In April 2004 I wrote my first article on the topic of virtualization security. I was trying to bring attention to the security aspects of this “new” technology that was getting quite a bit of hype at ...
Virtualization can be both a blessing and a curse, serving up improved security while at the same time hiding dangers Almost any IT department worth its salt is deploying virtualization technology ...
We’ve already discussed the relative lack of tools to secure virtualized servers and infrastructures, the problems inherent in adding bolt-on tools, risks in connecting a VM to the wrong part of a ...
Virtualization technology, which allows multiple operating systems to run different applications on a single computer, has caught the attention of IT managers for its promise to let them better manage ...
Virtualization is proving its ability to reduce costs, but a new set of security threats is emerging as IT managers struggle to adjust to new ways of managing risk. Government IT upgrade projects may ...
One of the main reasons for deploying desktop virtualization is the security advantages it can provide, such as keeping sensitive data off the endpoint, according to Citrix. And Citrix is practicing ...
There are plenty of virtualization security vendors leaping out of the shadows. Here are five new players worth a look.Altor Networks. This company's Virtual Network Security Analyzer and Virtual ...
eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. BY: Arnaud Dimberton CANNES, France-Juan de Zulueta, vice ...
While adoption of server virtualization is proceeding at a gallop, the effort to refine virtualization security reached only a slow trot in 2009. Virtualization security: So far nothing Sign up here.
Defining a set of security and compliance policies is a key first step. But enforcing security policy is not as easy. Defining a set of security and compliance policies is a key step. Having a ...
But as the rush to virtualize continues to push the technology mainstream, solution providers need to be sure they're taking the same approach that they would with any emerging technology: identifying ...
In April 2004 I wrote my first article on the topic of virtualization security. I was trying to bring attention to the security aspects of this “new” technology that was getting quite a bit of hype at ...