Virtualization: Resource Coupling and Security across the Stack
Dennis Moreau - Configuresoft
Sep 10, 2008Size: 554.3MB
Download: MP4 Video
Watch in your Browser Watch on YouTube
AbstractVirtualization technology can deliver better IT asset utilization, more agile IT asset allocation, more efficient use of resources, while supporting a potentially more secure IT infrastructure. Virtualization accomplishes these benefits by leveraging mechanisms which provide a) asset isolation, b) resource sharing and c) provisioning dynamics.
This session will address how to use configuration and behavioral information to address the increased complexity of security, compliance and risk assessment in virtualized environments. Comprehensive security and risk situation awareness of more dynamic, more interdependent, and more insulated assets, will allow enterprises to take fuller advantage of the promised benefits of virtualization.
This session will also briefly address extension of these considerations to the cloud and utility computing infrastructures.
About the SpeakerAs a Founder and the Chief Technology Officer for Configuresoft, Dennis Moreau is specialist in the application of leading edge technologies to the solution of complex problems in the Information Technology management domain. His primary focus is in developing enterprise scale solutions to improve IT efficiency and effectiveness for systems management, security compliance and configuration optimization. He works actively with the National Institute of Standards and Technology (NIST) and Mitre on the development of security configuration policy compliance standards.
Dennis has over than 20 years of experience in evaluating, designing and managing complex software systems. Prior to joining Configuresoft, he was the Associate Vice President and Chief Technology Officer for Baylor College of Medicine (BCM). Dennis also has extensive experience as an IT Strategic Planning and System Architecture consultant for many commercial and governmental organizations including the DOD, NASA and IBM Corporation. He holds a doctorate in Computer Science and speaks regularly at IT management and security conferences internationally.
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.