduced visibility and control that come with the addition of more information technology layers. Given this changing landscape, traditional security made for physical computing environments becomes inadequate as a sole solution.

The new IBM Virtual Server Security for VMware vSphere helps address these concerns, providing protection for every layer of the virtual infrastructure including the hypervisor, operating system, network, applications, server-based virtual desktops, virtual machine and traffic between virtual machines. By integrating with VMware VMsafe technology, the new software provides clients with better visibility, security granularity and scalability in their growing virtual data centers.

Automatic protection features include:

  • Virtual Network Access Control (VNAC) to limit network access from a virtual server until security posture is confirmed;
  • rootkit detection and prevention to increase virtual server uptime and availability;
  • virtual infrastructure monitoring and reporting to identify vulnerabilities;
  • autodiscovery and virtual network segment protection to provide visibility and control of the virtual infrastructure.

With the data center undergoing dynamic changes, the ability to manage, control and audit the actions of privileged and powerful system users and administrators across traditional and virtual environments becomes even more critical. All of the automatic protection features in the new software product can help clients to more easily meet compliance standards and regulation requirements. Additionally, this new offering complements already formidable IBM capabilities for securing the virtual environment, such as controlling access and monitoring privilege.

IBM Virtual Server Security for VMware vSphere will be available in December 2009.

Filed Under: Featured, News

Release: Red Hat Enterprise Virtualization for Servers

November 5, 2009 by Robin Wauters Leave a Comment

Red Hat yesterday announced the general availability of Red Hat Enterprise Virtualization for Servers, the newest product set in the Red Hat Enterprise Virtualization portfolio.

Red Hat Enterprise Virtualization for Servers is designed to enable pervasive adoption of virtualization, with a comprehensive end-to-end solution combining a standalone hypervisor and powerful virtualization management.

In February 2009, Red Hat announced plans to deliver the Red Hat Enterprise Virtualization portfolio, building on its leading Red Hat Enterprise Linux operating system platform, offering the proven security, performance, scalability and cost advantages of open source virtualization technology.  Red Hat Enterprise Virtualization for Servers entered a worldwide beta in June 2009. Extensive collaboration with large enterprise beta customers, such as Comviva, Host Europe, NTT Communications, Qualcomm and Swisscom, resulted in enhanced product capabilities designed to meet enterprise requirements for deploying and managing heterogeneous virtualization and cloud environments.

In September 2009, Red Hat delivered the foundation of Red Hat Enterprise Virtualization with Red Hat Enterprise Linux 5.4, which offers next-generation Kernel-based Virtual Machine (KVM) virtualization technology.

Today, Red Hat delivers the next phase of the portfolio with the availability of Red Hat Enterprise Virtualization for Servers, which includes the following components:

Red Hat Enterprise Virtualization Hypervisor:
A standalone, lightweight, high-performance hypervisor designed to host Linux and Microsoft Windows virtual servers and desktops. It provides a solid virtualization foundation for cloud deployments and other highly dynamic IT environments. Using KVM technology, the hypervisor provides high performance and security coupled with memory sharing technology, which permits more efficient guest consolidation, and enterprise features such as live migration.

Red Hat Enterprise Virtualization Manager for Servers:
A platform for configuring, provisioning, managing and organizing virtualized Linux and Microsoft Windows servers.  It is designed for customers who seek to reduce the cost, complexity and time required to manage large-scale virtualization deployments. With a rich set of management capabilities and powerful search and grouping features, Virtualization Manager equips customers with the ability to efficiently control a virtualized infrastructure.

Red Hat Enterprise Virtualization for Desktops remains in private beta today and is expected to be made generally available in early 2010.

Filed Under: News

LineSider Debuts OverDrive, A Network Services Virtualization Platform

October 29, 2009 by Robin Wauters Leave a Comment

LineSider Technologies has announced OverDrive, a network services virtualization platform that enables enterprises and service providers to automate the provisioning and deployment of network services in cloud computing environments.

OverDrive is a software network virtualization solution that automates and orchestrates end-to-end service delivery by virtualizing discreet network services in response to changes occurring to dynamic resources such as users, applications, virtual compute, physical compute and storage. As resources are moved or changed, OverDrive automatically modifies and changes the underlying network infrastructure based on business policies that define the relationship between users, computing, and network resources.

Datacenters, users and applications have all become fluid elements in this new flexible computing model however networks were not designed for this new dynamic reality. They are still static. Every time an application, computer or storage resource changes in the virtual datacenter, there needs to be manual intervention to provision network services or repair broken security and access models. Without OverDrive a single request to move a critical application to a new physical or virtual location could easily require hundreds of separate device-level configuration updates that could take weeks to implement manually across a fully deployed network or data center. With OverDrive the entire process takes seconds, and more importantly the security models are still intact.

OverDrive orchestrates real-time automation and control of network services including access and security across both the logical and physical network based on business policies. Business policies are automatically translated into device-level configurations that dynamically create and adjust network services in real-time as changes in the dynamic computing environment occur.

Key features include:

· Business Policy Driven – OverDrive orchestrates real-time automation and control of network services based on business policies that define the relationship between users, computing, and network resources.
· Automates Device Level Configurations – Business policies are automatically translated into device-level configurations that dynamically create and adjust network services including access and security, in real-time, across both physical and virtual network devices as changes in the dynamic computing environment.
· Automates Network Service Delivery – OverDrive policies control and define the underlying network infrastructure services that provide end user access and security to both physical and virtual resources. These services include: Routing, VPN, Switching, VLAN, Firewall Ports and Protocols, ACL (firewall and switch), DNS, DHCP, Security (ACL / 802.1x), Remote Access / Mobile User, Identity Based Network Access Control
· Ensures Secure Access – OverDrive ensures that underlying access and security parameters remain in effect and will automatically notify administrators if a defined access or security policy is violated.
· Identifies Potential Conflicts – OverDrive understands the complex interdependencies between resources in both physical and virtual computing environments and alerts the network administrator about configuration, access, and security conflicts prior impacting the production environment.
· Ensures Compliance – OverDrive provides a complete solution that satisfies multiple audit controls and reporting requirements for Sarbanes-Oxley, HIPPA, PCI and other federal mandates in regulated industries.
· Integrates into Existing Network Support Platforms

Filed Under: News

Catbird Introduces Security and Compliance Solution for Cloud Computing Providers

October 29, 2009 by Robin Wauters Leave a Comment

Catbird has announced the launch and immediate availability of its new vSecurity Cloud Edition, the first solution designed specifically to enable both public and private cloud computing providers to instantly deliver SOX, PCI, HIPAA, FISMA, COBIT, DIACAP and other regulatory-based security and compliance policy monitoring and enforcement.

vSecurity Cloud Edition was previewed at last month’s VMworld 2009, for which it was honored with a Best of Show Finalist award, the first security product to win in the Cloud Computing category.

vSecurity Cloud Edition gives service providers the competitive edge with the industry’s only automated monitoring and enforcement solution that covers all seven critical control areas: auditing, inventory management, configuration management, change management, access control, vulnerability management and incident response, in an elegant solution specifically architected to meet the needs of cloud providers.

Catbird is the only virtualization security product offered by Amazon Web Services’ Elastic Compute Cloud (EC2) web service, which provides instantly-scalable cloud-based computing capacity to meet evolving enterprise needs. Customers of Amazon’s EC2 now have the option of adding automated, continuous vulnerability monitoring to their Amazon Machine Image with Catbird’s vSecurity Cloud Edition. Organizations regulated by PCI or other policies that demand compliance can take advantage of Amazon’s state-of-the art cloud while remaining compliant, enhancing Amazon’s value proposition and accelerating growth in this increasingly-popular space.

vSecurity Cloud Edition delivers comprehensive coverage to ensure cloud service providers meet their customer mandates, including:

  • SOX compliance measurement and reporting across 39 COBIT controls;
  • PCI compliance measurement and reporting across 96 test requirements impacted by virtualization;
  • HIPAA compliance measurement and reporting across 37 controls negatively impacted by virtualization;
  • DIACAP compliance measurement and reporting across all 26 controls affected by virtualization, including the 12 Mac1 controls;
  • COBIT compliance measurement across over 40 controls affected by virtualization, and
  • FISMA compliance and reporting across 51 controls.

Among numerous protection and enforcement features, vSecurity Cloud Edition provides:

  • 24×7 vulnerability management with a fully compliant scanner that is automatically correlated with other virtual machine attributes to provide an accurate assessment of known defects against a specific and customizable compliance framework.
  • NAC-based enforcement for continuous monitoring of the virtual machine population, real-time inventory management, and the most accurate real-time VM catalog and virtual machine sprawl prevention
  • A multi-tenant management portal that provides compliance intelligence aggregation, management and reporting across physical, virtual, private and public clouds from a single dashboard, while ensuring the privacy of customer or departmental data.

Essential for cloud providers is customizable, real-time reporting on the compliance and security status of the customer’s applications and systems, tailored for the appropriate audience ranging from executive-level managers to technical IT administrators.

Catbird vSecurity Cloud Edition has already been embraced by cloud providers and platform vendors whose customer base demands broad-based security and compliance.

Ideal for both public and private clouds, vSecurity Cloud Edition features a Service-Oriented Architecture that incorporates stateless agents reporting to a separate command center. Full integration with ESX 3.X, vSphere 4.x and up and Citrix XenServer enables seamless deployment in cross-platform environments. Infinitely scalable, vSecurity Cloud Edition allows cloud providers to seamlessly add clouds to existing infrastructure, without additional investment in security and compliance. For public clouds, SLA enforcement provides value-added assurance for clients.

Filed Under: News

  • « Go to Previous Page
  • Go to page 1
  • Interim pages omitted …
  • Go to page 7
  • Go to page 8
  • Go to page 9
  • Go to page 10
  • Go to page 11
  • Interim pages omitted …
  • Go to page 65
  • Go to Next Page »

Primary Sidebar

Tags

acquisition application virtualization Cisco citrix Citrix Systems citrix xenserver cloud computing Dell desktop virtualization EMC financing Funding Hewlett Packard HP Hyper-V IBM industry moves intel interview kvm linux microsoft Microsoft Hyper-V Novell oracle Parallels red hat research server virtualization sun sun microsystems VDI video virtual desktop Virtual Iron virtualisation virtualization vmware VMware ESX VMWorld VMWorld 2008 VMWorld Europe 2008 Xen xenserver xensource

Recent Comments

  • C program on Red Hat Launches Virtual Storage Appliance For Amazon Web Services
  • Hamzaoui on $500 Million For XenSource, Where Did All The Money Go?
  • vijay kumar on NComputing Debuts X350
  • Samar on VMware / SpringSource Acquires GemStone Systems
  • Meo on Cisco, Citrix Join Forces To Deliver Rich Media-Enabled Virtual Desktops

Copyright © 2025 · Genesis Sample on Genesis Framework · WordPress · Log in

  • Newsletter
  • Advertise
  • Contact
  • About