Alternatives for Securing Virtual Environments: A Different Network Requires a Different Approach -- Extending Security to the Virtual World

Alternatives for Securing Virtual Environments: A Different Network Requires a Different Approach -- Extending Security to the Virtual World

Cover

In an effort to reduce risk, many companies frequently apply physical security tactics to protect their virtual environments. This white paper explains how this strategy contributes to added costs and complexity while still leaving a security gap when more than one VM is present.

Explore the pros and cons of VMware live migration technologies and learn about a tool that can strengthen security by enabling you to:

  • Define and centrally manage firewall rules
  • Conduct virtualization hardware maintenance with little or no application downtime
  • Detect attacks that occur exclusively within the virtual network
  • And more
Vendor:
Juniper Networks, Inc.
Posted:
08 Jun 2012
Published:
01 Mar 2012
Format:
PDF
Length:
6 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor