logo
November 29, 2022 | Kevin Joyce

Commando VM: An Introduction

What is Commando VM? Commando VM is a testing platform that Mandiant FireEye created for penetration testers who are more comfortable with the Windows operating system. Essentially, Commando VM is the sister to Kali, a Linux testing platform widely used throughout the penetration testing...
January 16, 2020 | Vladan Seget

VMware Security Best Practices

Securing a virtual environment running VMware vSphere is not as simple as accepting the default setting and policies during installation. While the defaults provide partially hardened settings, there are many ways to improve upon them. By following VMware security best practices, you can help...
January 9, 2020 | Vladan Seget

The Basics of Virtualization Security

Virtualization security is a critical part of a comprehensive security strategy. In today’s environments which are over 80 % virtualized, virtualization security needs to be applied to all layers — physical, virtual and cloud. This article explains some of the key processes and configuration...
December 23, 2019 | Vladan Seget

How to Manage VMware Snapshots

What is a VMware snapshot? VMware snapshots are quick and easy way to save a state of a virtual machine (VM) before you test a patch, software update or other change. The VMware snapshot preserves the state and data of the VM at the current point in time, so when you are done testing, you can...
August 16, 2018 | Ryan Brooks

Hyper-V Security in Windows Server 2016

Administrator accounts work differently in virtualized environments than they do in physical ones. In particular, in a physical environment, administrative roles, such as storage administrator, network administrator, backup operator, and virtualization-host administrator, have limited or isolated...
June 10, 2016 | Richard Muniz

Tips to Avoid Detrimental Changes in VMware

Maintaining the performance and security of your virtual environment on a daily basis is an important — and non-trivial — task. VMware monitoring tools are a critical component of a solid security strategy because they help you quickly detect and remediate unauthorized changes and errors that...
July 1, 2015 | Danny Murphy

Visibility into Virtual Environment: Focus on VMware Server Security

Virtualization is something that has been gaining popularity among IT Pros in past several years, and not without reason. Multiple operation systems and applications can be run on a single server thus saving costs and resources. But virtual machines, not unlike any other part of IT infrastructure,...
February 17, 2015 | Krishna Kumar

Ten Simple Ways to Prevent Security Breaches in VMware Server

VMware is one of the leading virtualization product developers. Virtualization helps make the best use of hardware resources. Implementing and managing VMware infrastructure is simple and provides great performance with high availability and business continuity through simplified disaster recovery...
May 30, 2014 | Richard Muniz

Right Tools for Virtual Infrastructure Monitoring

The story goes that there was a Fortune 500 company that woke up one morning and found that they had over 5000 virtual machines. Right away, the question came up, if they are being used. So they did a very simple thing to find out. They shut them all off and waited for someone to scream. Almost no...
...