Vsphere

Security of the VMware vSphere Hypervisor.

May 1, 2022

Security_of_the
Virtualization addresses IT’s most pressing challenge: the infrastructure sprawl that compels IT departments to channel 70 percent of their budget into maintenance, leaving scant resources for business-building innovation. The difficulty stems from the architecture of today’s x86 computers: they’re designed to run just one operating system (OS) and application at a time. As a result, even small data centers must deploy many servers, each operating at just 5–15 percent of capacity—highly inefficient by any standard.

Spotlight

Optus

Established in 1992, we’re an Australian Telco that connects our customers through a full range of communications products including mobile, telephony, broadband, satellite and subscription TV. We look after our own mobile and fixed service networks and continue investment into new technologies like 4G and the National Broadband Network.

OTHER WHITEPAPERS
news image

ADDRESSING THE NEW THREAT INMODERN IT INFRASTRUCTURES

whitePaper | July 19, 2022

Data has become a new global currency. As with other currencies, it has also become a target for threats from those who wish to exploit its value. Ransomware is the new threat to data and it’s wreaking havoc on businesses of all sizes around the world.

Read More
news image

EyeSpy - Iranian Spyware Delivered in VPN Installers

whitePaper | October 12, 2022

During routine analysis of detection performance, we noticed a batch of processes that respected the same pattern in the process names. These names begin with sys, win or lib followed by a word that describes the functionality, such as bus, crt, temp, cache, init, and end in 32.exe. We later noticed that the .bat files and the downloaded payloads respect the same naming convention. Further investigation revealed the components are part of a monitoring application called SecondEye, developed in Iran and distributed legitimately via the developer’s website. We also found that some spyware components were already described in an article published by Blackpoint [1]. In the article, researchers drew attention to the dangers of legally distributed monitoring software with malicious behavior

Read More
news image

Intel Page Modification Logging, a hardware virtualization feature: study and improvement for virtual machine working set estimation

whitePaper | January 7, 2020

Intel Page Modification Logging (PML) is a novel hardware feature for tracking virtual machine (VM) accessed memory pages. This task is essential in today’s data centers since it allows, among others, checkpointing, live migration and working set size (WSS) estimation. Relying on the Xen hypervisor, this paper studies PML from three angles: power consumption, efficiency, and performance impact on user applications. Our findings are as follows. First, PML does not incur any power consumption overhead. Second, PML reduces by up to 10.18% both VM live migration and checkpointing time. Third, PML slightly reduces by up to 0.95% the performance degradation on applications incurred by live migration and checkpointing.

Read More
news image

VMware-Cloud on AWS Operations Guide

whitePaper | June 8, 2022

The VMware Cloud on AWS Operations Guide provides information about configuring advanced SDDC features that support ongoing operation of your VMware Cloud on AWS SDDC, including storage management, provisioning, and seamless interoperation with your on-premises data center.

Read More
news image

5G Virtual Private Networks for Electric Power White Paper:Network Security

whitePaper | November 21, 2022

5G is now entering diverse industries, including the electric power industry. 5G technologies can be adopted in the electric power industry to quicken the industry's digital and intelligent transformation, which will provide strong support for building a clean, secure, efficient, and lowcarbon electric power system. However, before widely applying 5G technologies in the industry, we must address current network security issues. Network security is at the basis of digital transformation and the industry has put forward the security protection principle "secure partitioning, exclusive network use, horizontal isolation,

Read More
news image

Why VDI makes sense forhard-core UNIX® and Linux® engineering applications

whitePaper | December 6, 2022

By now, everyone has heard the terms desktop virtualization and VDI It seems like we’ve been pounded with marketing propaganda about these technologies from companies like VMware, Citrix® and Microsoft® since 2006. But if desktop virtualization is so good, why are most of the world’s desktops still “old-style” physical desktops and laptops?

Read More

Spotlight

Optus

Established in 1992, we’re an Australian Telco that connects our customers through a full range of communications products including mobile, telephony, broadband, satellite and subscription TV. We look after our own mobile and fixed service networks and continue investment into new technologies like 4G and the National Broadband Network.

Events