sponsored by ComputerWeekly.com
Posted:  20 Feb 2013
Published:  20 Feb 2013
Format:  PDF
Length:  4  Page(s)
Type:  Book
Language:  English


Hardening the hypervisor should really be viewed as a standard practice, much as it should be for enterprise servers of any importance.


There are an incredible number of configuration options for the major platforms (ESXi, Hyper-V, and XenServer).


This extract identifies the most fundamental principles, getting you to a sound security state that conforms to industry best practices.


This is an extract from the book:

Virtualization Security: Protecting Virtualized Environments

By Dave Shackleford

Published by Wiley



30% Discount for Computer Weekly Members



Click on the button below to download this extract and to obtain an exclusive discount code.


Audit Trails | Business Continuity Planning | Citrix XenServer | Disaster Recovery | Disaster Recovery Planning for Virtual Environments | Firewall Appliances | Log Management | Microsoft Hyper-V | NTP | Patch Management | Security Best Practices | Security Policies | SNMP | Virtual Machine | Virtual Machine Monitor | Virtualization Security | VMware | Windows Server 2008 R2 | Windows Server Software

View All Resources sponsored by ComputerWeekly.com

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement