New & Notable
Securing a VMware environment News
August 02, 2010
This news roundup has information on VMware's new Volume Purchasing Program. There is also news on unreleased vShield security features, users migrating to ESXi and more.
April 09, 2010
This week's VMware news roundup includes Windows Server security flaw that grants access to VMware guests, ways to build out virtualization environments to remote offices
March 26, 2010
This week's VMware news roundup includes VMware embracing Active Directory, an alternative to Host Profiles for virtualization management and a network equipment bargain.
January 07, 2010
Stealing a virtual machine and its data is pretty easy. If you know how it's done, you can figure out how to prevent it and avoid some potentially costly administrative missteps.
Securing a VMware environment Get Started
Bring yourself up to speed with our introductory content
Esxtop is a command-line tool that gives you real-time information on resource usage in your vSphere environment. Continue Reading
VMware vShield is a group of networking and security products for virtualized IT infrastructures, comprising vShield Manager, vShield Edge, vShield Zones, vShield App, vShield Data Security and vShield Endpoint. Continue Reading
Proper vSphere network configuration can test your patience. Test your skills with this VMware virtual network technologies quiz. Continue Reading
Evaluate Securing a VMware environment Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
These three quick tips on developing a software-defined data center will help data center managers make the transition to complete automation. Continue Reading
A recent survey reveals that many customers expect more from VMware security updates -- something Tom Howarth has been saying for years. Continue Reading
Compliance testing tools, like VMware’s Compliance Checker for vSphere can help administrators ensure their environments are conforming to security standards. Continue Reading
Product ReviewsPowered by IT Central Station
Powered by IT Central Station
Disclosure: My company is a VMware reseller. What I have found is as follows: VMware: - Easier to setup, established product, works with most...Continue Reading
Switched from Citrix XEN and EMC VMWare: No downtime when node needs service but web interface could be simplifiedPowered by IT Central Station
Use Of Solution: I have been using the solution since February 2010. Valuable Features: Live migration. Improvements To Organization: With...Continue Reading
Powered by IT Central Station
Valuable Features: RHEV costs are very low compared to other Virtualization products. RHEV hypervisor supports up to 160 cores and up to 2 TB of...Continue Reading
Manage Securing a VMware environment
Learn to apply best practices and optimize your operations.
Get familiar with the details and use these four steps to lock down hosts in your VMware virtualized environment. Continue Reading
Using VMware vCenter roles can eliminate security concerns while giving IT teams the access they need. Continue Reading
While virtualization admins are not information security experts, they can borrow those practices to tighten hypervisor security. Continue Reading
Problem Solve Securing a VMware environment Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Why plan ahead for a VMware View certificate installation? Because one misstep could lead to a lot of help desk tickets from nervous VDI users. Continue Reading
VMware administrators can guard multi-user VMs, often found in classrooms and kiosks, from malware or upgrades with VM access control settings. Continue Reading
VMware endowed vCenter Protect with antivirus patch management as well as scripting and inventory features for physical and virtual machines. Continue Reading