Use an SDN controller with IBM solutions to secure your assets in the cloud

In the first post of a series on developerWorks, my colleague and I discussed how to manually deploy the flow rules for Open vSwitch to protect virtual machines (VMs) running on a KVM hypervisor. However, the solution we proposed then is not always practical in the real world, because the assets in the cloud can […]

Continue reading

Securing Software Defined Networking: Using open standards with IBM solutions to secure your assets in the cloud

Software Defined Networking (SDN) is an emerging technology that has come in tandem with the rise of cloud computing. This prominent technology adds a boost to network virtualization, which eliminates the boundary of the physical network topology. However, the dynamic nature of SDN makes it harder to manage compared to a traditional network. When securing […]

Continue reading

Deployment patterns for security services in a Software Defined Environment (SDE)

As the prominence of software defined environments grows in tandem with new vulnerabilities in the virtual environment and the new technologies to secure the virtual assets, picking up an adequate deploy pattern for your security services will become critical to increase your return on investment (ROI).

Continue reading

How your data leaks from a virtual machine

Protecting your data depends on your ability to understand how it can leak from a virtual machine.

Continue reading

We secure the cloud: IBM Virtual Server Protection

IBM Virtual Server Protection (VSP) focuses on those new threats in the virtual world and leverages those new technologies to protect it.

Continue reading

No one will pay for the security on a hypervisor

How much money would you pay for the security on hypervisors?

Continue reading

Three key factors to provide security in virtualization

A security solution in the cloud should at least contain three key features to make itself attractive to customers.

Continue reading

Virtual memory – the Pandora’s box?

How to manage security in virtual memory? Virtual memory is the essential component in a virtual machine.

Continue reading

New technologies to protect the cloud

Virtualization not only brings new threats to your infrastructure but also brings new ways to protect it.

Continue reading

New threats in virtualization

All traditional threats could apply to VMs, but new complexity adds several new types of vulnerabilities.

Continue reading