News
3/21/2008
01:10 AM
Terry Sweeney
Terry Sweeney
Commentary
50%
50%

Behind Microsoft's Visor

What if Microsoft decided to get really serious about server virtualization? Yeah, yeah, I know Hyper-V is coming this summer. But especially now that they've made such a hash of Vista, virtualization's a natural place for the company to regain a bit of

What if Microsoft decided to get really serious about server virtualization? Yeah, yeah, I know Hyper-V is coming this summer. But especially now that they've made such a hash of Vista, virtualization's a natural place for the company to regain a bit of momentum and stature, at least in the data center.The prevailing wisdom is that Redmond's dragging its heels on virtualization so as not to needlessly cut the flow of Windows server licensing and service fees. Still, you've got to wonder how long VMware's dominance in this sector will go unchecked, especially since this blogger says Hyper-V will outperform VMware's ESX where Microsoft apps are concerned.

This explains a bit the churlishness on Microsoft's part where VMware support is concerned. More than one enterprise customer has complained about Microsoft's indifference (or reliance on end-user licensing boilerplate) for not supporting VMware on its servers or apps. They've struck deals with nearly all the smaller virtualization vendors. I guess there's no need to hand your major competitor the keys to your customers' servers.

That's why I'd love to see Microsoft actually do something really stellar here. You know, something to put VMware on notice and stir the competitive spirits of both HP and Sun. But I'm not optimistic. Internal critics are ignored or overriden and there seems to be a lot of settling for less at Microsoft -- the cost, we're told, of being the world's most widely used software. Still, here's a chance for the company to do something cool, smart, and excellent. We'll know this summer how passionately they embraced this virtual opportunity.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2329
Published: 2015-08-31
Multiple cross-site scripting (XSS) vulnerabilities in Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allow remote authenticated users to inject arbitrary web script or HTML via the (1) agent string for a check_mk agent, a (2) crafted request to a monitored host, which is not properly handled by ...

CVE-2014-2330
Published: 2015-08-31
Multiple cross-site request forgery (CSRF) vulnerabilities in the Multisite GUI in Check_MK before 1.2.5i2 allow remote attackers to hijack the authentication of users for requests that (1) upload arbitrary snapshots, (2) delete arbitrary files, or possibly have other unspecified impact via unknown ...

CVE-2014-2331
Published: 2015-08-31
Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.

CVE-2014-2332
Published: 2015-08-31
Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allows remote authenticated users to delete arbitrary files via a request to an unspecified link, related to "Insecure Direct Object References." NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.

CVE-2014-2570
Published: 2015-08-31
Cross-site scripting (XSS) vulnerability in www/make_subset.php in PHP Font Lib before 0.3.1 allows remote attackers to inject arbitrary web script or HTML via the name parameter.

Dark Reading Radio
Archived Dark Reading Radio
Another Black Hat is in the books and Dark Reading was there. Join the editors as they share their top stories, biggest lessons, and best conversations from the premier security conference.