sponsored by CA Technologies.
Posted:  27 Dec 2006
Published:  01 Oct 2006
Format:  PDF
Length:  6  Page(s)
Type:  White Paper
Language:  English
ABSTRACT:
To reduce virtualization security risks, an independent access enforcement technology must be employed in conjunction with system security measures. Some of the vulnerabilities that were traditionally controlled by the presence of physical security must now be mitigated through the implementation of granular access controls on the virtualization platform.

This white paper discusses:

  • An effective approach that ensures that only authorized users perform authorized operations on the hosting system
  • Effective strategies that reduce the risk due to over-privileged accounts or external intrusions which may compromise the gateway to guest images
  • How machine-to-machine protection through virtual isolation should be supplemented by access enforcement amongst them
  • And much more

To learn more, download this paper now.





BROWSE RELATED RESOURCES
Access Control | Access Control Software | Application Security | Authentication | Network Security | Risk Assessment | Risk Management | Security Infrastructure | Server Virtualization | Server Virtualization Software

View All Resources sponsored by CA Technologies.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement