Virtualize Securely - VM Introspection and Automated Security in Action

Johnnie Konstantas

Subscribe to Johnnie Konstantas: eMailAlertsEmail Alerts
Get Johnnie Konstantas: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Johnnie Konstantas
Network architectures are in the midst of a massive transformation. Not too long ago, traditional network designs began to strain under increased demand for compute and storage. This saw the advent of server and storage virtualization, giving organizations on-demand access to the resou...
Well it’s official. On October 28, the PCI Security Standards Council (PCI SSC) released v2.0 of the Payment Card Industry...
Friday October 22nd signified the wrap up of the week-long 2010 Interop New York Conference, which is hosted by UMB...
This year’s VMworld was a record-breaking one both in terms of attendance and content and thanks to the blogosphere here...
The date for VMworld 2010, San Francisco, Monday August 30th, is fast approaching, and we at Altor are all abuzz...
These days when cloud security is mentioned, most of us now have come to expect that the topic of data center virtualization, one near and dear to Altor’s heart, is not far behind. Especially since it is – after all near de-facto architecture – for most private clouds and some public ...
This week, hundreds of business and technology executives, representing Global 2000 and Fortune 500 companies, will converge in sunny San...
If you are using VLANs or your perimeter firewall technology to secure your virtual environment, you are removing a lot of dollar signs from virtualization’s promised savings
Recently it was discovered that the Zeus botnet was running an unauthorized command and control center on a public cloud computing infrastructure, marking the first time the cloud has been used for this type of illegal activity. It appears that hackers exploited a web server VM, using ...
Altor’s newest release, codenamed duvel and now released as v4.0 packs a wallop of new features for security automation and compliance assessment and we felt this was good cause for some serious highlighting.
A lot of the technology news for the week is coming out of EMCWorld, where chief executive Joe Tucci is...
If you’re reading this it’s likely that my mother sent you the link or you are seriously considering a private cloud deployment. Working off the latter, you are understandably worried because Google Alerts is filling your daily inbox with reasons to delay the implementation but operati...
This is the core message of a recent Gartner report which outlines the security risks associated with virtualizing critical workloads...
Everything from the wonderfully apt and beautifully rendered Rosetta Stone theme, to the impressive speaker and keynote line up, to...
Some of the industry’s biggest names have come together to propose an architecture for the safe deployment of virtualized applications...
Organizations need a reference architecture by which they can size up cloud computing architectures. Microsoft has been making headlines lately...
Make sure you’ve considered your security posture before virtualizing your workloads and jumping into the cloud. It is not surprising...
Traditional network security devices like firewalls and intrusion detection scanners (IDS) are blind to traffic between VMs At last week’s...