Computer virtualization has been in use on mainframe computers since the IBM VM/370 platform 3 released in the early 1970s. VM technology became more widely available with the release of VMware Workstation in 1999, and the VMware Server line in 2001.4 It was estimated that 50% of workloads would be running inside virtualized environments by 2012 5
Whenever virtualization technology includes a hypervisor, then a virtual network can be created within the hypervisor layer to transparently network all the virtual machines operating under a single virtualized environment. This "virtual network" provides all the benefits and administrative responsibilities of a physical network, with the addition of some new challenges.6 The founders of Altor Networks became aware early on that adoption of virtualization technologies in data centers had been accelerating for many years 7 and several problems in virtual network security in particular became apparent:
It was decided that the way to address these challenges was to provide a solution that operated entirely within the virtualized environment as a purpose-built appliance to provide firewalling and other security services directly inside the virtual network without recourse to external hardware firewalls or intrusion detection appliances, or any associated VLAN rerouting out of the virtual network to the physical network and back again.
Altor released the Virtual Network Security Analyzer (VNSA) as a tool to monitor and analyze virtual network traffic in March 2008, followed by the Altor VF 1.0 (which included the VNSA as a module) in October 2008. Integrated signature-based network intrusion detection was incorporated into the Altor VF 3.0 release in September 2009. The release of Altor VF 4.0 now leverages virtual machine introspection to bring visibility to internal virtual machine states for compliance assessment and automated security enforcement.
Altor Networks offers a virtual security appliance for use within VMware ESX, with ongoing efforts to add support for Xen/Citrix and Microsoft HyperV/Viridian platforms.
Schwartz, Mathew (December 7, 2010). "Juniper Acquiring Altor Networks For $95 Million". Network Computing. Retrieved January 30, 2025.{{cite web}}: CS1 maint: url-status (link) https://www.networkcomputing.com/network-monitoring/juniper-acquiring-altor-networks-for-95-million ↩
"Juniper Networks announces acquisition of Alto Networks". Archived from the original on 2011-01-26. Retrieved 2010-12-07. http://www.juniper.net/us/en/company/press-center/press-releases/2010/pr_2010_12_06-09_00.html ↩
"Creasy, RJ, "The Origin of the VM/370 Time-sharing System" (PDF)" (PDF). Archived (PDF) from the original on 2016-05-07. Retrieved 2010-01-12. http://pages.cs.wisc.edu/~stjones/proj/vm_reading/ibmrd2505M.pdf ↩
"VMware Milestones". Archived from the original on 2013-05-13. Retrieved 2015-02-13. VMware company history https://web.archive.org/web/20130513034925/https://www.vmware.com/company/mediaresource/milestones.html ↩
"Perilli, Allesandro "50% of workloads will run inside virtual machines by 2012 says Gartner", Virtualization.info". Archived from the original on 2009-12-16. Retrieved 2010-01-12. http://www.virtualization.info/2009/10/50-of-workloads-will-run-inside-virtual.html ↩
""The Low Down on Virtualization Security" Tek-Tools Software, June 2009". 15 May 2009. Archived from the original on 2010-01-10. Retrieved 2010-01-12. http://www.darkreading.com/security/vulnerabilities/showArticle.jhtml?articleID=217500431 ↩
""Virtual Machine Software Market Grew 67 percent in 2005, Says IDC" CIO Weblog, October 2006". Archived from the original on 2011-07-16. Retrieved 2010-01-12. http://software.tekrati.com/research/News.asp?id=7917 ↩