Skip to main content

Home/ DirSec Security/ Group items tagged virtualization

Rss Feed Group items tagged

Art Walker

VMware Delivers High-Performance Virtual Desktop Solution for Remote Users with Sun Mic... - 0 views

  •  
    VMware and Sun Microsystems are working together to deliver a high-performance virtual desktop solution across wide area networks with a new integrated solution that includes the VMware Virtual Desktop Infrastructure (VDI) platform and Sun Microsystems' Sun Ray™ software and virtual display clients. The solution utilizes Sun's Appliance Link Protocol™ (ALP), which outperforms other display protocols when used to deliver virtual desktops over networks with high latency. Customer tests show dramatic increases in performance when using VMware VDI with Sun ALP to deliver complete desktop environments in a WAN deployment.
Art Walker

ChannelWeb: Emerging Vendors: Altor Networks - 0 views

  •  
    Altor Networks' flagship Altor Virtual Firewall (VF) combines a VMware VMsafe firewall with virtual-aware IDS, designed to stop malware outbreaks that can rapidly infect virtual machines. The product is also designed to eliminate blind spots on the network caused by lack of visibility between host servers and VMs. Plus, it gives customers the ability to sail through compliance audits by providing the ability to filter, monitor and report virtual traffic.
Art Walker

Virtualization tool assesses VMware security configurations - 0 views

  •  
    VMware and partner Tripwire have a tool that they say could make the job easier. Called Tripwire ConfigCheck, the free tool assesses ESX Servers against VMware's configuration rules. ConfigCheck is available for download on Tripwire's site, with a link on VMware's security site as well. Users can scan individual ESX Servers, presenting remediation instructions for non-compliant systems.
Garrett A

Ramming Microsoft down IT's throat | Hardware - InfoWorld - 0 views

  •  
    I don't mean to pick on Nissan by any means but I am quite curious to know exactly what it takes to make an IT organization (or more explicitly, IT management) choose a blatantly inferior product over far more capable competing products for use in such a critical environment no matter how sweet the deal may seem.
1 - 5 of 5
Showing 20 items per page