RSA: IBM's project Phantom to lock down virtual machines
IDG News Service - IBM researchers are developing new attack prevention technology for the company's virtualization products.
The company is set to detail the new project, code-named Phantom, at the RSA Conference in San Francisco Tuesday.
Phantom is a joint effort between IBM's X-Force threat analysis team and the company's research division. It aims to lock down the hypervisor software that IBM systems use to manage virtual machines. "What we're doing through Phantom is we're implementing an [intrusion-prevention system] -- an IPS that sits at the hypervisor layer," said Kris Lovejoy, director of strategy for IBM corporate security.
IPS systems are designed to stop computer attacks as they occur, by inspecting network traffic and figuring out whether or not it is malicious.
IBM invented the concept of a hypervisor and has been selling it as part of its mainframe computers, where it could run more than one copy of the operating system at the same time. In recent years, this type of virtualization software has been promoted on Unix and PC systems as a way for corporate users to squeeze more performance out of their servers.
The problem of securing these virtualized systems promises to be one of the hot topics at this week's conference, which is the largest annual event in the security industry.
IBM researchers have already worked on ways to secure the hypervisor, but with Phantom they will be using technology acquired in IBM's 2006 purchase of Internet Security Systems, a maker of IPS devices.
The researchers are also building tools that can lock down the hypervisor itself, Lovejoy added. "The hypervisor layer was built for optimum performance, not necessarily effective security," she said. "Our customers are just looking for assurance that their virtualized infrastructure is not going to be the single point of failure."
How long those customers will have to wait before they can take advantage of this new technology is unclear. Phantom is a research project and no timeline has been set for supporting it on IBM's servers, Lovejoy said.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- See the Possibilities Utilizing Data Visualization Do you simply want to collect data, or do you want to derive business insights from it? What if you could quickly and...
- 5 Reasons To Migrate From Cisco (ACE) to Riverbed Stingray ADC As you consider refreshing your legacy Cisco ACE application delivery infrastructure, consider migrating to the Riverbed® Stingray™ family of products and learn the...
- The Sky's the Limit for Eclipse Aerospace and VCE This case study highlights how Eclipse was able to unlock critical IP, support business growth, dial up or down resources without having to...
- Implementing Agile Systems Management in Cloud and Virtual Infrastructure The solution to the obstacle stopping enterprises from realizing the benefits of cloud computing- how to extend existing enterprise management applications to the...
- Maximize Efficiency in Your Virtual Environment with Converged Solutions Efficiency is the key to success in IT, especially in a virtual environment. But traditional infrastructure management and inflexible architectures can be costly...
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Virtualization White Papers | Webcasts