Phy-gital Roundtable: Breakfast Roundup from Germany and Netherlands

02 May '15 | Debjyoti Paul

German Shoppers: Meet Them in the Fast Lane to Phy-gital

15 January '15 | Ralf Reich

Shoppers Will Share Personal Information (But They Don’t Want to be “Friends”)

15 January '15 | Anil Venkat

Modernize or Perish: Property and Casualty Insurers and IT Solutions

14 January '15 | Manesh Rajendran

Benelux Reaches the Phy-gital Tipping Point: Omnichannel Readiness is Crucial

13 January '15 | Anil Gandharve

The New Omnichannel Dynamic: Finding Core Principles Across Industries

13 January '15 | Debjyoti Paul

Technology does not disrupt business – CIO day 2014 Roundup

02 December '14 | Anshuman Singh

Apple Pay – The Best Is Yet To Come

02 December '14 | Indy Sawhney

Digital transformation is a business transformation enabled by technology

01 December '14 | Amit Varma

3 Stages of FATCA Testing and Quality Assurance

06 October '14 | Raman Suprajarama

3 Reasons why Apple Pay could dominate the payments space

18 September '14 | Gaurav Johri

Beacon of Hope: Serving Growth and Customer Satisfaction

05 August '14 | Debjyoti Paul

The Dos and Don’ts of Emerging Technologies Like iBeacon

30 July '14 | Debjyoti Paul

What You Sold Us On – eCommerce Award Finalist Selections

17 July '14 | Anshuman Singh

3 Steps to Getting Started with Microsoft Azure Cloud Services

04 June '14 | Koushik Ramani

8 Steps to Building a Successful Self Service Portal

03 June '14 | Giridhar LV

Innovation outsourced – a myth or a mirage or a truth staring at us?

13 January '14 | Ramesh Hosahalli

What does a mobile user want?

03 January '14 | Gopikrishna Aravindan

VMUnify – Enabling VM Security

Posted on: 18 January '12

Today, many organizations face new security concerns because they are increasingly putting their most critical applications on Virtual Machines (VMs). One must be aware of this in order to protect against loss of sensitive data.

The VMUnify advantage:
Secure Multi-tenancy – One of the major security concerns today is the lack of isolation between tenants spread across heterogeneous hypervisors in public, private or hybrid cloud environments. Any unauthorized access or migrations between tenants in a multi-tenant data center can weaken the isolation boundaries.

VMUnify ensures complete isolation between any two tenants at all levels – Computing, Networking and Storage in a multi-tenant cloud environment.

Illegal copy or snapshot of VM – A virtual machine is encapsulated into one or more virtual disk files that reside on a virtual host server. Due to this, it is not very difficult for someone with the appropriate access to make a copy of these disk files and access any of the data on it.

Data Leakage

Data Leakage

Once copied, the data can be accessed either by launching the VM using the freely available virtual machine software, or by parsing or mounting the virtual disk file using freely available mount utilities or SDKs.

VMUnify associates each VM and its resources to the tenant it belongs to, and disables launching of VM or access to its data outside the tenant boundary.

Bringing Rogue VMs into the Organization – An external spurious virtual machine infected with viruses or spywares may be brought-in, migrated or copied into an organizational environment and made functional. This poses a major threat to the organization’s network and data security.

VMUnify automatically discovers any Rogue VMs entering the trusted environment and prevents it from booting-up in that environment.

VM Sprawl – Creating a new Virtualized server or desktop is so quick and easy that the number of virtual machines (VM) running in a virtualized infrastructure increases and many VMs are left unattended over a period of time. This can consume valuable storage space and cause Denial of Service (DoS) during genuine VM provisioning request or any P2V server migrations. This also leaves a big security concern when these unattended VMs are loaded or powered-on after a long time.

vmUnify controls VM Sprawl by attaching expiry to each VM on its creation and alerts the administrator on crossing the safe utilization levels within a private cloud environment.

I have shared my thoughts on how VMUnify enables VM security. More inputs on this are welcome.

Mindtree Blog Archives

Mindtree blog Archives are a collection of blogs by various authors who have independently contributed as thought leaders in the past. We may or may not be in a position to get the authors to respond to your comments.

  • Bhim

    I’ve been working with Terminal Server, Citrix and VMWare for quite some time but your articel gave me a new direction on VM security aspects. I’d like to know more about vmUnify product.


    • Bhim, thanks for showing interest in vmUnify. I am assuming that you have already visited We will reach out to you on your hotmail to arrange for a meeting.

      • Kosar

        Fantastic goods from you, man. I’ve understand your stuff puveiors to and you’re just extremely wonderful. I actually like what you’ve acquired here, really like what you are stating and the way in which you say it. You make it entertaining and you still take care of to keep it sensible. I can not wait to read much more from you. This is actually a terrific web site.

  • Bhim

    Hi Raghu,
    Thanks for the prompt response. I’m not part of IT, so not involved in IT decision making process. I visited and pretty impressed with the product. I appreciate the knowledge sharing.


  • Sami

    Very nice post. I just stumbled upon your blog and whiesd to say that I have truly enjoyed surfing around your blog posts. In any case I’ll be subscribing to your feed and I hope you write again soon!