Virtual machines

Virtual machines News

View All News

Virtual machines Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Virtual machines Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Virtual machines

Learn to apply best practices and optimize your operations.

  • Backing up virtual machines made simple with recovery in place, VM backup software

    Server virtualization has dramatically changed the process of backing up virtual machines, as well as the options that exist for backup recovery. Perhaps the most innovative of the recovery features is recovery in place. Recovery in place allows a virtual machine (VM) to be run directly from the backup media while a traditional restoration is taking place behind the scenes. Snapshot technology ensures that the backup is not modified as a result of recovery in place and allows any newly occurring write operations to be added to the virtual machine once the restoration is complete, thereby bringing the restored VM up to date. As revolutionary as recovery in place may be, however, implementing it requires proper planning in order to avoid performance and security issues. This three-part guide will discuss how recovery in place works and what administrators must do to avoid common pitfalls. Continue Reading

  • How the brave virtualize IT infrastructure services

    Critical IT infrastructure services -- DNS, DHCP servers -- don't need to live in the physical realm. Continue Reading

  • Delivering virtual Android apps to devices sans VMI platform

    If you have a reason to deploy VMI to users, you want a purpose-built VMI platform, but if you just want to try out an Android OS on your iPhone, you can use virtualization and RDP to play around. Continue Reading

View All Manage

Problem Solve Virtual machines Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • How secure are Hyper-V containers in Windows Server 2016?

    Container engines like Docker can compromise an entire root OS because of a lack of isolation. What steps can admins take to secure Hyper-V containers in Windows Server 2016? Continue Reading

  • Malware analysis beyond the sandbox

    Researchers estimate that 70% of organizations will have implemented virtual servers by the end of 2015, representing a tipping point in enterprises’ adoption of virtualization. Virtual machines (VMs) must be protected from malware like other systems but attackers are coming up with new ways to avoid detection and analysis. Security researchers have long used VMs to isolate and analyze malware, which has led to the misconception that malware disappears once it detects a VM. We look at how malware is adapting to virtual networks, and at the tools and processes that can help organizations secure these environments.

    Meanwhile, rogue activity of insiders continues to surprise Fortune 1000 companies. According to some studies, 80% of cybersecurity breaches are aided and abetted by insiders. Yet many CIOs continue to remain skeptical about investments in employee cybersecurity awareness training. New technologies now focus on user credentials, employee actions and behavior analytics. We look at the security culture in today's organizations and effective strategies to improve visibility, policy and prevention of insider threats.

    A new class of endpoint threat detection products is designed to improve visibility across endpoints, hunt for threats, automate incident response and cut down on false alerts overwhelming security teams. How do they work? We interview CSOs who have invested in endpoint defense and remediation tools and share their views on the pros, cons and common deployment scenarios. Continue Reading

  • Hyper-converged infrastructure presents operational challenges

    Bringing in a hyper-converged platform can present a complication in the data center where networking, virtualization and storage teams were once separated. Continue Reading

View All Problem Solve