How can I Overcome the Security Challenges of Today’s Virtualized Infrastructures?

How can I Overcome the Security Challenges of Today’s Virtualized Infrastructures?

Cover

While the benefits of virtualization are often touted, the challenges it creates for organizations don’t always get the same attention—especially when it comes to IT security. One reason for that is, over the past fifty years, security for strictly physical IT operations has become well established. Whether one is talking about identity management, application security, access and information control or user activity logging and reporting, the majority of physical servers out there are being protected effectively—and they have years of process evolution and best practices to thank for that.

Effective virtual server security, however, is not as ubiquitous—a fact which becomes apparent when one examines the fundamental differences between physical and virtual servers. Whereas organizations can stack servers away in a room and protect them from unwanted access with physical controls, unsecured virtual servers can be cut, copied and pasted from the virtualization host as easily as a file on a PC. And with the hypervisor serving as a single management point for all virtual machine (VM) images, a person with hypervisor access suddenly has control over many business-critical services—for better or worse.

Read this executive brief to learn how to improve control over systems, applications and information to reduce risk not only with physical servers, but also virtual server environments.

Vendor:
CA Technologies.
Posted:
25 Nov 2010
Published
01 Sep 2010
Format:
PDF
Length:
3 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy