Defining a set of security and compliance policies is a key first step. But enforcing security policy is not as easy. Defining a set of security and compliance policies is a key step. Having a ...
Acumera, a leading provider of secure edge connectivity, visibility, and computing solutions, has announced the acquisition ...
We’ve already discussed the relative lack of tools to secure virtualized servers and infrastructures, the problems inherent in adding bolt-on tools, risks in connecting a VM to the wrong part of a ...
The trend of virtualization is one of the most powerful forces in technology. Using data abstraction and control, the functions of compute, networking, and storage are being virtualized to create a ...
Virtualization is proving its ability to reduce costs, but a new set of security threats is emerging as IT managers struggle to adjust to new ways of managing risk. Government IT upgrade projects may ...
Virtualization and cloud computing have disrupted the security industry to its core. We have not quite figured out how to deal with very dynamic infrastructure while most security is implemented in a ...
In April 2004 I wrote my first article on the topic of virtualization security. I was trying to bring attention to the security aspects of this “new” technology that was getting quite a bit of hype at ...
VergeIO wants to win over companies that are discontent with Broadcom's VMware changes. Its latest VergeFabric SDN release includes more advanced BGP routing, security monitoring, and ...
According to a recent press release from analyst firm Gartner, virtualization offers organizations the opportunity to reduce costs and increase agility, however, if this is done without implementing ...
Virtualization can be both a blessing and a curse, serving up improved security while at the same time hiding dangers Almost any IT department worth its salt is deploying virtualization technology ...
Much of what is happening with the new products is a result of Sun's combining its network management technology with the storage technology from its StorageTek acquisition, said Larry Singer, senior ...
We’ve already discussed the relative lack of tools to secure virtualized servers and infrastructures, the problems inherent in adding bolt-on tools, risks in connecting a VM to the wrong part of a ...