Gartner Blog Network

Tag: 'hyper-v' Blog Posts

from the Gartner Blog Network

TechEd Announcements that enhance End User Computing

by Gunnar Berger  |  June 3, 2013

At events like Microsoft’s TechEd it can be hard to hear the important updates through all the announcements. I wrote this blog while cramped in the keynote and honestly it...

Read more »

Comments: 3

Observations from Microsoft’s Management Summit

by Neil MacDonald  |  March 22, 2011

I’ve spent the past day and a half attending Microsoft’s Management Summit in Las Vegas. From my perspective the announcement that will affect the most enterprises from a security perspective...

Read more »

NIST Publishes Its Virtualization Security Guidelines

by Neil MacDonald  |  February 10, 2011

Last week, the US National Institute of Standards and Technology (NIST) published its final virtualization security guidelines. There are already guidelines available from the Center for Internet Security, VMware, Microsoft,...

Read more »

VM Templates Should Include at Least 2 Virtual Hard Disks

by Chris Wolf  |  August 5, 2010

Today I was working with a client on their next generation data center architecture. They are building a highly virtualized data center with the goal of offering cloud IaaS to...

Read more »

Comments: 14

A Downside to Hyper-V

by Neil MacDonald  |  February 11, 2010

In my post yesterday on MS10-015, I discussed a troublesome kernel-level vulnerability that affects most versions of Windows. Most of you will remember that Hyper-V’s parent partition is based on...

Read more »

Comments: 6

Virtual Appliances are Real

by Neil MacDonald  |  March 9, 2009

In previous posts, I discussed how security controls need to be virtualized to support the next-generation highly virtualized data center. I have also talked about how most of these virtualized...

Read more »

Comments: 2

Securing Hyper-V

by Neil MacDonald  |  March 2, 2009

Last week, Microsoft released its beta guidelines for securing Hyper-V. Prescriptive guidance is an important first step for securely deploying any virtualization solution. As many of you know, Hyper-V is...

Read more »

Hypervisor Attacks and Hurricanes are Inevitable, but Breaches Don’t Have to Be.

by Neil MacDonald  |  February 17, 2009

In my research on virtualization security, I am frequently asked “Aren’t attacks on the virtualization layer just theoretical?” and “Do you know of any publicly disclosed hypervisor attack that resulted...

Read more »

Comments: 2