Print (Current as of 2012)Monthly column on all things related to virtualization in the data center, the virtualization market, and the impact virtualization is having on Enterprise IT. Build IT Agility With Virtualization (Co-author)
The virtual data center provides an IT infrastructure that can be instantly responsive to external changes and infinitely flexible to the needs of the business itself. Virtualization enables organizations to align IT resources to the business objectives by eliminating friction between IT and business structures. Published by ebiz online.
Security: Implementing a Virtual Platform Infrastructure Migration How to plan today and design your virtual platform infrastructure to accommodate security threats and risks tomorrow. Published by Virtualization Sys magazine online. Keeping Your Head Above the Cloud: 7 Data Center Challenges to Implementing Virtual Platforms One of the pillars of the Virtual Data Center is virtual platform infrastructure, or the virtual machine; however virtual platforms are dependent on many other, oft forgotten components of both the physical and virtual data center.
Security Implications Of The Virtual Data Center The concepts behind application and operation system virtualization are
not new concepts, they have been around long before server appliances
and desktop PCs were readily available in our daily vocabulary. The
recent rate of virtualization adoption however, especially that of
software operating system virtualization, has grown exponentially in
the past few years. This White Paper describes some of the security
implications of the virtual data center.
Defining the baseline and process of virtualization maturity for the Data Center. This paper details the 5 levels of virtualization progression in the DC, how to map to a particular level today, and what's required to move up the VDC stack. Virtualization Defined - Eight Different Ways This White Paper focuses on virtualization as it pertains to the data
center. Before considering any type of data center virtualization, it's
important to define what technology or category of service you're
trying to virtualize. This White Paper describes eight different
categories of virtualization so readers thoroughly understand the
differences (and similarities) between the definitions of
virtualization. Also published by Enterprise Innovator.
Aplication Delivery Security: Integrated "Any App" Security There are many unique challenges and pieces to application security
that most devices today aren't able to provide. Most enterprises still
want to provide application security with just a Web
Application Firewall, ignoring the rest of the application security
puzzle or leaving those duties to existing security appliances and
controls. This White Paper describes application security, and
discusses integrated security for any application.
Applied Application Security - Positive & Negative Efficiency After many years of purely negative security provided by anti-virus
scanners, IDS/IPS, and antispam engines, it's refreshing to hear that
the positive security model - the basis for tried and true
security devices like network firewalls and ACLs - is coming back in
vogue. This White Paper discusses positive and negative security models
and Web Application Firewalls.
F5's TMOS Security Development and Implementation TMOS™ -- the foundation and architecture for F5's
application delivery controllers running on the BIG-IP platform --
brings a wealth of security to existing application delivery networks.
But before the secure implementation of TMOS can be discussed, the
question is often asked "How is TMOS itself secured?" This White Paper
provides the answer.
ISC(2) Journal: Protecting Your Internal Resources With Intranet Application Firewalls Web application firewalls (WAFs) are rapidly becoming a key component
of end-to-end network security. Although the market is still struggling
to move beyond the early adopter stages, WAF placement in the network
is now well known and generally accepted as a necessary requirement. Coupled with network firewalls, HTTP
application firewalls can close perimeter security holes opened by
allowing unrestricted access to public Web servers. But focusing solely
on external, public application security is only half of the solution. Internal
Web-based applications, such as corporate intranets, HR systems, CRM
systems, HTTP-based databases, and report management applications, can
also be al risk for the same open-access reasons, but from trusted internal attackers.
Why Is Your Network Firewall Falling Short? Your network is secure, your servers are safe,and you’ve done everything to protect your network, corporate assets, and intellectual property. You have a network firewall so your perimeter is secure. Anonymous web users are the ones surfing your sites, using your web applications, logging in as normal users, and browsing without intervention or observation. These same anonymous users are the next major threat to your network, so how do you secure data flowing over ports 80 and 443? (Originally published online by Security Computing Magazine UK)
|