Welcome!

Containers Expo Blog Authors: Zakia Bouachraoui, Elizabeth White, Liz McMillan, Pat Romanski, Yeshim Deniz

Related Topics: Containers Expo Blog, Cloud Security

Containers Expo Blog: Blog Post

How Does VMsafe Work?

VMsafe security solutions are not “one size fits all”

VMsafe is a set of security-oriented APIs created by VMware and introduced with the launch of vSphere 4. These APIs are not available in older versions of VMware. VMsafe enables 3rd-party ISVs to develop products that closely integrate with vSphere to deliver new capabilities for securing the virtual environment. (Watch: "What VMware Says About Security" [Flash] » )

The three main areas covered by VMsafe are Memory, Disk and Network. In general, these APIs enable a security product to inspect and control certain aspects of VM access to memory, disk and the network from “outside” the VM, leveraging the hypervisor to look inside a VM without actually loading any host agents.

There are several key advantages offered by the VMsafe approach:

  1. Central processing of security functions is more efficient than distributing security controls and related overhead to each VM
  2. No host agents required – guaranteeing security for all VMs regardless of operating system type and patch level, and with no impact to applications running inside the VMs.
  3. Tamper-proof security. Host-agents are subject to getting compromised by the very malware they aim to thwart (e.g., Conficker turning off A/V). By contrast, hypervisor-based security resides outside the guest-VM, and is thus tamper-proof to any malware infections inside a VM.

When it comes to performance (see #1 above), VMsafe implementations can vary widely. The ultimate performance is delivered by integrating security controls directly into the hypervisor kernel, via “kernel-mode” VMsafe (i.e., processing security controls in the vKernel). Latency and throughput speeds for “kernel-mode” VMsafe can be 5-10x faster than “VM-mode” VMsafe (i.e., processing all security controls inside a VM), benefiting from faster processing and fewer context switching in the VMware kernel.

In summary, VMsafe security solutions are not “one size fits all”. When selecting or evaluating vendors, it is important to understand their performance impact on the virtual server, as well as their roadmap for leveraging the full suite of VMsafe APIs (Memory, Disk and Network) to deliver innovative solutions. (Read more: "Some Criteria To Consider When Evaluating VMsafe Solutions" »)

When done right, virtual security can make the virtual data-center more secure than its physical counterpart, a truly exciting prospect for the entire industry.

Read more:
"Why Do We Need Virtual Security?"

More Stories By Catherine Edwards

Catherine Edwards is a marketing consultant.

IoT & Smart Cities Stories
CloudEXPO has been the M&A capital for Cloud companies for more than a decade with memorable acquisition news stories which came out of CloudEXPO expo floor. DevOpsSUMMIT New York faculty member Greg Bledsoe shared his views on IBM's Red Hat acquisition live from NASDAQ floor. Acquisition news was announced during CloudEXPO New York which took place November 12-13, 2019 in New York City.
BMC has unmatched experience in IT management, supporting 92 of the Forbes Global 100, and earning recognition as an ITSM Gartner Magic Quadrant Leader for five years running. Our solutions offer speed, agility, and efficiency to tackle business challenges in the areas of service management, automation, operations, and the mainframe.
Apptio fuels digital business transformation. Technology leaders use Apptio's machine learning to analyze and plan their technology spend so they can invest in products that increase the speed of business and deliver innovation. With Apptio, they translate raw costs, utilization, and billing data into business-centric views that help their organization optimize spending, plan strategically, and drive digital strategy that funds growth of the business. Technology leaders can gather instant recomm...
In an age of borderless networks, security for the cloud and security for the corporate network can no longer be separated. Security teams are now presented with the challenge of monitoring and controlling access to these cloud environments, at the same time that developers quickly spin up new cloud instances and executives push forwards new initiatives. The vulnerabilities created by migration to the cloud, such as misconfigurations and compromised credentials, require that security teams t...
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected pat...
AI and machine learning disruption for Enterprises started happening in the areas such as IT operations management (ITOPs) and Cloud management and SaaS apps. In 2019 CIOs will see disruptive solutions for Cloud & Devops, AI/ML driven IT Ops and Cloud Ops. Customers want AI-driven multi-cloud operations for monitoring, detection, prevention of disruptions. Disruptions cause revenue loss, unhappy users, impacts brand reputation etc.
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
@CloudEXPO and @ExpoDX, two of the most influential technology events in the world, have hosted hundreds of sponsors and exhibitors since our launch 10 years ago. @CloudEXPO and @ExpoDX New York and Silicon Valley provide a full year of face-to-face marketing opportunities for your company. Each sponsorship and exhibit package comes with pre and post-show marketing programs. By sponsoring and exhibiting in New York and Silicon Valley, you reach a full complement of decision makers and buyers in ...
While the focus and objectives of IoT initiatives are many and diverse, they all share a few common attributes, and one of those is the network. Commonly, that network includes the Internet, over which there isn't any real control for performance and availability. Or is there? The current state of the art for Big Data analytics, as applied to network telemetry, offers new opportunities for improving and assuring operational integrity. In his session at @ThingsExpo, Jim Frey, Vice President of S...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...