VMWare

VMWare | News, how-tos, features, reviews, and videos

Information Security: A Sobering Topic at VMworld

The technology industry is about to come together next week for VMworld in San Francisco. In the span of a few short years, this show has become a real showcase of the latest and greatest IT technology and industry vision. At...

Crisis malware infects VMware virtual machines, researchers say

The Windows version of Crisis also infects Windows Mobile devices and USB drives

Analyzing VMware's Acquisition of Nicira

While the dust isn't even close to settling, I've had some time to ponder VMware's acquisition of Nicira and discussed the deal with ESG networking guru Bob Laliberte. First, here are the positives:1.  VMware is showing a lot of...

Gartner: Network virtualization will lead to security control changes

Gartner analyst Neil MacDonald's specialty is security, and he not only keeps a close eye on what security vendors are doing, but he's an advocate for change as fundamental network technologies evolve. Virtualization is having an...

On to Interop 2012: BYOD, Cloud, SDN, slot machines, and roulette

I'll be on an airplane in a few hours bound for Las Vegas and Interop 2012. Here's what I'm expecting at the show:1.  SDN, the sequel. With the Open Networking Summit (ONS) last month and Interop this week, software-defined...

VMware source code stolen, impact unclear

VMware ESX source code has been stolen and posted online, but the company says its virtualization platform doesn't necessarily pose an increased risk to customers. The stolen code amounts to a single file from sometime around 2003 or...

McAfee brings antivirus support to VMware's vShield

McAfee today announced a version of its antivirus software for VMware's vShield security technology. The McAfee Management for Optimized Virtual Environments (MOVE) AV already had supported the Microsoft HyperV, Xen and general...

Anticipating the Open Networking Summit

We are a few weeks away from the Open Networking Summit (www.opennetsummit.org) which will be held in Santa Clara April 16 through 18. In preparation for ONS, ESG networking guru Bob Laliberte (who will be a session chair for a panel...

The Many Synergies of Dell's Acquisition of SonicWall

You have to give Dell a lot of credit.  As the company recognized changes in the industry, it was willing to move beyond efficient PC/server manufacturing and distribution into new technologies and labor-intensive services.  In my...

Experts sound worm alarm for critical Windows bug

Microsoft patches Remote Desktop Protocol flaw, urges customers to apply update or workaround ASAP

Kaspersky to Protect Virtual Machines Running on VMware

New product designed to allow the IT department to manage the protection of virtual and physical endpoints with one console

RSA Teams to Bolster Security for Apple, Google, RIM Devices

SAN FRANCISCO -- RSA, the security division of EMC, today said it would collaborate with several mobile and virtualization platform vendors to integrate RSA two-factor authentication and risk-detection technologies. The goal of the...

Data Center Network Security: Will Anyone Discuss This at RSA?

Less than a week before the RSA Conference in San Francisco and my telephones are ringing off the hook.  People want to discuss a variety of topics including APTs, mobile security, cloud security, big data analytics, and so...

Software-Defined Networking Evolution (Not Revolution) Under Way

Is it too early or too late to declare 2012 the year of SDN? A few weeks ago, IBM and NEC introduced integrated technologies around OpenFlow for enterprise data centers. Last week, HP announced OpenFlow support with 16 switch...

My Thoughts on IBM, NEC, and OpenFlow

IBM and NEC announced this week that the two companies will work together to offer networking solutions based upon SDN and OpenFlow. IBM provides the switches which are integrated with the NEC Programmable Flow Controller. To me,...

Data Center Networking Discontinuity Impacts Network Security

Data center consolidation and server virtualization are creating data centers of massive scale, and thus radically changing the data center environment. Unfortunately, legacy data center networking equipment was not designed for...

Data Center Networking Discontinuity

Why did dinosaurs become extinct? I’m no paleontologist but allow me to provide an over-simplified explanation: When the environment went through radical alterations, dinosaurs couldn’t adequately adapt to these changes. In a...

Do We Need Data-Loss Prevention for Printers and Copiers?

By now, the idea of using data-loss prevention (DLP) technologies to detect and block unauthorized transit of sensitive information across a network at host and gateway points is well accepted. As applied to peripherals such as...

Some Thoughts on The SANS 20 Critical Security Controls

As I transitioned from the weekend to the work week last night, I settled down to review the 20 Critical Security Controls (v3) published by the SANS Institute. If you haven’t seen this list, you really should take a look as it’s an...

Cisco How-to Guides for Firewalls, IPv6, Contact Centers and Security Exams

If you're ready for a technical deep dive in a book, the Cisco Networking Technology Series provides that in its collection of volumes on topics that include Cisco firewalls, Cisco Unity Connection voice-messaging platform, Cisco...

Load More
You Might Also Like