sponsored by Trend Micro, Inc.
Posted:  14 Dec 2009
Published:  14 Dec 2009
Format:  PDF
Length:  19  Page(s)
Type:  eBook
Language:  English

The very concept of the datacenter and how to protect and secure the integrity of the infrastructure is being transformed. On the surface, virtualized datacenters appear to have all of the same vulnerabilities and security challenges as conventional datacenters. In a conventional datacenter, you can achieve a baseline of security by locking servers behind strong doors, protecting network access by a perimeter firewall and hardware-based intrusion detection and prevention systems.


With virtual machines, new challenges minimize the effectiveness of these protections. Virtual machines require more than perimeter security because of the dynamic way in which VMs can easily be moved, created and replicated among physical servers.


As virtual environments become more complex, it becomes more difficult to maintain security along with audit trails that enable compliance. Virtual management systems enable virtual machines to zoom across virtual networks, losing their security context and opening the possibility of VMs on the same server attacking each other.


Enterprises are further challenged by the need to develop and enforce coherent security policies for servers that run virtualized mission-critical applications within dynamic environments.


Read this eBook to learn more about securing today’s virtualized data centers.

Audit Trails | Data Centers | Data Security | Log Management | Security | Server Virtualization | Virtual Machine | Virtualization Security

View All Resources sponsored by Trend Micro, Inc.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement