TITLE

5 VIRTUALIZATION SECURITY DO's & DON'Ts

AUTHOR(S)
Ptacek, Thomas
PUB. DATE
June 2008
SOURCE
Information Security;Jun2008, Vol. 11 Issue 5, p18
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article presents tips for avoiding virtualization pitfalls. Do not let the enterprise silo vitalization security. Do practice segmentation on the physical virtual machine servers. Do not ignore the risks of virtual machine migration. Do consider virtualization security systems carefully and critically. Lastly be vigilant for any virtualized malware.
ACCESSION #
32700089

 

Related Articles

  • VIRTUELNA MAÅ INSKA INTROSPEKCIJA U DIGITALNOJ FORENZICI. Grubor, Gojko; Njeguš, Angelina // Singidunum Scientific Review / Singidunum Revija;2010, Vol. 7 Issue 2, p79 

    The server and client side virtualization increase evry day. Some features of virtuelization have unreturned consequences for information security. It is necessary to undarstand all treats to phisical systems and some new types of risk, unique to virtual systems only. Virtual machine...

  • Virtualize every server for better data protection. BUFFINGTON, JASON // Storage Magazine;Feb2014, Vol. 12 Issue 2, p38 

    The article offers information on the need of virtualized servers focused on data protection in Information Technology (IT). It focuses on the need for Operating System (OS/) application to interact with hardware including Universal Serial Bus (USB), tape drive and virtualized resources....

  • VMware opens door for next-gen backup apps. Whitehouse, Lauren // Storage Magazine;Sep2007 Special Issue, Vol. 6 Issue 8, p42 

    The article discusses topics related to server virtualization and backup and recovery solutions for the technology. Server virtualization has increased the amount of data normally stored on a server. However, because virtual machines share physical resources, backup processing consumes a large...

  • BURNING QUWSTIONS: Virtualization. Brodkin, Jon // Network World;10/25/2010, Vol. 27 Issue 20, p14 

    The article presents questions and answers related to information technology (IT) including how can IT shops reduce server virtualization's impact on storage, how to prevent virtual machine (VM) sprawl, and how to mitigate security risks in virtualized systems.

  • Enabling Dynamic Virtual Client Computing with Intel vPro Technology. James, Thomas; Kennedy, Jason; Kremesec, Steve; Vicente, John // Intel Technology Journal;Dec2008, Vol. 12 Issue 4, p313 

    In this paper we discuss an emerging direction for Intel® vPro™ technology called Dynamic Virtual Client (DVC) computing. DVC addresses the needs of IT organizations and end-users by enabling client computing diversity across alternative computing models. DVC is a client virtualization...

  • Are You Turning to Virtualization to Cut IT Expenses? JAMES, JEFF // Windows IT Pro;May2009, Vol. 15 Issue 5, p3 

    The article discusses the cost-effectiveness of virtualization. The author notes that thin-client computing is likely to become more cost-effective with virtualization. For instance, information technology administrators can use VMware View to centralize server operation, allowing users to...

  • SHAREPOINT & OFFICE Pro. Sugano, Alan // Windows IT Pro;Jun2007, Vol. 13 Issue 6, p69 

    The article describes the advantages of virtualizing Microsoft Office SharePoint Server 2007 servers using Microsoft Virtual Server 2005 or VMware ESX Server. These include increased security, no loss of fault tolerance, easier bare-metal restores, faster setup time and reduced costs. The author...

  • Security concerns cloud virtualization deployments. Dubie, Denise // NetworkWorld Asia;Jan/Feb2008, Vol. 4 Issue 1, p23 

    The article addresses several concerns about securing virtual server environments in the computer industry in the U.S. These include the possibility of virtual-machine escapes to propagate problems, the potential of virtual machines to create patching burdens, and the tendency of new hypervisor...

  • Zone Transfer.  // Network Dictionary;2007, p541 

    A definition of the computer security term "zone transfer" is presented. It is the process a Domain Name System (DNS) server performs a complete dump of the database for a domain and sends the information from the primary DNS server to the secondary DNS servers.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics