Virtualization Security: Achieving Compliance for the Virtual Infrastructure

Virtualization Security: Achieving Compliance for the Virtual Infrastructure

Cover

In theory, 2009 should be the year that virtualization security (VirtSec) takes off: Server virtualization has been widely deployed. VirtSec products are ready. The VirtSec vendor list has doubled since 2008. There’s just one catch: Enterprises aren’t currently planning to deploy the technology. Only 10% of the organizations that participate in Nemertes' virtualization research have deployed VirtSec--and fully 70% have no plans to do so. Why not?

 

What’s top of mind for enterprise IT practitioners is compliance, yet most VirtSec vendors aren’t articulating the ways in which their products can help enterprises address compliance concerns. What’s not top of mind – and should be - is that virtualization makes the strong perimeter defense obsolete.

Read this paper to learn about:

  • The top trends in virtualization security
  • How virtualization poses unique challenges to compliance
  • Virtualization security vendors
  • And more!

Author

Ted Ritter Senior Research Analyst, Nemertes Research
Vendor:
Trend Micro
Posted:
17 Mar 2010
Published:
01 Dec 2009
Format:
PDF
Length:
18 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.