Managing Access in a Virtualized Environment

Managing Access in a Virtualized Environment

To reduce virtualization security risks, an independent access enforcement technology must be employed in conjunction with system security measures. Some of the vulnerabilities that were traditionally controlled by the presence of physical security must now be mitigated through the implementation of granular access controls on the virtualization platform.

This white paper discusses:

  • An effective approach that ensures that only authorized users perform authorized operations on the hosting system
  • Effective strategies that reduce the risk due to over-privileged accounts or external intrusions which may compromise the gateway to guest images
  • How machine-to-machine protection through virtual isolation should be supplemented by access enforcement amongst them
  • And much more

To learn more, download this paper now.
CA Technologies.
27 Dec 2006
01 Oct 2006
6 Page(s)
White Paper
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.