Posts Tagged ‘ Symantec ’

Does Virtualization Security Really Matter?

Does Virtualization Security Really Matter?

Whatever happened to virtualization security? Back in the day, everyone was talking about blue pills and red pills, about sideways attacks and DOM-0 threats, about security profiles and isolation policies, about perimeter defense and security embedded in the hypervisor. Then, all of a sudden, the buzz seemed to disappear. It really seems like organizations simply don’t have the time, money, desire, or otherwise to pursue dedicated virtualization security. Indeed, it seems like most of the pure-play virtualization security vendors have folded, been sold, or reworked their strategy. For example: Blue Lane ended up being sold to VMware, reputedly at a bargain price, after failing to get any traction. Third Brigade was rolled up into Trend Micro, and now offers a solution for combined ‘physical, virtual and cloud’ protection. Reflex and Catbird have repositioned to highlight their value in configuration, compliance, and/or systems management (in addition to their security value). Tripwire…

Read more »

Microsoft Acquires Opalis

Microsoft Acquires Opalis

Today Microsoft Corporation (NASD:MSFT) announced a definitive agreement to acquire Opalis Inc., the leading independent vendor of IT Process Automation (ITPA) software. IT Process Automation (ITPA) is a Data Center Automation (DCA) discipline that EMA defines as “the ability to automate and integrate the workflow of complex, multi-discipline IT management processes.” This automation can replace many manual, resource-intensive, and error-prone activities that typically cross multiple IT components, disciplines, and/or departments. ITPA delivers exceptional results including freeing up 77% more staff for strategic projects, providing more than 60 additional hours of system availability per year, and saving an average $500,000 more per year on staff costs than other Data Center Automation (DCA) disciplines.

Read more »

You Cannot Separate Security and Systems Management

You Cannot Separate Security and Systems Management

A few days ago I was pleased to brief again with Reflex Systems. Apart from the fact that they are doing some very cool things with virtualization management, their approach struck me as, if not unique, at least pleasantly rare. Good for them! What I liked most was that they are trying to break down the barriers between systems and security management.

Read more »

Why ‘Endpoint Virtualization’?

Back in September 2009, EMA released a research report that I authored, titled Real World Experiences of Endpoint Virtualization*. In it, I defined and used a new term (for EMA), ‘Endpoint Virtualization’. 

Read more »

Virtual Appliances – More Risk than Reward?

I have to say – and I have said it before – I am not a great fan of the ‘virtual appliance’ model for delivering enterprise management software. Specifically, I have ongoing concerns about how these software appliances break compliance, security, and other important management and policy requirements.

Read more »