The Virtualization Practice

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "The Virtualization Practice"

Transcription

1 The Virtualization Practice White Paper: Security Requirements of Hybrid Clouds: A Product Comparison! Edward L. Haletky Analyst Virtualization and Cloud Security! The Virtualization Practice Sponsored by Symantec Version 1.0 February The Virtualization Practice, LLC. All Rights Reserved. All other marks are property of their respective owners. Abstract For the past few years I've been working on comparing virtualization and hybrid cloud security products, identifying what they protect, and where they fit within the virtual and cloud environment. One aspect of this type of comparison is determining requirements and figuring out what to secure. Ultimately, we need to secure our data to be compliant, but how that is done, depends on requirements. In this white paper I present the requirements tied to a reference architecture in order to determine where each set of solutions from each company fit into the secure hybrid cloud. SECURITY)REQUIREMENTS)OF)HYBRID)CLOUDS:)A)PRODUCT)COMPARISON) 1!

2 Table of Contents II.! Requirements... 3! III.! Hypervisor Vendor Provided... 4! VMware vcloud Suite... 4! Microsoft Hyper-V... 5! Citrix XenServer/ Redhat Enterprise Virtualization (RHEV)... 6! IV.! Third Parties... 7! Trend Micro... 7! McAfee... 9! Symantec... 10! V.! Conclusion... 11! VI.! About The Virtualization Practice... 12! VII.! About Symantec... 12! VIII.! References... 13! 2) SECURITY)REQUIREMENTS)OF)HYBRID)CLOUDS:)A)PRODUCT)COMPARISON!

3 II. Requirements Requirements come from an organization's security and compliance policies, but these requirements should also address a defense in depth based approach on how an what data flows through the secure hybrid cloud. Some data needs more security than others. As such we present here a logical reference architecture taken from The Virtualization s Practice s Secure Hybrid Cloud Reference Architecture, to provide a fail-safe defense in depth with properly placed security controls. This desire translates into a set of logical controls based on the way data flows through the hybrid cloud environment and that all starts with the end user computing device. Eventually the end user computing device will talk to a datacenter and inside that datacenter will exist some form of defense in depth whose requirements follow. While we can never forget the security of the end user computing device the varied forms of this can be a daunting task. So for this purpose we are ignoring the end user computing device and starting only within the data center. We can also assume that all communication to the device will be unprotected unless an encrypted virtual private network is in use to our external switch and since we are discussing hybrid clouds we can also assume the internals of the hybrid cloud are 100% virtualized. Figure 1: Complete Hybrid Cloud Defense in Depth Given that we have a 100% virtualized cloud we can assume a few more items: virtual switches will be involved, there is a need for defense in depth within the virtual environment as well as the physical environment, and that these should work hand in hand. As such we have a logical diagram of defense in depth protections in figure 1. Figure 1 is divided into rows and columns but more importantly show a flow of data and policy within the virtual and cloud environments. SECURITY)REQUIREMENTS)OF)HYBRID)CLOUDS:)A)PRODUCT)COMPARISON) 3!

4 Row 2 ends up being more about the virtual machines (2B and 2D) and applications (2A) to be run within your virtual environment as well as the defense in depth that surrounds the virtual machines (2C and 2E) in the form of introspective APIs in which security can get as close to the virtual machines as possible without having to understand either the application or the guest operating systems involved. In essence, introspection sits below the virtual machine. These APIs provided additional security functionality, and while available to most hypervisors only one (vsphere) has fully implemented them. Row 3 is about endpoint security, and a very important part in any defense in depth as well as a way to meet compliance requirements. This is the layer of our logical requirements and architecture where many third party vendors have products, as they are not truly implemented by hypervisor vendors, instead the hypervisor vendors concentrate on providing APIs to enable workload offload and introspective capabilities. In some cases, there are proof of concept products from hypervisor vendors that fit this space but they are very limited. Row 4 are base requirements for most defense in depth implementations seen today and all but Early Warning Systems (4A) well known today for both the physical and virtual environments. Early Warning Systems specifically designed for a virtual environment do not necessarily exist today, but they are becoming available. This is an opportunity for security vendors. The last element of our requirements and reference architecture is a security assessment that wraps the entire hybrid cloud environment. This assessment should cover as many compliance requirements as possible but also provide a real measure of security, not just compliance. III. Hypervisor Vendor Provided Each hypervisor vendor provides some level of security that meets some of our requirements but not all. For that we always need to include third party products. We will look at third party plugins later, but for now we need to see what each hypervisor vendor brings to the table. VMware vcloud Suite VMware brings one of the more complete solutions to the table. They have filled almost all our requirements in rows 1 (infrastructure) and 2 (virtual machine protection) as well as a comprehensive assessment tool, however they are lacking in the last two rows (3 and 4) with respect to endpoint security and the more traditional components of any defense in depth. After all VMware is not a security vendor, even though they provide security tools and APIs for use with security. Figure 2 shows what VMware brings to the table with the colored boxes indicate that VMware has a solution for the requirement, while partial colored boxes imply a partial solution within their security tool portfolio. Those elements in white (1C, etc.) are missing from VMware s security portfolio. However, as we stated before, VMware provides a comprehensive set of APIs and they have a proof of concept for data loss prevention (vcns App + Data Security) that covers a very small part of all DLP requirements, specifically looking for indication of personal identifiable information (PII) such as social security, credit card, and other numbers in clear text within the virtual 4) SECURITY)REQUIREMENTS)OF)HYBRID)CLOUDS:)A)PRODUCT)COMPARISON!

5 machine. Data security does not prevent data from leaving the system but does look for unencrypted data. This proof of concept may actually be sufficient for small retail establishments as it looks for specific personally identifiable information only. Hence why it is a partial fill of the requirements. The other point in which VMware provides a partial capability is in the area of policy management. VMware can manage the policy of their own tools quite well and provides usable APIs into which third parties can connect, but do not manage the policy on more than their own tools. In the infrastructure arena the one major lack is in the ability to provide an encrypted repository in order to maintain encryption of data at rest. Their approach is to depend upon third parties and underlying hardware. Figure 2: VMware vcloud Suite (colored boxes => requirement met) VMware vsphere itself provides some protections, but you really need VMware vcns, SRM, and Configuration Manager (vcm) to provide the other bits of the puzzle, which are all available at differing levels of VMware vcloud Suite. vcm requires vcloud Suite Enterprise but vcns and SRM are available at vcloud Suite Standard. When you tie these tools with the Cisco Nexus 1000V or IBM 5000V virtual switch extensions you gain more in the way of network port level security than exists natively within VMware s virtual switch components. Microsoft Hyper-V Microsoft has provided a new version of their hypervisor, which adds quite a few features. From the security perspective, Microsoft has added more port level network security capabilities, that are only found in third party virtual switch for VMware vsphere as well as the ability to encrypt data at rest by allowing the encryption of the entire storage repository used by virtual machines. SECURITY)REQUIREMENTS)OF)HYBRID)CLOUDS:)A)PRODUCT)COMPARISON) 5!

6 As seen in Figure 3, Hyper-V provides less overall functionality than VMware vcloud Suite as indicated by the colored boxes. Figure 3: Hyper-V + System Center Defense in Depth (colored boxes => requirement met) Yet, when you add System Center to the mix for Hyper-V, you do gain the ability to manage your own hyper-v based cloud but without any new security controls. Microsoft provides the majority of the operating systems virtualized today, so most if not all their endpoint security mechanisms are part of those operating systems. For Windows based virtual environments these add quite a bit of benefit, but lack for other operating systems, hence why the requirements are not met for much of rows 2-4. Citrix XenServer/ Redhat Enterprise Virtualization (RHEV) The last entry into our hypervisor discussion is Citrix XenSever and RHEV that is based on KVM. Figure 4 shows how Citrix XenServer and RHEV fair with our full list of requirements with the colored boxes implying the requirement has been met. Other than port level security provided by the open vswitch project, there is no vendor provided additional security mechanisms available. While it is possible to deploy Linux systems as firewalls, proxies, authentication and authorization sources, they are not bundled as part of the hypervisor or any cloud packages. 6) SECURITY)REQUIREMENTS)OF)HYBRID)CLOUDS:)A)PRODUCT)COMPARISON!

7 Figure 4: Xen/KVM/OpenStack Defense in Depth (colored boxes => requirement met) IV. Third Parties There exists a rich ecosystem surrounding each of these hypervisor vendors with respect to security offerings. Choosing a starting point is always difficult so we are going to concentrate on those that fill in the requirements for rows 3 and 4 of our defense in depth logical architecture. In addition, we are also looking at any form of security assessment that meets not only many compliance requirements but also that provides a real view of security within the hybrid cloud. Trend Micro One of the first to hook into the introspective APIs for VMware vsphere was Trend Micro with their Deep Security product. Now Trend Micro provides three products that fill in many of our requirements: Deep Security, Secure Cloud, and Data Loss Prevention. These two products combine to fill in our requirements as seen in figure 5 (the grey-blue filled boxes) and as follows: 1C - Encrypted Repository but not for running virtual machines but for holding data accessed by those virtual machines, so while the VM is not protected, the data accessed by the application is protected 2C and 2E Deep Security provides a VMware VMsafe-Net based Introspective firewall for VMware vsphere but not for any other hypervisor. 3A - Deep Security provides some level of application security for web service based applications through its implementation of a web reputation service. SECURITY)REQUIREMENTS)OF)HYBRID)CLOUDS:)A)PRODUCT)COMPARISON) 7!

8 3B Deep Security provides offloaded antivirus on vsphere hosts using vsphere Endpoint Security mechanisms. In addition, Deep Security provides in-vm agents for anti-virus and anti-malware protection for systems that do not have an introspective component such as physical systems, Hyper-V, Xen, or KVM. 3C Deep Security also provides offloaded and in-guest file integrity monitoring. 3E Data Lose Prevention exists as a part of Trend Micro s Data Loss Prevention product 4B Policy is managed from within Deep Security and this policy can be used by Secure Cloud to ensure data is not accessed unless all security requirements are met. In addition, Trend Micro offers a unified policy manager for many of their existing products. Figure 5: TrendMicro Defense in Depth for vcloud Suite 4E Log Analysis is provided as a component of Deep Security. The last and probably most important of our requirements, a full security assessment is not met by Trend Micro as instead market a product from Qualys under their imprint. Since this product is a, Software as a Service, cloud-based application, there is a chance based on security policy that some systems would not be assessed. TrendMicro misses some of our requirements in rows 3 and 4, but at the same time providing different approaches to solving some elements within rows 1 and 2, which we attribute directly to the virtual environment. Encryption of Data at Rest is one area that TrendMicro provides a necessary means to protect data. 8) SECURITY)REQUIREMENTS)OF)HYBRID)CLOUDS:)A)PRODUCT)COMPARISON!

9 McAfee McAfee provides a wide range of products that fit our requirements, however some fit better than others. McAfee products work with a virtualization environment and just recently started to use introspective APIs within VMware vsphere environments. Figure 6 shows what aspects of our requirements the McAfee products, which are concentrated on row 3 of our requirements, meet. Figure 6: McAfee w/vmware vcloud Suite McAfee meets our requirements as follows: 3A Application protection is met via some aspects McAfee Application Control 3B McAfee MOVE meets our requirement for anti-virus and anti-malware protection, in addition McAfee now provides introspective support for offloaded anti-virus and antimalware detection 3C McAfee Application Control provides File Integrity Monitoring 3D McAfee Application Control provides Mandatory Access Controls that makes use of SolidCore s technology integrated into McAfee s products. 3E McAfee s Data Loss Prevention Endpoint service provides Data Loss Prevention and fills the last component of row 3 4B Policy of all McAfee s products is controlled by their own epolicy Orchestrator policy manager 4E Log Analysis is provided by McAfee s Enterprise Log Manager SECURITY)REQUIREMENTS)OF)HYBRID)CLOUDS:)A)PRODUCT)COMPARISON) 9!

10 McAfee fills out all of the very important aspects of row 3 (endpoint security) and leaves the virtual environment to the hypervisor vendor or some other third party vendor. However, they show some lack in row 4 and within the security assessment requirement. It can be argued that McAfee has an authentication and authorization play as well through their work with the Cloud Security Alliance, but unfortunately, there is no distinct product that meets these needs. While McAfee does Total Protection for Compliance as a multi-compliance tool, it seems to be missing a tool that assesses overall security regardless of compliance but instead based on an organizations security policy. Symantec Symantec is the third of our series of endpoint protection tools under investigation and like McAfee has targeted row 3 and 4 of our requirements as seen in Figure 7. In essence, they provide nearly every aspect of our requirements with some notable lacks (such as an encrypted repository -1C; and what all other vendors miss as well an Early Warning System 4A). Figure 7: Symantec Defense in Depth for vcloud Suite Symantec fills out our requirements with the following tools and products: 1B Data Replication is available through Symantec NetBackup and BackupExec 3A is met via Symantec s Application HA technology 3B Symantec Endpoint Protection (SEP) provides agent-based anti-virus and antimalware protections using a heuristic approach to improve overall hit rates. 10) SECURITY)REQUIREMENTS)OF)HYBRID)CLOUDS:)A)PRODUCT)COMPARISON!

11 3C Symantec Critical System Protection (CSP) provides agent-based file integrity monitoring 3D In addition, CSP provides mandatory access controls, white listing, and sandbox technologies to prevent applications from accessing ports, files, and other system resources. 3E Symantec Data Loss Prevention provides data loss prevention support 4B Symantec has its own integrated management tool for managing the policy across its suite of products. 4C Authorization could be provided by Symantec O3 4D Authentication could be provided by Symantec O3 4E Symantec Security Information Manager provides log analysis capabilities. Symantec also provides two methods to perform security assessments either through their Critical System Protection product for specific environments as well as the Symantec Control Compliance Suite (CCS). While CCS covers compliance, Critical System Protection covers more around security best practices for virtual environments including such things as management system isolation and other hardening guidance from virtualization vendors. V. Conclusion Given our set of requirements and the data flow architecture within a secure hybrid cloud it can easily be seen that no one tool will fit all our needs. You need a combination of tools that integrate together to provide a total defense in depth for any virtual or cloud environment. We have just touched the tip of the iceberg with this comparison. Instead of looking just single products we have endeavored to show you solutions from the leading endpoint security companies. These solutions look past endpoint security to try and fill in all the gaps that are present within a hybrid cloud spanning multiple hypervisors. Could one company provide you all tools to fill in our requirements, perhaps, but at the moment it is a combination of companies that must include the hypervisor vendor. Security needs to also be centrally managed and at the moment we also see gaps in central management of security policy that is split between products from the same company or split between the security company and the hypervisor vendor. Unified policy management and automation is a goal that can only be achieved today using scripting of sometimes hidden APIs. When we combine technologies across all vendors we find that there is only one remaining gap in our defense in depth and that is our Early Warning System. Unlike SIEM and other standard security tools, the Early Warning System we mention is a combination of tools tying into a SIEM but also into the application to determine that something untoward or unexpected has happened within an application within moments of the unexpected action happening. Could such an action be a security issue, that requires some research, but by combining knowledge of the applications SECURITY)REQUIREMENTS)OF)HYBRID)CLOUDS:)A)PRODUCT)COMPARISON) 1 1!

12 normal behavior with security tools allows us to see if things have gone wrong faster than ever before. At the moment no vendor has combined application performance management tools and security knowledge into a product. Which is what is required to produce the early warning system we discuss. Which groupings of tools are better, well that depends mostly on the organization and their existing products, security policies, and requirements? However, we can draw the conclusion that some single source provides more coverage than others at this time. Does the count of tools within the solution matter? Not really, what does matter is whether or not they have integrated management, work within the virtual environment (and cloud), and meet our requirements. We have given you the requirements, how the tools from the vendors meet those requirements, it is now up to you to choose the best set for your environment. VI. About The Virtualization Practice The Virtualization Practice is the leading online resource of objective and educational analysis focusing upon the virtualization and cloud computing industries. Edward L. Haletky is the author of VMware vsphere(tm) and Virtual Infrastructure Security: Securing the Virtual Environment as well as VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers, 2 nd Edition. Edward owns AstroArch Consulting, Inc., providing virtualization, security, network consulting and development and The Virtualization Practice where is also an Analyst. Edward is the Moderator and Host of the Virtualization Security Podcast as well as a guru and moderator for the VMware Communities Forums, providing answers to security and configuration questions. Edward is working on new books on Virtualization. VII. About Symantec Symantec protects the world s information, and is the global leader in security, backup and availability solutions. Our innovative products and services protect people and information in any environment from the smallest mobile device, to the enterprise data center, to cloud-based systems. Our industry-leading expertise in protecting data, identities and interactions gives our customers confidence in a connected world. More information is available at https://www.symantec.com/critical-system-protection. 12) SECURITY)REQUIREMENTS)OF)HYBRID)CLOUDS:)A)PRODUCT)COMPARISON!

13 VIII. References Edward L. Haletky. VMware vsphere(tm) and Virtual Infrastructure Security: Securing the Virtual Environment, Prentice Hall PTR; 1 edition (June, 2009) Edward L. Haletky. Secure Hybrid Cloud Reference Architecture, The Virtualization Practice, LLC (www.virtualizationpractice.com); Version 1.1 (September 2012) (http://www.virtualizationpractice.com/?file_id=380) SECURITY)REQUIREMENTS)OF)HYBRID)CLOUDS:)A)PRODUCT)COMPARISON) 1 3!

The Virtualization Practice

The Virtualization Practice The Virtualization Practice White Paper: Trend Micro Deep Security Reference Architecture for the Secure Hybrid Cloud Edward L. Haletky Analyst Virtualization and Cloud Security The Virtualization Practice

More information

The Virtualization Practice

The Virtualization Practice The Virtualization Practice White Paper: Protect your Virtual and Cloud Environment with Symantec Critical System Protection Edward L. Haletky Analyst Virtualization and Cloud Security The Virtualization

More information

The Virtualization Practice

The Virtualization Practice The Virtualization Practice White Paper: A Look at Trend Micro Deep Security 7.5 Edward L. Haletky Analyst March 2011 2011 The Virtualization Practice. All Rights Reserved. Abstract Trend Micro Deep Security

More information

The Virtualization Practice. Segmentation Firewalls within Virtual and Cloud Environments 1

The Virtualization Practice. Segmentation Firewalls within Virtual and Cloud Environments 1 The Virtualization Practice White Paper: Segmentation Firewalls within Virtual & Cloud Environments Edward L. Haletky Analyst Virtualization & Cloud Security The Virtualization Practice Version 1.0 January

More information

Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;

Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««; Security N Environments '' J J H -. i ^ s j}! Dave Shackleford '**»* t i j i««; l:i in: John Wiley &. Sons, Inc. Contents Introduction.. : xix Chapter l Fundamentals of Virtualization Security Virtualization

More information

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments OVERVIEW This document explains the functionality of Security for Virtual and Cloud Environments (SVCE) - what

More information

RESEARCH PAPERS FACULTY OF MATERIALS SCIENCE AND TECHNOLOGY IN TRNAVA SLOVAK UNIVERSITY OF TECHNOLOGY IN BRATISLAVA

RESEARCH PAPERS FACULTY OF MATERIALS SCIENCE AND TECHNOLOGY IN TRNAVA SLOVAK UNIVERSITY OF TECHNOLOGY IN BRATISLAVA RESEARCH PAPERS FACULTY OF MATERIALS SCIENCE AND TECHNOLOGY IN TRNAVA SLOVAK UNIVERSITY OF TECHNOLOGY IN BRATISLAVA 2015 Volume 23, Special Number HYPERVISOR FOR VIRTUALIZATION IN PRIVATE CLOUD Pavol ZÁVACKÝ,

More information

Meeting the Challenges of Virtualization Security

Meeting the Challenges of Virtualization Security Meeting the Challenges of Virtualization Security Coordinate Security. Server Defense for Virtual Machines A Trend Micro White Paper August 2009 I. INTRODUCTION Virtualization enables your organization

More information

IOS110. Virtualization 5/27/2014 1

IOS110. Virtualization 5/27/2014 1 IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to

More information

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP Principal Systems Engineer Security Specialist Agenda What is the Cloud? Virtualization Basics

More information

VMware Integrated Partner Solutions for Networking and Security

VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Security and Compliance VMware vcloud Networking and Security is the leading networking and security

More information

VMware Integrated Partner Solutions for Networking and Security

VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Networking and Security Networking and Security are complex, dynamic areas, and VMware recognizes

More information

Hardening and Hacking vsphere and Private Cloud Everything you need to know about vsphere Security

Hardening and Hacking vsphere and Private Cloud Everything you need to know about vsphere Security Hardening and Hacking vsphere and Private Cloud Everything you need to know about vsphere Security Course Length: 5 days Course Delivery: Traditional Classroom Online Live Course Overview We are well aware

More information

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com 1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption

More information

Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP

Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP Agenda ADP Cloud Vision and Requirements Introduction to SUSE Cloud Overview Whats New VMWare intergration HyperV intergration ADP

More information

Table of Contents. VMready. Virtual Machine-Aware Networking

Table of Contents. VMready. Virtual Machine-Aware Networking VMready Virtual Machine-Aware Networking White Paper Table of Contents Executive Summary... 2 Current Server Virtualization Environments... 3 Hypervisors... 3 Virtual Switches... 3 Leading Server Virtualization

More information

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.

More information

Expert tips for realizing maximum private cloud benefits

Expert tips for realizing maximum private cloud benefits E-Guide Expert tips for realizing maximum private cloud benefits Today s enterprises either already have a private cloud, plan to build one or at least have considered in-house cloud as an option. But

More information

Top 5 Reasons to choose Microsoft Windows Server 2008 R2 SP1 Hyper-V over VMware vsphere 5

Top 5 Reasons to choose Microsoft Windows Server 2008 R2 SP1 Hyper-V over VMware vsphere 5 Top 5 Reasons to choose Microsoft Windows Server 2008 R2 SP1 Hyper-V over VMware Published: April 2012 2012 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and

More information

Netzwerkvirtualisierung? Aber mit Sicherheit!

Netzwerkvirtualisierung? Aber mit Sicherheit! Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction

More information

Foundations and Concepts

Foundations and Concepts vcloud Automation Center 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud

More information

Understanding Cisco Cloud Fundamentals CLDFND v1.0; 5 Days; Instructor-led

Understanding Cisco Cloud Fundamentals CLDFND v1.0; 5 Days; Instructor-led Understanding Cisco Cloud Fundamentals CLDFND v1.0; 5 Days; Instructor-led Course Description Understanding Cisco Cloud Fundamentals (CLDFND) v1.0 is a five-day instructor-led training course that is designed

More information

Course Title: Virtualization Security, 1st Edition

Course Title: Virtualization Security, 1st Edition Course Title: Virtualization Security, 1st Edition Page 1 of 7 Virtualization Security Copyright by EC-Council Press Course Description: The DISASTER RECOVERY/VIRTUALIZATION SECURITY SERIES is comprised

More information

EMA Radar for Private Cloud Platforms: Q1 2013

EMA Radar for Private Cloud Platforms: Q1 2013 EMA Radar for Private Cloud Platforms: Q1 2013 By Torsten Volk ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) Radar Report March 2013 BMC Software EMA Radar for Private Cloud Platforms: Q1 2013 (IaaS, PaaS, SaaS)

More information

Data Center Manager (DCM)

Data Center Manager (DCM) DATA SHEET Data Center Manager (DCM) Unified Virtual/Physical Data Center Fabric Management Benefits LOWER OPERATIONAL COSTS High degree of automation within physical and virtual environments to streamline

More information

Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation

Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns

More information

The Virtualization Practice

The Virtualization Practice The Virtualization Practice White Paper: Managing Applications in Docker Containers Bernd Harzog Analyst Virtualization and Cloud Performance Management October 2014 Abstract Docker has captured the attention

More information

Evaluation of Enterprise Data Protection using SEP Software

Evaluation of Enterprise Data Protection using SEP Software Test Validation Test Validation - SEP sesam Enterprise Backup Software Evaluation of Enterprise Data Protection using SEP Software Author:... Enabling you to make the best technology decisions Backup &

More information

Securing the Journey to the Private Cloud. Dominique Dessy RSA, the Security Division of EMC

Securing the Journey to the Private Cloud. Dominique Dessy RSA, the Security Division of EMC Securing the Journey to the Private Cloud Dominique Dessy RSA, the Security Division of EMC June 2010 Securing the Journey to The Private Cloud The Journey IT Production Business Production IT-As-A-Service

More information

Cisco Intelligent Automation for Cloud

Cisco Intelligent Automation for Cloud Product Data Sheet Cisco Intelligent Automation for Cloud Early adopters of cloud-based service delivery were seeking additional cost savings beyond those achieved with server virtualization and abstraction.

More information

Microsoft Private Cloud

Microsoft Private Cloud A Comparative Look at Functionality, Benefits, and Economics November 2012 1 1 Copyright Information 2012 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and

More information

Our Cloud Backup Solution Provides Comprehensive Virtual Machine Data Protection Including Replication

Our Cloud Backup Solution Provides Comprehensive Virtual Machine Data Protection Including Replication Datasheet Our Cloud Backup Solution Provides Comprehensive Virtual Machine Data Protection Including Replication Virtual Machines (VMs) have become a staple of the modern enterprise data center, but as

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by

More information

Deployment Options for Microsoft Hyper-V Server

Deployment Options for Microsoft Hyper-V Server CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES

More information

With Red Hat Enterprise Virtualization, you can: Take advantage of existing people skills and investments

With Red Hat Enterprise Virtualization, you can: Take advantage of existing people skills and investments RED HAT ENTERPRISE VIRTUALIZATION DATASHEET RED HAT ENTERPRISE VIRTUALIZATION AT A GLANCE Provides a complete end-toend enterprise virtualization solution for servers and desktop Provides an on-ramp to

More information

Effective End-to-End Cloud Security

Effective End-to-End Cloud Security Effective End-to-End Cloud Security Securing Your Journey to the Cloud Trend Micro SecureCloud A Trend Micro & VMware White Paper August 2011 I. EXECUTIVE SUMMARY This is the first paper of a series of

More information

Red Hat enterprise virtualization 3.0 feature comparison

Red Hat enterprise virtualization 3.0 feature comparison Red Hat enterprise virtualization 3.0 feature comparison at a glance Red Hat Enterprise is the first fully open source, enterprise ready virtualization platform Compare the functionality of RHEV to VMware

More information

Protecting Virtual Endpoints with McAfee Server Security Suite Essentials

Protecting Virtual Endpoints with McAfee Server Security Suite Essentials Sponsored by McAfee Protecting Virtual Endpoints with McAfee Server Security Suite Essentials December 2013 A SANS Analyst Whitepaper Written by Dave Shackleford Capability Sets for Virtualization Security

More information

App Orchestration 2.0

App Orchestration 2.0 App Orchestration 2.0 Key Concepts & Terms Commissioning Editor: Brenda Oakley Version: 1.4 Last Updated: December 17, 2013 Page 1 Contents Key Concepts... 3 Tenancy & Offerings... 3 Multi-Datacenter Deployments...

More information

Clustering and Storage Management In Virtualized Environments Brian de la Pascua

Clustering and Storage Management In Virtualized Environments Brian de la Pascua Clustering and Storage Management In Virtualized Environments Brian de la Pascua Presales Consultant 1 Agenda 1 Server Virtulisation Overview 2 Symantec s Capabilities in VMware 3 Cluster Server Demonstration

More information

Mitigating Information Security Risks of Virtualization Technologies

Mitigating Information Security Risks of Virtualization Technologies Mitigating Information Security Risks of Virtualization Technologies Toon-Chwee, Wee VMWare (Hong Kong) 2009 VMware Inc. All rights reserved Agenda Virtualization Overview Key Components of Secure Virtualization

More information

RSA Security Solutions for Virtualization

RSA Security Solutions for Virtualization RSA Security Solutions for Virtualization Grzegorz Mucha grzegorz.mucha@rsa.com Securing the Journey to the Cloud The RSA Solution for Virtualized Datacenters The RSA Solution for VMware View The RSA Solution

More information

Asigra Cloud Backup V13.0 Provides Comprehensive Virtual Machine Data Protection Including Replication

Asigra Cloud Backup V13.0 Provides Comprehensive Virtual Machine Data Protection Including Replication Datasheet Asigra Cloud Backup V.0 Provides Comprehensive Virtual Machine Data Protection Including Replication Virtual Machines (VMs) have become a staple of the modern enterprise data center, but as the

More information

Comprehensive Monitoring of VMware vsphere ESX & ESXi Environments

Comprehensive Monitoring of VMware vsphere ESX & ESXi Environments Comprehensive Monitoring of VMware vsphere ESX & ESXi Environments Table of Contents Overview...3 Monitoring VMware vsphere ESX & ESXi Virtual Environment...4 Monitoring using Hypervisor Integration...5

More information

Veritas Cluster Server from Symantec

Veritas Cluster Server from Symantec Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster

More information

Protecting your Data in a New Generation Virtual and Physical Environment

Protecting your Data in a New Generation Virtual and Physical Environment Protecting your Data in a New Generation Virtual and Physical Environment Read this white paper to learn how you can easily and safely protect your data in a new generation virtual and physical IT environment,

More information

Managing Physical and Virtual Machines in Paragon Protect & Restore

Managing Physical and Virtual Machines in Paragon Protect & Restore Managing Physical and Virtual Machines in Paragon Protect & Restore Best Practices last updated: August 2013 Overview Paragon Software s Protect & Restore (PPR) offers a unified system and data protection

More information

Learn the Essentials of Virtualization Security

Learn the Essentials of Virtualization Security Learn the Essentials of Virtualization Security by Dave Shackleford by Dave Shackleford This paper is the first in a series about the essential security issues arising from virtualization and the adoption

More information

Cloud Computing: Elastic, Scalable, On-Demand IT Services for Everyone. Table of Contents. Cloud.com White Paper April 2010. 1 Executive Summary...

Cloud Computing: Elastic, Scalable, On-Demand IT Services for Everyone. Table of Contents. Cloud.com White Paper April 2010. 1 Executive Summary... Cloud Computing: Elastic, Scalable, On-Demand IT Services for Everyone Cloud.com White Paper April 2010 Table of Contents 1 Executive Summary... 2 2 Motivation Around Cloud Computing... 2 3 Comparing Cloud

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

Virtualization. as a key enabler for Cloud OS vision. Vasily Malanin Datacenter Product Management Lead Microsoft APAC

Virtualization. as a key enabler for Cloud OS vision. Vasily Malanin Datacenter Product Management Lead Microsoft APAC Virtualization as a key enabler for Cloud OS vision Vasily Malanin Datacenter Product Management Lead Microsoft APAC Can I enable employees to work from anywhere? How can I evolve my business apps to

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g Virtualization: Architectural Considerations and Implementation Options Virtualization Virtualization is the

More information

OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME

OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME We believe that everyone from home computer users and small companies, to large corporations and governments has the right to be free from cybersecurity

More information

Trend Micro Cloud Protection

Trend Micro Cloud Protection A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to

More information

Comprehensive security platform for physical, virtual, and cloud servers

Comprehensive security platform for physical, virtual, and cloud servers datasheet Trend Micro deep security 9 Comprehensive security platform for physical, virtual, and cloud servers Virtualization and cloud computing have changed the face of today s data center. Yet as organizations

More information

Security in the Software Defined Data Center

Security in the Software Defined Data Center Security in the Software Defined Data Center Francesco Vigo Senior Systems Engineer, VMware fvigo@vmware.com Ugo Piazzalunga Technical Manager, SafeNet ugo.piazzalunga@safenet-inc.com Agenda Software Defined

More information

App App App App App App App App. VMware vcenter Suite. VMware vsphere 4. Availability Security Scalablity. vshield Zones VMSafe

App App App App App App App App. VMware vcenter Suite. VMware vsphere 4. Availability Security Scalablity. vshield Zones VMSafe CS CHEAT SHEET VMware vsphere 4 What is VMware vsphere 4? VMware vsphere 4 is the industry s first cloud operating system, which uses the power of virtualization to transform datacenters into dramatically

More information

Cloud Platform Comparison: CloudStack, Eucalyptus, vcloud Director and OpenStack

Cloud Platform Comparison: CloudStack, Eucalyptus, vcloud Director and OpenStack Cloud Platform Comparison: CloudStack, Eucalyptus, vcloud Director and OpenStack This vendor-independent research contains a product-by-product comparison of the most popular cloud platforms (along with

More information

vcloud Automation Center Support Matrix vcloud Automation Center 5.2

vcloud Automation Center Support Matrix vcloud Automation Center 5.2 vcloud Automation Center Support Matrix vcloud Automation Center 5.2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

VCE Addendum to VMware Solution Guide for Payment Card Industry Data Security Standard

VCE Addendum to VMware Solution Guide for Payment Card Industry Data Security Standard March 2013 Solution Guide for Payment Card Industry (PCI) Partner Addendum VCE Addendum to VMware Solution Guide for Payment Card Industry Data Security Standard VCE Vblock Systems The findings and recommendations

More information

Microsoft Private Cloud. A comparative look at Functionality, Benefits, and Economics

Microsoft Private Cloud. A comparative look at Functionality, Benefits, and Economics Microsoft Private Cloud A comparative look at Functionality, Benefits, and Economics Published: July 2012 Copyright Information 2012 Microsoft Corporation. All rights reserved. This document is provided

More information

Cisco Unified Data Center

Cisco Unified Data Center Solution Overview Cisco Unified Data Center Simplified, Efficient, and Agile Infrastructure for the Data Center What You Will Learn The data center is critical to the way that IT generates and delivers

More information

CA ARCserve Replication and High Availability Deployment Options for Hyper-V

CA ARCserve Replication and High Availability Deployment Options for Hyper-V Solution Brief: CA ARCserve R16.5 Complexity ate my budget CA ARCserve Replication and High Availability Deployment Options for Hyper-V Adding value to your Hyper-V environment Overview Server virtualization

More information

SCO Virtualization Presentation to Customers

SCO Virtualization Presentation to Customers SCO Virtualization Presentation to Customers 1 Content Virtualization An Overview Short introduction including key benefits Additional virtualization information from SCO Additional information about Virtualization

More information

Building on these core skills, customers can work on advanced concepts, such as:

Building on these core skills, customers can work on advanced concepts, such as: OpenStack Training OVERVIEW OnX s OpenStack training courses provide a deep and practical understanding of all aspects of today s most popular cloud platform. Unlike other training providers, OnX offerings

More information

Virtual Machine Protection with Symantec NetBackup 7

Virtual Machine Protection with Symantec NetBackup 7 Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing to embrace the promise of virtualization for

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R O r a c l e V i r t u a l N e t w o r k i n g D e l i v e r i n g F a b r i c

More information

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro Udo_Schneider@trendmicro.de 26.03.2013

More information

VMware vsphere 4. Pricing, Packaging and Licensing Overview W H I T E P A P E R

VMware vsphere 4. Pricing, Packaging and Licensing Overview W H I T E P A P E R Pricing, Packaging and Licensing Overview W H I T E P A P E R Table of Contents Introduction to VMware vsphere 4..................................... 3 Pricing, Packaging and Licensing Overview..............................

More information

Accenture Cloud Platform Unlocks Agility and Control

Accenture Cloud Platform Unlocks Agility and Control Accenture Cloud Platform Unlocks Agility and Control 2 Accenture Cloud Platform Unlocks Agility and Control The Accenture Cloud Platform is at the heart of today s leading-edge, enterprise cloud solutions.

More information

OpenStack Cloud Migration:

OpenStack Cloud Migration: OpenStack Cloud Migration: Cloud Migration from VMware to OpenStack July 07, 2015 DONGJOON MIN ISA TECHNOLOGIES,INC. djmin@zconverter.com 1 Table of Contents Executive Summary.. 3 What is V2C Cloud Migration..

More information

OPEN CLOUD INFRASTRUCTURE BUILT FOR THE ENTERPRISE

OPEN CLOUD INFRASTRUCTURE BUILT FOR THE ENTERPRISE RED HAT ENTERPRISE LINUX OPENSTACK PLATFORM OPEN CLOUD INFRASTRUCTURE BUILT FOR THE ENTERPRISE Arthur Enright Principal Product Manager Virtulization Business Unit I.T. CHALLENGES WORKLOADS ARE EVOLVING

More information

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server

More information

Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser

Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser Security and Billing for Azure Pack Presented by 5nine Software and Cloud Cruiser Meet our Speakers Symon Perriman VP of Business Development 5nine Software symon@5nine.com @SymonPerriman Paul Zinn Senior

More information

Alliance Key Manager Solution Brief

Alliance Key Manager Solution Brief Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major

More information

Data Center Connector for vsphere 3.0.0

Data Center Connector for vsphere 3.0.0 Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

VMware vsphere 4.1. Pricing, Packaging and Licensing Overview. E f f e c t i v e A u g u s t 1, 2 0 1 0 W H I T E P A P E R

VMware vsphere 4.1. Pricing, Packaging and Licensing Overview. E f f e c t i v e A u g u s t 1, 2 0 1 0 W H I T E P A P E R VMware vsphere 4.1 Pricing, Packaging and Licensing Overview E f f e c t i v e A u g u s t 1, 2 0 1 0 W H I T E P A P E R Table of Contents Executive Summary...................................................

More information

Leveraging Public Cloud for Affordable VMware Disaster Recovery & Business Continuity

Leveraging Public Cloud for Affordable VMware Disaster Recovery & Business Continuity White Paper White Paper Managing Public Cloud Computing in the Enterprise Leveraging Public Cloud for Affordable VMware Disaster Recovery & Business Continuity A Quick Start Guide By Edward Haletky Principal

More information

Presentation for ISACA Chapter NL. Auditing Virtual Servers. VMware: Security and Operations. Gert-Jan Timmer 3. September, 2012

Presentation for ISACA Chapter NL. Auditing Virtual Servers. VMware: Security and Operations. Gert-Jan Timmer 3. September, 2012 Presentation for ISACA Chapter NL Auditing Virtual Servers VMware: Security and Operations Gert-Jan Timmer 3. September, 2012 Auditing Virtual Servers: Vmware: Security and Operations Presentation today:

More information

Top 10 things a NetBackup Administrator must know about virtualization, SDDC and Cloud Abdul Rasheed, George Winter, John Kjell

Top 10 things a NetBackup Administrator must know about virtualization, SDDC and Cloud Abdul Rasheed, George Winter, John Kjell Top 10 things a NetBackup Administrator must know about virtualization, SDDC and Cloud Abdul Rasheed, George Winter, John Kjell Enterprise Virtualization Geeks 1 2 Top 10 Session Topics That Did Not Make

More information

Bitdefender GravityZone Sales Presentation

Bitdefender GravityZone Sales Presentation 6 March 2014 Page 1 Bitdefender GravityZone Sales Presentation 1 Page 2 Bitdefender at a Glance The #1 Anti-Malware Security Technology in the world First security software vendor to receive top recommendations

More information

Building High Growth Services on the Microsoft Cloud Platform. Rich Cannon Senior Director, US Partner Hosting and Cloud Services

Building High Growth Services on the Microsoft Cloud Platform. Rich Cannon Senior Director, US Partner Hosting and Cloud Services Building High Growth Services on the Microsoft Cloud Platform Rich Cannon Senior Director, US Partner and Cloud Services Momentum 35% YoY revenue growth Hosters are largest contributor across all partner

More information

CoIP (Cloud over IP): The Future of Hybrid Networking

CoIP (Cloud over IP): The Future of Hybrid Networking CoIP (Cloud over IP): The Future of Hybrid Networking An overlay virtual network that connects, protects and shields enterprise applications deployed across cloud ecosystems The Cloud is Now a Critical

More information

Component Details Notes Tested. The virtualization host is a windows 2008 R2 Hyper-V server. Yes

Component Details Notes Tested. The virtualization host is a windows 2008 R2 Hyper-V server. Yes We will be reviewing Microsoft s Remote Desktop Services (RDS), which has undergone significant reworking since it was released as Windows 2008 Terminal Services. In the original release of Microsoft Windows

More information

Learn the essentials of virtualization security

Learn the essentials of virtualization security Learn the essentials of virtualization security White Paper Table of Contents 3 Introduction 4 Hypervisor connectivity and risks 4 Multi-tenancy risks 5 Management and operational network risks 5 Storage

More information

Simplifying. Single view, single tool virtual machine mobility management in an application fluent data center network

Simplifying. Single view, single tool virtual machine mobility management in an application fluent data center network Simplifying Network Administration in an Alcatel- Lucent VMware Virtual Environment Single view, single tool virtual machine mobility management in an application fluent data center network Strategic White

More information

Thinspace deskcloud. Quick Start Guide

Thinspace deskcloud. Quick Start Guide Thinspace deskcloud Quick Start Guide Version 1.2 Published: SEP-2014 Updated: 16-SEP-2014 2014 Thinspace Technology Ltd. All rights reserved. The information contained in this document represents the

More information

A Perfect Fit: Converged Solution for the Software-Defined Data Center. Bob Ingram, Senior Solutions Architect February 26, 2014

A Perfect Fit: Converged Solution for the Software-Defined Data Center. Bob Ingram, Senior Solutions Architect February 26, 2014 A Perfect Fit: Converged Solution for the Software-Defined Data Center Bob Ingram, Senior Solutions Architect February 26, 2014 WebTech Educational Series A Perfect Fit: Converged Solution for the Software-Defined

More information

How to survive in a world of Virtualization and Cloud Computing, where you even can t trust your own environment anymore. Raimund Genes, CTO

How to survive in a world of Virtualization and Cloud Computing, where you even can t trust your own environment anymore. Raimund Genes, CTO How to survive in a world of Virtualization and Cloud Computing, where you even can t trust your own environment anymore. Raimund Genes, CTO Data everywhere but protection? Unprotected Data Needing Protection

More information

The Challenge of Workload Portability in a Multi-Provider Cloud

The Challenge of Workload Portability in a Multi-Provider Cloud Cloud Expo 2015 Software Defined Data Centre and Networks Theatre The Challenge of Workload Portability in a Multi-Provider Cloud Kevin Linsell Director, Strategy & Architecture, Adapt Steve Bianciardi

More information

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 4 Virtualization of Clusters and Data Centers Text Book: Distributed and Cloud Computing, by K. Hwang, G C. Fox, and J.J. Dongarra,

More information

Unlimited Server 24/7/365 Support

Unlimited Server 24/7/365 Support Unlimited Server 24/7/365 Support Unlimited Server Support from System Architects covers your Windows servers, Linux servers and virtual machines. Your servers are monitored and managed 24 hours a day,

More information

Acronis Backup Product Line

Acronis Backup Product Line New Generation Data Protection Powered by Acronis AnyData Technology Acronis Backup Product Line Speaker name Introducing Acronis Backup Acronis Backup Target: Smaller environments, home office, remote

More information

SUSE OpenStack Cloud 4 Private Cloud Platform based on OpenStack. Gábor Nyers Sales Engineer @SUSE gnyers@suse.com

SUSE OpenStack Cloud 4 Private Cloud Platform based on OpenStack. Gábor Nyers Sales Engineer @SUSE gnyers@suse.com SUSE OpenStack Cloud 4 Private Cloud Platform based on OpenStack Gábor Nyers Sales Engineer @SUSE gnyers@suse.com Introductory video ChalkTalk: SUSE OpenStack Cloud 2 Stetting the Stage for SUSE OpenStack

More information

Making a Smooth Transition to a Hybrid Cloud with Microsoft Cloud OS

Making a Smooth Transition to a Hybrid Cloud with Microsoft Cloud OS Making a Smooth Transition to a Hybrid Cloud with Microsoft Cloud OS Transitioning from today s highly virtualized data center environments to a true cloud environment requires solutions that let companies

More information

Enterprise Cloud Management

Enterprise Cloud Management Enterprise Cloud Management Public osting Provider Iaas Shared Private Private Remote Iaas Design Strategy Abiquo was specifically designed to meet business needs. Unlike other Cloud products that were

More information

vcloud Automation Center Support Matrix vcloud Automation Center 5.1

vcloud Automation Center Support Matrix vcloud Automation Center 5.1 vcloud Automation Center Support Matrix vcloud Automation Center 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals

The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals Virtualization is a well-established in today s IT environments, but it still remains a top priority among

More information