Four Things You Need to Do to Protect your VMs

Four Things You Need to Do to Protect your VMs

According to Frank Gens, IDC Senior VP & Chief Analyst at Trend Micro, the number one concern about cloud services is security.

As you know, physical firewalls don’t inspect or filter the vast amount of traffic that originates from a hypervisor running several virtualized servers. It turns out that this is a significant vulnerability when you consider that VMs start, stop, and move from one hypervisor to another at the click of a button.

Additionally, few hypervisors have the access controls that even the most basic file server has, and once someone gains access to the hypervisor, they could potentially access and control all of the VMs housed there.

Finally, protective features have to handle all these movements and activities, and agent backups are complex to manage — with one agent required per VM.

Even with the vulnerabilities clearly spelled out, many IT managers may still have “secure the hypervisor” way down on their to-do list – there are just so many priorities. That’s fine, of course – until the unthinkable happens.

So how should IT Managers protect VMs? Here are the four key things to consider:

[Read more…]

ADA Compliancy: Be prepared or beware [IBM]

Would any serious business knowingly ignore 10% of its prospects or customers? You’d think not. But the fact is more than 10% of the online population has a disability – that’s 750 million people worldwide and 55 million Americans. And while it may seem like a no-brainer to ensure websites are accessible to this huge audience, a lot of organizations – either through ignorance or indifference – have not made catering to this vast group a priority.

Case in point: Target, which in 2008 agreed to a $6 million class action settlement after the retail giant was sued by a blind advocacy group had alleged its website was inaccessible to the blind and violated the Americans with Disabilities Act (ADA).

That’s likely to happen a lot more as the US Department of Justice actively pursues companies and organizations out of compliance with ADA, like Section 508, which establishes requirements for any electronic and information technology developed, maintained, procured, or used by the federal government.

In response, more and more human resources departments are sounding the alarm bell in an effort to accommodate ADA concerns and avoid a negative impact on their organizations – like loss of customers, avoidance of lawsuits and harm to overall brand image. Unfortunately, they sometimes come face to face with IT staff occupied with other pressing concerns and web developers who have never had to make ADA compliance a standard part of their development cycle.

Two interrelated hurdles to ADA compliance are, not surprisingly, time and cost – both of which run high when compliance testing is done manually. But a lot of the pain IT professionals feel when dealing with compliance can be easily avoided with two relatively simple steps: [Read more…]