Skip to main content

Securing your ESX Server with Reflex VSA!



OK everyone's been screaming about security since sure if a product is doing so darn good. Maybe we can crack it by pointing to its vulnerabilities. Sure lots of talk about how VM Rootkits would kill VMs! VMware's R&D guy explains that it isn't VM but the OS. And hey OSs have been vulnerable all the time, they're just running as a VM now , that doe not necessarily mean that if they get hacked your VM is to blame!

Anyways I also saw this upcoming product Reflex VSA on securing the ESX Server to start with. The news article says...


Reflex VSA is a virtualized network security appliance that operates within a virtual network and replicates the operational attributes and interfaces of a physical network security appliance, while supporting the Reflex Security apps.


And this is what the company has to say...

Product Benefits:
Reflex VSA solves the problem that traditional network security such as IPS and firewall appliances currently can not solve: detecting and preventing attacks within a virtual server. Because Reflex VSA runs as virtualized application inside the virtualized environment, it can detect and mitigate threats between virtual hosts and networks.

Reflex VSA Features:

  • Access firewall for permission enforcement for intra-host and external network communication
  • • Intrusion Prevention with inline blocking and filtering for virtualized networks
  • • Anomaly, signature, and rate-based threat detection capability
  • Network Discovery to discover and map all virtual machines and applications
  • • Reflex Command Center, providing a centralized configuration and management console, comprehensive reporting tools, and real-time event aggregation and correlation
Anyways I want to see what it really does! So I've ordered for a demo. And you'd ask yourself the same questions that I'm asking myself.

IF IT(ddos,access violation etc) CAN REACH MY PHYSICAL SERVER (by passing my firewall/PIX where I spend massive amounts yearly on support from vendors like Cisco) THEN I WAS NEVER SAFE, AIN'T IT?





Cheers

Tarry

Comments

Popular posts from this blog

DeepLearningTrucker Part 1

Avastu Blog is migrating to IdeationCloud.com; 1st Jan 2009 live

YOU DON'T HAVE TO DO ANYTHING. WITHIN 2 SECONDS YOU WILL BE REDIRECTED TO THE NEW HOME OF AVASTU BLOG. PLEASE DO UPDATE AVASTU BLOG'S URL to : http://www.ideationcloud.com on your website.

I will send out emails personally to those who are using my link(s) on their sites.

Thanks much for your co-operation and hope you enjoy the new site and its cool new features :-)




Not like the site is unlive or something..on the contrary, its beginning to get a lot of attention already. Well most of the work is done, you don't have to worry about anything though:

What won't change

Links/Referrals: I will be redirecting the links (all links which you may have cross-posted) to IdeationCloud.com - so you don't have to do anything in all your posts and links. Although, I would urge however that you do change the permalinks, especially on your blogs etc yourselfThis blog is not going away anywhere but within a few months, I will consider discontinuing its usage. I won't obviously do …

Cloud Security: Eliminate humans from the "Information Supply Chain on the Web"

My upcoming article, part - 3 data center predictions for 2009, has a slideshot talking about the transition from the current age to the cloud computing age to eventually the ideation age- the age where you will have clouds that will emote but they will have no internal employees.

Biggest management disasters occur because internal folks are making a mess of the playground.

Om's blog is carrying an article about Cloud security and it is rather direct but also makes a lot of sense:

I don’t believe that clouds themselves will cause the security breaches and data theft they anticipate; in many ways, clouds will result in better security. Here’s why: Fewer humans –Most computer breaches are the result of human error; only 20-40 percent stem from technical malfunctions. Cloud operators that want to be profitable take humans out of the loop whenever possible.Better tools – Clouds can afford high-end data protection and security monitoring tools, as well as the experts to run them. I trust…