The other day I was asked about application whitelisting as a way to deal with endpoint issues in virtual and cloud environments. I never really thought about it in this space, as usually application whitelisting was a technique used to control rogue users who like to install anything and everything on their desktops and laptops. So how does this practice affect virtual and cloud environments, and more importantly, does it make sense? Continue reading
Do you know of the Klingon proverb that tells us revenge is a dish that is best served cold? It is very cold in space.
I don’t want to say that Juniper has slipped under people’s radar over the last year, but there have been some really cool releases, especially their latest Virtual Gateway that I was shocked didn’t garner more attention than it did. For example, VGW 5 released some updates back in late summer to extend their portfolio of security solutions for virtual environments. The previous versions already had great support for monitoring, firewall, IDS and compliance, but now we are looking at the addition of endpoint antivirus, hypervisor compliance monitoring and large-scale security management capabilities, essentially making it a UTM solution for cloud and virtualization. This is great news for organizations who already use Juniper for their networking and security environments. Continue reading
A Chilling Bedtime Story About Anti-X Storms
As more and more infrastructure becomes virtualized, the migration to endpoint solutions that are optimized for virtual environments will become increasingly important. Any security professional will absolutely agree that endpoint is one of the most effective ways to keep corporate assets clean of malware and other fun stuff that is trying to take down your network and retrieve your mission critical data. However, traditional endpoint really doesn’t work in virtual environments as-is. Why? Oh, let me explain this favorite topic of mine. Continue reading