Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Red Hat Releases Enterprise Virtualization 3.0 Beta

Red Hat today announced the Beta release of Red Hat Enterprise Virtualization 3.0, the next-generation version of the company’s end-to-end server virtualization and desktop virtualization solutions.

Red Hat today announced the Beta release of Red Hat Enterprise Virtualization 3.0, the next-generation version of the company’s end-to-end server virtualization and desktop virtualization solutions.

Red Hat Enterprise Virtualization 3.0Red Hat Enterprise Virtualization for Servers uses the hardened Red Hat Enterprise Linux kernel as its security foundation. Red Hat Enterprise Linux and Red Hat Enterprise Virtualization both leverage SELinux, developed in conjunction with the United States Department of Defense and National Security Agency along with vendors such as IBM, HP, and MITRE. SELinux ensures isolation between virtual machines and between each machine and the Red Hat Enterprise Virtualization Hypervisor.

The Red Hat Enterprise Virtualization 3.0 Beta previews several enhancements, including:

• Red Hat Enterprise Virtualization Manager is now a Java application running on JBoss Enterprise Application Platform on Red Hat Enterprise Linux

• An updated KVM hypervisor based on the latest Red Hat Enterprise Linux 6

• High performance and scalability levels, supporting up to 128 logical CPUs and 2TB memory for hosts, and up to 64 vCPUs and 2TB memory for guests

• A user portal that allows end users to provision virtual machines, define templates and administer their own environments

• A RESTful API that allows all aspects of Red Hat Enterprise Virtualization to be managed and configured programmatically

Advertisement. Scroll to continue reading.

• New multi-level administrative capabilities, improving product functionality for very large deployments

• New local storage capabilities

• An integrated and embedded reporting engine allowing for analysis of historic usage trends and utilization reports

• SPICE WAN optimization and enhanced performance including dynamic compression and automatic tuning of desktop effects and color depth. The new version of SPICE also features enhanced support for Linux desktops.

Desktop Virtualization

Desktop virtualization makes it possible for IT to deliver desktops and apps straight from the datacenter to any device, making device management much easier and more secure.

According to a recent report from Citrix Systems, Desktop Virtualization is playing a key part in the “bring your own device (BYO)” trend that many enterprises are experiencing. According to the Citrix study, sixty two percent of surveyed organizations already invested or plan to invest in desktop virtualization. Eighty percent of those organizations intend to leverage their desktop virtualization investment to support employee-owned devices and BYO.

With Red Hat Enterprise Virtualization for Desktops, complete desktop environments are hosted as virtual desktops on servers located in a centralized datacenter. Users connect to these virtual desktops using either inexpensive thin clients or repurposed PCs. The solution utilizes SSL Encryption to ensure secure data transmission between virtual desktops and the devices used to access them. Virtual desktops can have up to 16 virtual CPUs, maximizing performance, while memory page sharing and ballooning help maximize the number of virtual desktops that can be hosted on a single hypervisor.

“Red Hat Enterprise Virtualization 3.0 is expected to provide customers with many exciting new features and capabilities, previewed in today’s Beta,” said Navin Thadani, senior director, Virtualization Business at Red Hat. “One of the most significant new features of the release is the ability to deploy the management server on Linux, making it an ideal platform for customers moving away from proprietary solutions.”

Red Hat Enterprise Virtualization 3.0 is currently a private beta for customers, but there will be a public beta following, a company spokesperson told SecurityWeek.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join security experts as they discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business.

Register

Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.