Neil MacDonald

A member of the Gartner Blog Network

Entries Tagged as 'Virtualization Security'


Virtualization, Containers and Other Sandboxing Techniques Should be on Your Radar Screen

by Neil MacDonald  |  March 16, 2013  |  Comments Off

  The idea of “sandboxing” potentially malicious content and applications isn’t new but interest in this type of approach on Windows desktops is growing. Further, the increasing variety of virtualization and abstraction techniques available on Windows create isolation that can be used to provide security separation – aka “sandboxing”. Given the innovation around virtualization techniques […]

Comments Off

Category: Beyond Anti-Virus Endpoint Protection Platform Next-generation Security Infrastructure Virtualization Virtualization Security     Tags: , , , , , , , , ,

Virtual Firewalls or Physical? Wrong Question.

by Neil MacDonald  |  November 5, 2012  |  2 Comments

I still see people getting bogged down in rather meaningless arguments as to whether or not firewalls will be virtualized. They will (and, in fact, are). The bigger trend is the shift from proprietary hardware to software running on commodity hardware (in almost all cases, x86). That’s the big shift. Whether or not a given […]

2 Comments »

Category: Cloud Cloud Security Next-generation Security Infrastructure Virtualization Virtualization Security     Tags: , , , , , , ,

Five Myths and Realities of Virtualization Security

by Neil MacDonald  |  September 6, 2012  |  3 Comments

I’ve been researching the intersection of virtualization and security since 2007 and find myself continually running into these myths pertaining to virtualization and security: 1) Myth: Physical is better than virtual. Reality: Define “better”. Software and virtual appliance-based security controls are more adaptable to the rapidly changing infrastructure requirements of a modern, virtualized data center. […]

3 Comments »

Category: Cloud Security Virtualization Security     Tags: , , , ,

Getting Ready for Gartner’s 2012 Infrastructure & Operations and Information Security Summits

by Neil MacDonald  |  May 21, 2012  |  Comments Off

I’ve been absent from my typical blogging routine getting my material finalized for two Gartner upcoming US-based summits in June 2012. The first is Gartner’s Infrastructure and Operations Management Summit being held in Orlando the week of June 4th. This conference is focused on infrastructure and operations solutions for managing desktops, servers, and mobile devices […]

Comments Off

Category: Application Security Beyond Anti-Virus Big Data and Information Security Cloud Security Information Security Next-generation Security Infrastructure Security Intelligence Virtualization Security     Tags: , , , , , , , , , , , , ,

Security Observations from Gartner’s Data Center Summit

by Neil MacDonald  |  December 9, 2011  |  1 Comment

I’m just back from Gartner’s US 2011 Data Center Summit held this week in Las Vegas. In my previous post, I talked about information security vendor’s concerns on the potential impact of the Eurozone crisis on information security spending. Here, I want to outline the top security-related  issues and concerns that I discussed with attendees […]

1 Comment »

Category: Cloud Cloud Security Next-generation Data Center Next-generation Security Infrastructure Virtualization Virtualization Security     Tags: , , , , , , ,

US Symposium Summary from a Security Perspective

by Neil MacDonald  |  October 24, 2011  |  1 Comment

Last week I attended Gartner’s US Symposium conference in Orlando. With 8,000+ attendees (25% of which were CIOs) and at least 1,000 more analysts, vendors and support staff, you can imagine it was quite a scene. In addition to three presentations, I had more than 30 fantastic one on ones with attendees over the four […]

1 Comment »

Category: Application Security Beyond Anti-Virus Cloud Cloud Security Information Security Microsoft Security Next-generation Security Infrastructure Virtualization Virtualization Security     Tags: , , , , , , , , ,

It’s Time for Security to Ascend

by Neil MacDonald  |  August 24, 2011  |  1 Comment

As I research into the future of adaptive security infrastructure, I am convinced that the future of information security lies in software, not hardware. If you think about it for a bit, most of information security policy enforcement is in the form of software already – it’s just embodied (entombed?) in physical hardware. Unfortunately, the […]

1 Comment »

Category: Cloud Cloud Security Next-generation Security Infrastructure Virtualization Security     Tags: , , , , , ,

Real-world Systematic Workload Reprovisioning

by Neil MacDonald  |  June 23, 2011  |  Comments Off

I’m here at the Gartner Information Security summit on the fourth and final day. We had a record number of attendees – at least 1700 by my estimate. Attendees have the ability to book one on one conversations with the analysts and my schedule was completely full. One of the conversations with a client was […]

Comments Off

Category: Information Security Next-generation Security Infrastructure Virtualization     Tags: , , , , , , ,

Don’t Trust Your Servers

by Neil MacDonald  |  June 17, 2011  |  3 Comments

One of the toughest problems in information security is addressing advanced intrusions that have bypassed traditional security controls and now reside undetected on enterprise systems. With financially motivated attacks and state-sponsored “advanced persistent threats” both on the rise, intrusions can remain undetectable for extended periods of time. We have reached a point where our systems […]

3 Comments »

Category: Beyond Anti-Virus Next-generation Security Infrastructure Virtualization Virtualization Security     Tags: , , , , , , , ,

Improving Security by Killing Server and Desktop Workloads

by Neil MacDonald  |  June 16, 2011  |  Comments Off

It sounds counterintuitive, but today’s advanced threat environment requires new approaches to the ongoing security and management of server and desktop workloads. The trouble with Advanced Persistent Threats is that, by definition, they have evaded our traditional network and endpoint security controls and now reside undetected in our IT Systems. How many advanced intrusions will […]

Comments Off

Category: Beyond Anti-Virus Next-generation Security Infrastructure Virtualization Virtualization Security     Tags: , , , , , , ,