Monday Aug 24, 2009

Immutable Service Containers: Addressing Security in a World of Changing Deployment


Copy and paste the embed button to share on your blog, social networks, or website!

Cloud computing sits at the forefront of industry headlines these days. It's a trending computing model that is forcing many organizations to seriously consider it if they want to keep up with evolving IT business practices and maintain a competitive edge. But with this new shift towards virtualization technology come a number of concerns to address, particularly around issues of security. Glenn Brunette, Distinguished Engineer and Cheif Security Architect, is working on a project that attempts to solve some of the bigger problems around the security of virtualized environments using Immutable Service Containers (ISCs)--an architectural deployment pattern for highly secure service delivery.

Listen to this edition of Innovating@Sun in which Hal Stern, VP Global Systems Engineering, and Brunette discuss ISCs and how building them along principles of stronger security, greater integrity, and simplified security configuration and management is proving to be a very viable solution for organizations looking to safeguard their virtualized environments. Hal and Glenn go on to discuss:

  • micro-virtualization: how adding a thin management layer between the hypervisor and the service lends reliability to security enforcement and monitoring controls
  • how "immutable" Immutable Service Containers are
  • defense in depth measures being taken
  • current implementations with Solaris and OpenSolaris
  • what's next for ISCs, including building core concepts into projects such as Amazon's EC2 & the JEOS project; Virtualbox implementations; and integration of autonomic security techniques

    [Read More]
  • Tuesday May 19, 2009

    Public Policy and Trust - How Safe is Your Data?


    Copy and paste the embed button above to share on your blog, social networks, or website!

    The hordes of content we consume and transmit electronically every day is a testament to our faith in the security and privacy of certain information. When submitting a search on Google or making a bank transaction, many do so assuming that personal information is protected and safe from being shared with other entities. But is this really the case? Just how protected are we from invasion into our personal data and how can we be more aware of violations of our privacy?

    Susan Landau, Distinguished Engineer at Sun, recipient of the 2008 Anita Borg Institute Women of Vision Award, co-author of Privacy on the Line: the Politics of Wiretapping and Encryption, and recently named one of Fast Company's Top 5 Influential Women in Technology (in the Braniac category, no less) joins SVP Global Systems Engineering and host Hal Stern to discuss the issues of privacy, trust, and security in technology and the implications that current trends have at the business, personal, and political levels.


    [Read More]
    About

    Innovating@Sun blog - the latest in Innovation, Science, Technology and Engineering from Sun Microsystems

    Search

    Archives
    « April 2014
    SunMonTueWedThuFriSat
      
    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
       
           
    Today