Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

New HyTrust Offering Addresses Cloud Security Worries

HyTrust, a provider of access control and policy enforcement security for virtualization, is introducing a new tool that works with market-leading VMware virtualization software. The HyTrust Cloud Control product is intended to address one of the key concerns of enterprises considering moving their applications off-site to a multi-tenant public cloud service where their apps would be running along side those of other enterprises. As many industry experts have said, Coca-Cola is not going to want its data running in the same data center used by Pepsi.

Cloud Control allays such concerns with strong authentication and role-based access control along with the creation of audit logs that certify that an enterprise's data is protected. The technology makes it easier for a cloud customer to see who has and who doesn't have access to their cloud applications. Cloud Control is integrated with VMware's vCloud Director, which companies already managing a virtual environment use to expand IT capacity or migrate applications to the public cloud.

HyTrust is also upgrading its appliance for virtualization management to version 2.1, adding a partitioning capability so that administrators and system engineers can get access to information they need but is blocked from other information they're not authorized to see. While someone from Intel has access to see how their virtual servers are performing, they can't see AMD's resources in the same data center and vice-versa. Version 2.1 also regulates access to virtualization resources at the network layer, specifically supporting Cisco Nexus v1000 switches. The HyTrust Appliance, which will be available in early September, will be priced at $750 per CPU for each VMware ESX hypervisor host.

HyTrust is also expanding its partnership with security vendor RSA, adding interoperability with RSA's enVision log management solution for Security Information and Event Management (SIEM). The HyTrust appliance integrates well with RSA enVision because enVision analyzes audit logs generated by the appliance, noted Dave Bartoletti, senior analyst withThe Taneja Group, a research firm. "The HyTrust Appliance is collecting great information but integrating with RSA lets them put it in a repository and then do the analytics. Collecting all that information is useless unless you have something to analyze it," Bartoletti said. HyTrust has been early to market with technology that addresses security issues that weren't top-of-mind with customers when virtualization technology was first adopted.

"How are they going to convince me that the same administrator isn't logging into [both] Pepsi's and Coke's machines?" Bartoletti asks. Now that companies are going beyond virtualization in their own data centers and considering moving to the cloud, they need assurances from cloud service providers that their data will be protected, particularly in those multi-tenant environments.


Related Reading


More Insights


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

WAN Security Reports

Research and Reports

Network Computing: April 2013



TechWeb Careers