vSphere Security

July 6, 2019

vSphere Security provides information about securing your vSphere® environment for VMware® vCenter® Server and VMware ESXi. To help you protect your vSphere environment, this documentation describes available security features and the measures that you can take to safeguard your environment from attack.

Spotlight

CloudSilicon

CloudSilicon delivers certified managed security services supported by a state-of-the-art, PCI compliant, readily scalable Network Operations Center, operated 24/7/365 by certified security and network professionals. The Network Operations Center has centers of excellence in key technology stacks. It can predict potential threats based on a client's network configuration, geographical location and threat vectors by using smart algorithms.

OTHER WHITEPAPERS
news image

VMware Horizon Cloud Service on Microsoft Azure Security Considerations

whitePaper | January 29, 2020

Horizon Cloud Service on Microsoft Azure is a software service from VMware that enables the delivery and management of virtual desktops and applications on Azure. Horizon Cloud on Microsoft Azure allows you to bring your own existing Azure infrastructure capacity and pair it with the Horizon Cloud Service. Built from the ground up as a cloud-native, multi-tenant solution, Horizon Cloud on Microsoft Azure combines the benefit of consuming desktop and application virtualization as an always up-to-date, software-as-a-service from VMware with the consumption-based infrastructure pricing and extensive global footprint of Azure.

Read More
news image

HPE SimpliVity Data Virtualization Platform technical white paper

whitePaper | January 10, 2020

When it comes to data center modernization, companies are struggling to make decisions about infrastructure and services to be more competitive and agile, reduce costs, and minimize risk. As trends such as virtualization, data center modernization, and software-defined everything take hold, it’s imperative to understand the new approaches to data center infrastructure and data architecture that drive the efficiencies required by customers.

Read More
news image

Cisco ACI Multi-Site Architecture

whitePaper | August 3, 2021

With the increasing adoption of Cisco® Application Centric Infrastructure (Cisco ACI®) as a pervasive fabric technology, enterprises and service providers commonly need to interconnect separate Cisco ACI fabrics. Business requirements (business continuance, disaster avoidance, etc.) lead to the deployment of separate data center fabrics, and these need to be interconnected with each other. Depending on the deployment option used (and as explained in this document), these fabrics may be called pods or fabrics and sites.

Read More
news image

Use Intel Virtualization Technologies To Help Protect Endpoint Applications & Data Without Impacting The User Experience

whitePaper | August 6, 2021

Use Intel Virtualization Technologies to help protect Endpoint applications & Data without impacting the User expereince. Hardware- based security capabilities dekiver the performance required to help protect application and data, without adversely impacting the user experience. Impove Endpoint Security for Remote Workers Isolating Employees' personel and work use helps prevent business data from being exfiltrated and helps protect businesses from vulnerabilities due to personel use of social media and browsing, especialyy valuable as the number of remote workers continues to grow, and many organizations expect an increase in personam work. Increase and Accelerate Security Protection with Intel Virtualization technology Form a business client endpoint perspective, virtualization lets organizations re-think productivity and security. Virtualization Solutions allow multiple operating systems (OSs) and applications to run in independent partitions.

Read More
news image

VMware vSAN & VMware vSAN+

whitePaper | July 5, 2022

Hyperconverged infrastructure (HCI) converges compute and storage resources on industry-standard x86 servers, and uses software to abstract and pool cluster resources with unified management software. HCI transforms data centers by simplifying operations through automation, and lowering TCO by leveraging industry standard servers and scaling incrementally.

Read More
news image

Intel Page Modification Logging, a hardware virtualization feature: study and improvement for virtual machine working set estimation

whitePaper | January 7, 2020

Intel Page Modification Logging (PML) is a novel hardware feature for tracking virtual machine (VM) accessed memory pages. This task is essential in today’s data centers since it allows, among others, checkpointing, live migration and working set size (WSS) estimation. Relying on the Xen hypervisor, this paper studies PML from three angles: power consumption, efficiency, and performance impact on user applications. Our findings are as follows. First, PML does not incur any power consumption overhead. Second, PML reduces by up to 10.18% both VM live migration and checkpointing time. Third, PML slightly reduces by up to 0.95% the performance degradation on applications incurred by live migration and checkpointing.

Read More

Spotlight

CloudSilicon

CloudSilicon delivers certified managed security services supported by a state-of-the-art, PCI compliant, readily scalable Network Operations Center, operated 24/7/365 by certified security and network professionals. The Network Operations Center has centers of excellence in key technology stacks. It can predict potential threats based on a client's network configuration, geographical location and threat vectors by using smart algorithms.

Events