VMware is currently leading the way on the market, and this is an unquestionable claim. Suffice it to say that, according to some statistics, VMware’s share in the hypervisor market exceeds 70%. But what really makes vSphere such a desirable product, and where does its strength come from? Are its technologies such as High Availability, or maybe we, the customers, decide about the power of this product?
Read moreXopero Blog
vSphere, how to build your own virtual cloud
We know already that VMware products are currently set as an example by IT specialists, and we have proved why this is the case in a series of entries on the Xopero blog. Since we have already established that we should and want to use the solutions proposed by VMware when virtualizing our environment, now is the time to present examples of such implementations.
Read moreAmazon’s Twitch data leak / Apache HTTP Server 0-day / VMware ESXi targeted in a new campaign
Welcome to Security Center – our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks – precisely selected by our editors.
Don’t miss it out! Sign up now and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.
In the meantime, let’s check what happened in the cyber-world last week.
Read moreCan I delete the VSWP file in VMware?
The simplest answer is yes, you can delete VSWP files. But you should rather ask if you really want to do it? At this time you probably figured out that VSWP is going to be the main topic of this article. We will start with answering what these files really are and why in most cases, their removal is challenging by the VMware hypervisor? Then we will move forward.
Read moreGriftHorse malware / New Windows domains backdoor / iPhone Apple Pay + Visa bug
Welcome to Security Center – our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks – precisely selected by our editors.
Don’t miss it out! Sign up now and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.
In the meantime, let’s check what happened in the cyber-world last week.
Read moreNew malware – TinyTurla and Capoae / Fake certificate alert and dangerous TeamViewer
Welcome to Security Center – our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks – precisely selected by our editors.
Don’t miss it out! Sign up now and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.
In the meantime, let’s check what happened in the cyber-world last week.
Read morevCenter, vSphere, ESXi, and the power of VMware
VMware has many products in its portfolio that are aimed at various users, companies, and various projects. If our main goal is to build a virtual environment, the combination of ESXi, vCenter and vSphere products is what we are looking for. The very planning and implementation of the virtual environment are as important as taking care of its proper backup after startup – and that we should never forget.
Read moreOMIGOD vulnerabilities / Apple fixed newest 0-day / Windows Subsystem for Linux
Welcome to Security Center – our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks – precisely selected by our editors.
Don’t miss it out! Sign up now and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.
In the meantime, let’s check what happened in the cyber-world last week.
Read moreVMware and the 1/3 rule
Currently, we can risk a statement that not only global corporations but also medium and small companies decide to introduce the principle of dividing infrastructure into three parts. What does it really mean, and why do so many in the IT industry praise such a solution?
Read moreFortinet FortiGate VPN credentials leak / The newest 0-days: Office 365, and Ghostscript
Welcome to Security Center – our weekly update on the most devastating cyberattacks, high-severity vulnerabilities, and biggest data leaks – precisely selected by our editors.
Don’t miss it out! Sign up now and have it delivered to your inbox each Monday to start a week safe and sound. Additionally, you will receive a portion of the hottest company news and access to selected technical articles written by our experts with advice and tricks for more effective protection of your IT infrastructure.
In the meantime, let’s check what happened in the cyber-world last week.
Read more