sponsored by CA Technologies.
Posted:  18 Jun 2010
Published:  18 Jun 2010
Format:  PDF
Length:  16  Page(s)
Type:  White Paper
Language:  English
ABSTRACT:

To reduce virtualization security risks, independent access enforcement and monitoring technology must be employed in conjunction with native security measures. Some of the vulnerabilities that were traditionally controlled by the presence of physical security must now be mitigated through the implementation of granular access controls and user activity reporting on the virtualization platform. A comprehensive solution for privileged access management is required in order to mitigate the risks associated with the new breed of security considerations and satisfy auditors. Internal or external service providers delivering Infrastructure-as-a-Service will need to provide premium visibility and control features to their customers if they want to support the organization with next-generation technologies. Read this paper to learn about virtualization security, the CA Technologies Access Control (AC) solution, and how to accelerate cloud computing.






BROWSE RELATED RESOURCES
Cloud Computing | Platform as a service | Security | Security Management | Security Policies | Software as a Service | Virtualization Security

View All Resources sponsored by CA Technologies.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement