Print (Current as of 2012)
Monthly column on all things related to virtualization in the data center, the virtualization market, and the impact virtualization is having on Enterprise IT.
Build IT Agility With Virtualization (Co-author)
The virtual data center provides an IT infrastructure that can be instantly responsive to external changes and infinitely flexible to the needs of the business itself. Virtualization enables organizations to align IT resources to the business objectives by eliminating friction between IT and business structures. Published by ebiz online.
How to plan today and design your virtual platform infrastructure to accommodate security threats and risks tomorrow. Published by Virtualization Sys magazine online.
One of the pillars of the Virtual Data Center is virtual platform infrastructure, or the virtual machine; however virtual platforms are dependent on many other, oft forgotten components of both the physical and virtual data center.
The concepts behind application and operation system virtualization are not new concepts, they have been around long before server appliances and desktop PCs were readily available in our daily vocabulary. The recent rate of virtualization adoption however, especially that of software operating system virtualization, has grown exponentially in the past few years. This White Paper describes some of the security implications of the virtual data center.
Defining the baseline and process of virtualization maturity for the Data Center. This paper details the 5 levels of virtualization progression in the DC, how to map to a particular level today, and what's required to move up the VDC stack.
This White Paper focuses on virtualization as it pertains to the data center. Before considering any type of data center virtualization, it's important to define what technology or category of service you're trying to virtualize. This White Paper describes eight different categories of virtualization so readers thoroughly understand the differences (and similarities) between the definitions of virtualization. Also published by Enterprise Innovator.
There are many unique challenges and pieces to application security that most devices today aren't able to provide. Most enterprises still want to provide application security with just a Web Application Firewall, ignoring the rest of the application security puzzle or leaving those duties to existing security appliances and controls. This White Paper describes application security, and discusses integrated security for any application.
After many years of purely negative security provided by anti-virus scanners, IDS/IPS, and antispam engines, it's refreshing to hear that the positive security model - the basis for tried and true security devices like network firewalls and ACLs - is coming back in vogue. This White Paper discusses positive and negative security models and Web Application Firewalls.
TMOS™ -- the foundation and architecture for F5's application delivery controllers running on the BIG-IP platform -- brings a wealth of security to existing application delivery networks. But before the secure implementation of TMOS can be discussed, the question is often asked "How is TMOS itself secured?" This White Paper provides the answer.
Web application firewalls (WAFs) are rapidly becoming a key component of end-to-end network security. Although the market is still struggling to move beyond the early adopter stages, WAF placement in the network is now well known and generally accepted as a necessary requirement. Coupled with network firewalls, HTTP application firewalls can close perimeter security holes opened by allowing unrestricted access to public Web servers. But focusing solely on external, public application security is only half of the solution. Internal Web-based applications, such as corporate intranets, HR systems, CRM systems, HTTP-based databases, and report management applications, can also be al risk for the same open-access reasons, but from trusted internal attackers.
Your network is secure, your servers are safe,and you’ve done everything to protect your network, corporate assets, and intellectual property. You have a network firewall so your perimeter is secure. Anonymous web users are the ones surfing your sites, using your web applications, logging in as normal users, and browsing without intervention or observation. These same anonymous users are the next major threat to your network, so how do you secure data flowing over ports 80 and 443? (Originally published online by Security Computing Magazine UK)