How can I Overcome the Security Challenges of Today’s Virtualized Infrastructures?

How can I Overcome the Security Challenges of Today’s Virtualized Infrastructures?


While the benefits of virtualization are often touted, the challenges it creates for organizations don’t always get the same attention—especially when it comes to IT security. One reason for that is, over the past fifty years, security for strictly physical IT operations has become well established. Whether one is talking about identity management, application security, access and information control or user activity logging and reporting, the majority of physical servers out there are being protected effectively—and they have years of process evolution and best practices to thank for that.

Effective virtual server security, however, is not as ubiquitous—a fact which becomes apparent when one examines the fundamental differences between physical and virtual servers. Whereas organizations can stack servers away in a room and protect them from unwanted access with physical controls, unsecured virtual servers can be cut, copied and pasted from the virtualization host as easily as a file on a PC. And with the hypervisor serving as a single management point for all virtual machine (VM) images, a person with hypervisor access suddenly has control over many business-critical services—for better or worse.

Read this executive brief to learn how to improve control over systems, applications and information to reduce risk not only with physical servers, but also virtual server environments.

CA Technologies.
25 Nov 2010
01 Sep 2010
3 Page(s)
White Paper
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.