Securing Virtualised Environments and Accelerating Cloud Computing

Securing Virtualised Environments and Accelerating Cloud Computing


To reduce virtualisation security risks, independent access enforcement and monitoring technology must be employed in conjunction with native security measures. Some of the vulnerabilities that were traditionally controlled by the presence of physical security must now be mitigated through the implementation of granular access controls and user activity reporting on the virtualisation platform. A comprehensive solution for privileged access management is required in order to mitigate the risks associated with the new breed of security considerations and satisfy auditors. Internal or external service providers delivering Infrastructure-as-a-Service will need to provide premium visibility and control features to their customers if they want to support the organisation with next-generation technologies.

In this paper you'll learn about:

  • Managing access in a virtualised environment
  • Virtualisation security risks
  • Cloud computing
  • Protecting the virtual environment
  • Enabling Infrastructure-as-a-Service
  • And more
CA Technologies
01 Jun 2010
01 May 2010
16 Page(s)
White Paper
Already a Bitpipe member? Login here

Download this White Paper!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy