Neil MacDonald

A member of the Gartner Blog Network

Entries Tagged as 'Virtualization'


Virtualization, Containers and Other Sandboxing Techniques Should be on Your Radar Screen

by Neil MacDonald  |  March 16, 2013  |  Comments Off

  The idea of “sandboxing” potentially malicious content and applications isn’t new but interest in this type of approach on Windows desktops is growing. Further, the increasing variety of virtualization and abstraction techniques available on Windows create isolation that can be used to provide security separation – aka “sandboxing”. Given the innovation around virtualization techniques [...]

Comments Off

Category: Beyond Anti-Virus Endpoint Protection Platform Next-generation Security Infrastructure Virtualization Virtualization Security     Tags: , , , , , , , , ,

What we Need is the Equivalent of Apple for Enterprise Data Centers

by Neil MacDonald  |  August 29, 2012  |  Comments Off

I’ve spent the last three days in Silicon Valley – some of it at VMworld and some of it with a client. With the flight out and back to the West Coast, I’ve had some time to do some thinking. Cleary, there’s a perception that hardware is commoditizing and that there’s little or no premium left in [...]

Comments Off

Category: Cloud Security General Technology Information Security Next-generation Data Center Next-generation Security Infrastructure Virtualization Security     Tags: , , , , ,

Don’t Trust Your Servers

by Neil MacDonald  |  June 17, 2011  |  3 Comments

One of the toughest problems in information security is addressing advanced intrusions that have bypassed traditional security controls and now reside undetected on enterprise systems. With financially motivated attacks and state-sponsored “advanced persistent threats” both on the rise, intrusions can remain undetectable for extended periods of time. We have reached a point where our systems [...]

3 Comments »

Category: Beyond Anti-Virus Next-generation Security Infrastructure Virtualization Virtualization Security     Tags: , , , , , , , ,

Improving Security by Killing Server and Desktop Workloads

by Neil MacDonald  |  June 16, 2011  |  Comments Off

It sounds counterintuitive, but today’s advanced threat environment requires new approaches to the ongoing security and management of server and desktop workloads. The trouble with Advanced Persistent Threats is that, by definition, they have evaded our traditional network and endpoint security controls and now reside undetected in our IT Systems. How many advanced intrusions will [...]

Comments Off

Category: Beyond Anti-Virus Next-generation Security Infrastructure Virtualization Virtualization Security     Tags: , , , , , , ,

Is Single Instance Security the Future?

by Neil MacDonald  |  June 6, 2011  |  Comments Off

I’ve been researching the intersection between virtualization and security for several years. Like security and cloud computing, virtualization and security is also following a maturity curve. The first several years were discussions with clients on how to deploy virtualization securely. Over the past 2 years, I’ve had an increasing number of calls on the virtualization [...]

Comments Off

Category: Next-generation Security Infrastructure Virtualization Virtualization Security     Tags: , , , , , ,

Observations from Microsoft’s Management Summit

by Neil MacDonald  |  March 22, 2011  |  Comments Off

I’ve spent the past day and a half attending Microsoft’s Management Summit in Las Vegas. From my perspective the announcement that will affect the most enterprises from a security perspective was a change in licensing related to Forefront. Some history — in 2010, Microsoft reorganized the Server and Tools Business Unit placing the Forefront Endpoint [...]

Comments Off

Category: Cloud Cloud Security Endpoint Protection Platform Microsoft Microsoft Security Next-generation Data Center Virtualization Virtualization Security     Tags: , , , , , , , ,

NIST Publishes Its Virtualization Security Guidelines

by Neil MacDonald  |  February 10, 2011  |  Comments Off

Last week, the US National Institute of Standards and Technology (NIST) published its final virtualization security guidelines. There are already guidelines available from the Center for Internet Security, VMware, Microsoft, and Citrix as well as guidelines from the Defense Information Security Agency in the form of STIGs. NIST adds to this collective knowledge and expands [...]

Comments Off

Category: Virtualization Virtualization Security     Tags: , , , , ,

Yes, Hypervisors Are Vulnerable.

by Neil MacDonald  |  January 26, 2011  |  5 Comments

In one of my first posts as a blogger nearly 2 years ago, I discussed the potential for disaster if a compromise in the virtualization platform (hypervisor/VMM) occurred. Last year (I was intending to comment on this at the time, but it slipped my mind), I was reading the IBM X-Force 2010 Mid-Year Trend and [...]

5 Comments »

Category: Next-generation Data Center Next-generation Security Infrastructure Virtualization Virtualization Security     Tags: , , , , , , , ,

Securing Private Clouds Requires Changes to Information Security Infrastructure

by Neil MacDonald  |  December 1, 2010  |  4 Comments

As organizations virtualize their data centers, information security has had to evolve to support this. The same will be true as data centers evolve to private clouds – security must evolve to support the needs of private cloud infrastructure. For most organizations, virtualization will provide the foundation and the stepping stone for the evolution to [...]

4 Comments »

Category: Cloud Cloud Security Next-generation Data Center Next-generation Security Infrastructure Virtualization Virtualization Security     Tags: , , , , , , , ,

Virtualizing IE6 Using Application Virtualization Violates Microsoft’s EULA?

by Neil MacDonald  |  September 22, 2010  |  11 Comments

Migrating from IE6 to IE8 is not easy because of legacy web-enabled applications that don’t render correctly on IE8 and vendors that are slow to officially support it. There are a variety of ways to virtualize IE6 to help with this issue, including using application virtualization tools. I originally wrote about the potential issues using [...]

11 Comments »

Category: Microsoft Microsoft Security Virtualization     Tags: , , ,