Over the past few weeks, we’ve written extensively about the coming “perfect storm” of the confluence of multiple factors within the network. Today’s topic deals with yet another aspect of that storm ...
Defining a set of security and compliance policies is a key first step. But enforcing security policy is not as easy. Defining a set of security and compliance policies is a key step. Having a ...
We’ve already discussed the relative lack of tools to secure virtualized servers and infrastructures, the problems inherent in adding bolt-on tools, risks in connecting a VM to the wrong part of a ...
The trend of virtualization is one of the most powerful forces in technology. Using data abstraction and control, the functions of compute, networking, and storage are being virtualized to create a ...
There are plenty of virtualization security vendors leaping out of the shadows. Here are five new players worth a look.Altor Networks. This company's Virtual Network Security Analyzer and Virtual ...
Virtualization and cloud computing have disrupted the security industry to its core. We have not quite figured out how to deal with very dynamic infrastructure while most security is implemented in a ...
In April 2004 I wrote my first article on the topic of virtualization security. I was trying to bring attention to the security aspects of this “new” technology that was getting quite a bit of hype at ...
Virtualization can be both a blessing and a curse, serving up improved security while at the same time hiding dangers Almost any IT department worth its salt is deploying virtualization technology ...
According to a recent press release from analyst firm Gartner, virtualization offers organizations the opportunity to reduce costs and increase agility, however, if this is done without implementing ...
Sangfor HCI is one of the best VMware competitors because it provides integrated security (Athena) with unified operations.
Much of what is happening with the new products is a result of Sun's combining its network management technology with the storage technology from its StorageTek acquisition, said Larry Singer, senior ...
We’ve already discussed the relative lack of tools to secure virtualized servers and infrastructures, the problems inherent in adding bolt-on tools, risks in connecting a VM to the wrong part of a ...