The last virtual mile: Visibility and control on the virtualized path [Symantec]

As organizations move to their next phase of virtualization, with virtualized environments beyond 30%, many still worry about the infrastructure and application failures that were not as significant when applications were virtualized in the lower tiers.

Up here, there’s a much more serious risk to these business critical applications. In fact, more than half of respondents in a recent survey said their main challenge now was ensuring application availability. A big problem, though, has been finding a simple and reliable solution that can protect Tier 1 and Tier 2 applications and minimize the downtime associated with application failures within virtual machines.

While thankfully most customers aren’t choosing to leave their business critical applications unprotected, they are often delaying that last mile of virtualization or they’re moving into virtualization by compromising in one of two ways:

[Read more…]

Demystifying security in a virtual environment [Trend Micro]

We’ve been thinking about cloud a lot.  My goal is to help demystify security in a virtual environment.

What are we doing with cloud computing?

There are still servers, storage, networking, software, and security.  We’re really just implementing them in different ways. Rather than having file servers at every location we are centralizing our data (again as we did 20 years ago).  Instead of having multiple physical servers we are virtualizing our servers.  We’re even centralizing our client computing with a single instance of an OS across the network.

All I have to say is it’s pretty sweet.  I’m a huge fan.

It is much easier for us to secure our data when we know where it is.  [Read more…]