Advanced Virtualization E-book - Chapter 5: Avoid Security Holes in the Virtual Data Center by SearchServerVirtualizationWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Research Abstract
Advanced Virtualization E-book - Chapter 5: Avoid Security Holes in the Virtual Data Center
by SearchServerVirtualization

> View this now

Published on: April 29, 2010
Type of content: EBOOK
Format: Unknown
Length: 11 pages
Price: FREE

Overview:

Virtual infrastructures vary greatly from traditional physical infrastructures, and so must your security measures. The key to creating a solid layer of protection for virtual servers and the VMs that run on them is to divide the infrastructure into two clearly separate components: the resource pool and virtual service offerings. Doing so can help reduce the overall attack surface. 


In Chapter 5 of the Advanced Virtualization e-book, security experts Danielle Ruest and Nelson Ruest explain how to identify, map out and prevent some of the most common resource pool threats. The authors also debunk five common security misconceptions of server virtualization.

> View Company Report
> View all content by this company
> Return to Search Results


         
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts