• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Virtualization.com

Virtualization.com

News and insights from the vibrant world of virtualization and cloud computing

  • News
  • Featured
  • Partnerships
  • People
  • Acquisitions
  • Guest Posts
  • Interviews
  • Videos
  • Funding

virtsec

Embotics Releases White Paper on Virtualization Security

October 8, 2008 by Robin Wauters Leave a Comment

Embotics today announced “Understanding VirtSec,” a new study that focuses on virtual server security issues inherent in IT environments. The research addresses threats posed by virtualization deployments and the technology that is available to tackle these emerging issues. Authored by David M. Lynch, vice president of marketing of Embotics, the white paper identifies immediate and potential security threats so organizations can plan accordingly.

Virtualization security is a wide concern for IT executives and Embotics’ “Understanding VirSec” summarizes the new threats and issues associated with server virtualization. The research, containing a wide range of user feedback, helps IT executives differentiate the potential future security issues from those that are present today, and offers recommendations and best practices to minimize these risks.

As virtualization deployments expand and become more complex, organizations are facing increased risk of data center security threats. Embotics’ “Understanding VirtSec” provides an overview of why IT administrators cannot rely on IT policies and processes that existed pre-virtualization, and how the impact of an uncontrolled environment in the data center is detrimental.

Filed Under: Uncategorized Tagged With: Embotics, research, study, virtsec, virtualisation, virtualization, Virtualization LifeCycle Management, virtualization management, virtualization security, white paper

Research and Markets Releases New Report on Virtualization Security

October 7, 2008 by Robin Wauters Leave a Comment

Research and Markets has announced the addition of the “Virtualization Security: The Early Stages of a New Battleground” report to their offering. Here’s the run-down they’ve provided via press release:

With the rush to adopt virtual technologies, the security of virtualization has become a primary concern – yet few understand the security implications of this disruptive innovation. In this report, EMA provides guidance for IT practitioners seeking to secure their virtual environments. With a simple, five-phase approach to virtualization security as the centerpiece of this study, EMA takes an initial look at virtualization threats and vulnerabilities, and considers the security benefits of virtualization. Market insight from EMA’s 2008 virtualization survey of over 600 enterprises takes a sampling of the steps organizations are – and are not – taking today to secure virtual environments. Until virtualized security measures mature, this report focuses on what enterprises can do today to secure virtualization and seize the unique opportunity to integrate security early in the adoption of this game-changing technology – before it’s too late.

The rapid adoption of virtualization technology has created multiple benefits for IT organizations. Advantages such as the reduction of cost through more efficient resource utilization are obvious; however, these benefits can quickly be negated if virtualization opens a door to a major security incident.
Many researchers have argued about the security implications of a migration towards IT virtualization. Some say that virtual solutions increase the risks faced by an organization, others argue that there is no impact at all, while still others argue that the implementation of virtualization allows organizations to actually reduce risk. The reality is that virtualization can do all of these, depending on the way it is designed, implemented and used. It is therefore imperative that IT managers have a high-level understanding of the security issues that can affect their virtual environments, and of the approaches that can address those issues. Through this understanding, enterprises can ensure that the delicate balance between functionality and security results in the greatest business benefit with the fewest risks. Moreover, executives can assure that their organizations take advantage of the opportunity that virtualization offers to put security at the forefront and thus avoid future security issues and costs.

In this report, an initial look at the emerging challenge of securing virtualization, as well the security benefits of this disruptive technology. The reader will be presented with an introductory view of threats and vulnerabilities affecting virtual environments, as well as recommendations for pursuing a simple five-phase process that can be tailored to any environment in order to implement virtual solutions in a secure manner. Through infrastructure consolidation strategy and design, administrative process management, network strategy and design in extending the layered security model, configuration management, and risk assessment, this five-phase approach addresses specific virtualization security risks in order to strengthen both the security and operational benefits virtualization offers the business.

Filed Under: News Tagged With: research, Research and Markets, research report, virtsec, virtualisation, virtualisation security, virtualization, virtualization security, Virtualization Security: The Early Stages of a New Batt

0wning Xen … In More Detail

August 25, 2008 by Kris Buytaert Leave a Comment

Over at her own blog, Joanna Rutkowska from Invisible Things has some updates on their findings about Xen security as we earlier reported.

Joanna argues that most of the attacks presented indeed require that the attacker first gains access to the Dom0 before he can launch the attacks but that doesn’t take away the severeness of the issues.

Other rootkits also require for the attacker to first gain root access before he can hide his toolset from the eyes of the administrator.

She continues to argue that other attacks already provide people with potential access from DomU to Dom0 via a virtual machine escape bug

But even there the attacker first has to gain root in the DomU before he can potentially climb up to Dom0

Still there’s a significant difference in gaining (root) access, and hiding the fact that you got it. But indeed neither of both should be possible

Filed Under: Guest Posts Tagged With: rutkowska, security, virtsec, Xen

0wning Xen?

August 11, 2008 by Kris Buytaert 1 Comment

InvisibleThings.org posted some more details on their Xen Owning Trilogy session at last weeks Black Hat conference in Las Vegas.

Joanna Rutkowska and her crew gave a series of 3 talks discussing different potential security issues with Xen. With the VirtSec awareness growing this obviously is an important topic .

When quickly skimming trough the presentations the big question that arise is , how relevant is this all for a day to day production environment. Given the fact that some exploits assume you already root before you can install a stealth backdoor and others rely on specific hardware features that might or might not be available in your setup things might be that critical yet.

All 3 talks can be found on the Invisiblethingslab.com site

Virtualization.com will have a closer look at the discussed issues and we’ll be back with more detail later.

Filed Under: Guest Posts, People Tagged With: Blackhat, invisiblethings, invisiblethings labs, Joanna Rutkowska, security, virtsec, Xen

A Round Table on Virtualization Security with Industry Experts

July 30, 2008 by Kris Buytaert 3 Comments

Virtualization security or ‘virtsec’ is one of the hottest topics in virtualization town. But do we need another abbreviation on our streets? Does virtualization require its own security approach and how would it be different from the physical world?

Different opinions fly around in the blogosphere and among vendors. Some security experts claim there is nothing new under the sun and the VirtSec people are just trying to sell products based on the Virtualization Hype. Some see a genuine need to secure new elements in the infrastructure, others claim that Virtualization allows new capabilities to raise security from the ground up and cynics claim it is just a way for the Virtualization industry to get a larger piece from the security budget.

So our editors Tarry and Kris set out to clarify the different opinions, together with the support of StackSafe, they organized a conference call with some of the most prominent bloggers, industry analyst and vendors in this emerging field.

On the call were Joe Pendry (Director of Marketing at StackSafe), Kris Buytaert (Principle at Consultant Inuits), Tarry Singh (Industry/Market Analyst Founder & CEO of Avastu), Andreas Antonopoulos (SVP & Founding Partner at Nemertes Research),Allwyn Sequeira (SVP & CTO at Blue Lane), Michael Berman (CTO at Catbird), Chris Hoff (Chief Security Architect – Systems & Technology Division and Blogger at Unisys) and Hezi Moore (President, Founder & CTO at Reflex Security)

During our initial chats with different security experts their question was simple: “what does virtsec mean?”. Depending on our proposed definition, opinions varied.

So obviously the first topic for discussion was the definition of VirtSec:

Allwyn Sequeira from Blue Lane kicked off the discussion by telling us that he defined Virt Sec as “Anything that is not host security or that’s not network-based security. If there’s a gap there, I believe that gap – in the context of virtualization – would fall under the realm of virtualization security. ” He continued to question who is in charge of Inter-VM communication security, or how features such as Virtual Machine Migration and Snapshottiting add a different complexity to todays infrastructure.

Andreas Antonopoulos of Nemertes Research takes a different approach and has two ways of looking at VirtSec “How do you secure a virtualized environment” and in his opinion a more interesting question is “How do you virtualize all of the security infrastructure in an organization” Andreas also wonders how to call the new evolutions “What do you call something that inspects memory inside of VM and inspects traffic and correlates the results? We don’t really have a definition for that today, because it was impossible, so we never considered it.” He expects virtualization to change the security landscape “Just like virtualization has blurred the line between physical server, virtual server, network and various other aspects of IT, I see blurring the lines within security very much and transforming the entire industry.”

Hezi Moore from Reflex Security wants to search for actual problems. He wants to know what changed since we started virtualizing our infrastructures. “A lot of the challenges that we faced before we virtualized; are still being faced after we virtualized. But a lot of them got really intensified, got much more in higher rate and much more serious.”

Michael Berman from Catbird thinks the biggest role of VirtSec still is Education, “..and the interesting thing I find is the one thing we all know that never changes is human nature.” He is afraid of virtualization changing the way systems are being deployed with no eye on security. Virtualization made it a lot easier to bypass the security officers and the auditors. The speed at which one can deploy a virtual instance and a bigger number of them has changed drastically regarding to a physical only environment, and security policies and procedures have still to catch up. “We can have an argument whether the vendors are responsible for security, whether the hypervisors about who attack servers. The big deal here is the human factor. “

Chris Hoff summarizes the different interpretations of VirtSec in three bullets:

  • One, there is security in virtualization, which is really talking about the underlying platforms, the hypervisors. The answer there is a basic level of trust in your vendors. The same we do with operating systems, and we all know how well that works out.
  • Number two is virtualized security, which is really ‘operationalization’, which is really how we actually go ahead and take policies and deploy them.
  • The third one is really gaining security through virtualization, which is another point.

Over the past decade different Virtualization threats have surfaced, some with more truth than others. About a decade ago when Sun introduced their E10K system, they were boasting they really had 100% isolation between guest and host OS. But malicious minds figured out how to abuse the management framework to go from one partition to another. Joana Rutkowska’s “Blue Pill” Vulnerability Theory turned out to more of a myth than actual danger. But what is the VirtSec industry really worried about?

It seems the market is not worried about these kind of exploits yet. They are more worried about the total lack of security awareness. Andreas Antonopoulos summarizes this quite well “I don’t see much point in really thinking too much about five steps ahead, worrying about VM Escape, worrying about hypervisor security, etc. when we’re running Windows on top of these systems and they’re sitting there naked”.

Allwyn from Blue Lane however thinks this is an issue…certainly with Cloud Computing becoming more popular, we suggest to seriously think about how to tackle deployment of Virtual Machines in environments we don’t fully control. The Virtual Service Providers will have to provide us with a secure way to manage our platforms, and enough guarantee that upon deployment of multiple services these can communicate in a secured and isolated fashion.

Other people think we first have to focus on the Human Factor, we still aren’t paying enough attention to security in the physical infrastructure, so we better focus on the easy to implement solutions that are available today, rather than to worry about, exploits that might or might not occur one day.

Michael Berman from Catbird thinks that Virtualization vendors are responsible to protect the security of their guest. A memory Breakout seems inevitable, but we need to focus on the basic problems before tackling the more esoteric issues…He is worried about scenarios where old NT setups, or other insecure platforms are being migrated from one part of the network to another, and what damages can occur from such events.

Part of the discussion was about standardization, and if standardization could help in the security arena. Chris Hoff reasons that today we see mostly server virtualization, but there is much more to come, client virtualization, network virtualization, etc. As he says: “I don’t think there will be one one ring zero to rule them all.”. There are more and more vendors joining the market, VMWare, Oracle, Citrix, Cisco, Qumranet and different others have different Virtualization platforms and some vendors have based their products on top of them.

In the security industry standardization has typically been looked at as a bad thing, the more identical platforms you have the easier it will be for an attacker, if he breaks one, he has similar access to the others. Building a multi-vendor or multi-technology security infrastructure is common practice.

Another important change is the shift of responsibilities, traditionally you had the Systems people and the network people, and with some luck an isolated security role. Today the Systems people are deploying virtual machines at a much higher rate , and because of Virtualization they take charge of part of the network, hence giving the Network people less control. And the security folks less visibility

Allwyn Sequeira from Blue Lane thinks the future will bring us streams of Virtualization Security, the organizations with legacy will go for good VLAN segmentation and some tricks left and right because the way they use Virtualization blocks them for doing otherwise. He thinks the real innovation will come from people who can start with an empty drawing board.

Andreas Antonopoulos from Nemertes Research summarized that we all agree that the Virtualization companies have a responsibility to secure their hypervisor. There is a lot of work to be done in taking responsibility so that we can implement at least basic security. The next step is to get security on to the management dashboard , because if the platform is secure, but the management layer is a wide open goal, we haven’t gained anything.

Most security experts we talked to still prefer to virtualize their current security infrastructure vover the products that focus on securing virtualization. There is a thin line between needing a product that secures a virtual platform and changing your architecture and best practices to a regular security product fits in a Virtualized environment.

But all parties seem to agree that lots of the need for VirtSec comes from changing scale, and no matter what tools you throw at it, it’s still a people problem

The whole VirtSec discussion has just started, it’s obvious that there will be a lot of work to be done and new evolutions will pop up left and right. I`m looking forward to that future So as Chriss Hoff said “Security is like bell bottoms, every 10-15 years or so it comes back in style”, this time with a Virtualization sauce.

Listen to the full audio of the conference call!

Filed Under: Featured, Guest Posts, Interviews, People Tagged With: Allwyn Sequeira, Andreas Antonopoulos, Avastu, Blue Lane, Catbird, Chris Hoff, conference call, Hezi Moore, interview, Inuits, Joe Pendry, Kris Buytaert, Michael Berman, Nemertes Research, Reflex Security, round table, StackSafe, Tarry Singh, Unisys, virtsec, virtualisation, virtualization, virtualization security

Reflex Security Introduces Reflex Virtual Security Center

July 22, 2008 by Robin Wauters Leave a Comment

—

Reflex Security, a virtualization security management company, today announced the availability of Reflex Virtual Security Center (VSC), which aims to provide heightened visibility and control for virtualized environments. Reflex VSC provides a single authoritative visual interface to secure the virtual data center.

According to the company, its solution is the industry’s first to take the approach that without the ability to visualize both the logical and physical elements of the virtual infrastructure, effective and efficient security cannot be achieved. Reflex VSC increases the visibility of an organization’s virtual infrastructure so it can be properly secured, enabling organizations to align virtualization security solutions with real business objectives.
Reflex VSC invokes best practice methodology by first discovering the entire virtual environment to determine the security controls needed to fully secure the infrastructure with Reflex VSA. This approach dramatically simplifies and automates the security of VMs, while reducing the potential for improper configurations.
Recognizing customer need for cross-functional centralized security controls for their virtual infrastructure, Reflex VSC harnesses the power of virtualization to simplify and automate routine activities such as security deployment, policy configuration, and event correlation and reporting. With Reflex VSC, operations and security teams have a single authoritative visual interface to administer, secure, and monitor the dynamic virtual infrastructure. This results in better network and event visibility for a faster and more effective security response. Through extensive real-time and historical visual reporting, Reflex VSC gives administrators the tools they need to efficiently meet stringent compliance requirements.
Through the combination of visibility and revision control provided by Reflex VSC, Reflex VSA has been enhanced, giving administrators the insight required to understand, monitor and secure dynamic virtual environments. The combined functionality provides a broader view of virtual infrastructure which can stop threats earlier on in the environment. Together, Reflex VSA and VSC provide the ability to view alerts and events in context to the virtual infrastructure.
Reflex VSC is available now and is included in the purchase of Reflex VSA.
[Source: Marketwatch]

Filed Under: News Tagged With: Reflex, Reflex Security, Reflex Virtual Security Appliance, Reflex Virtual Security Center, Reflex Virtual Security Center (VSC), Reflex VSA, Reflex VSC, virtsec, Virtual Security Appliance, Virtual Security Center, virtualisation, virtualization, virtualization security, VSA, VSC

  • « Go to Previous Page
  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to Next Page »

Primary Sidebar

Tags

acquisition application virtualization Cisco citrix Citrix Systems citrix xenserver cloud computing Dell desktop virtualization EMC financing Funding Hewlett Packard HP Hyper-V IBM industry moves intel interview kvm linux microsoft Microsoft Hyper-V Novell oracle Parallels red hat research server virtualization sun sun microsystems VDI video virtual desktop Virtual Iron virtualisation virtualization vmware VMware ESX VMWorld VMWorld 2008 VMWorld Europe 2008 Xen xenserver xensource

Recent Comments

  • C program on Red Hat Launches Virtual Storage Appliance For Amazon Web Services
  • Hamzaoui on $500 Million For XenSource, Where Did All The Money Go?
  • vijay kumar on NComputing Debuts X350
  • Samar on VMware / SpringSource Acquires GemStone Systems
  • Meo on Cisco, Citrix Join Forces To Deliver Rich Media-Enabled Virtual Desktops

Copyright © 2025 · Genesis Sample on Genesis Framework · WordPress · Log in

  • Newsletter
  • Advertise
  • Contact
  • About