Linux Upgrades? Red Hat Enterprise Linux 7 Simplifies the Task

The latest release of Red Hat Enterprise Linux (RHEL) 7 offers a range of new features, from Linux container virtualization to Logical Volume Manager (LVM) snapshots. For organizations and end users committed to enterprise Linux, one appealing change is the in-place upgrade.

Read more

Linux Upgrades? Red Hat Enterprise Linux 7 Simplifies the Task

The latest release of Red Hat Enterprise Linux (RHEL) 7 offers a range of new features, from Linux container virtualization to Logical Volume Manager (LVM) snapshots. For organizations and end users committed to enterprise Linux, one appealing change is the in-place upgrade.

Read more

Applying the Four Standards of Security-Based CIA

Constant change in the technology landscape has been mirrored by the steady evolution of information security. The current information system environment is increasingly complex, comprising storage, servers, LANs/WANs, workstations, Unified Communications, Intranet, and Internet connections.

Read more

KVM Security in Multi-Tenant Cloud Environments

It’s useful to note that security in an open source KVM environment occurs on three levels: the kernel layer within the Linux OS, network layer, and at the hardware level.

Since its kernel-based protection mechanisms were created early on in Linux development, KVM incorporates key SELinux controls to provide isolation and confinement for processes. This means data and applications are fully protected, even in multi-tenant environments where multiple clients are served by one software instance.

Read more