Email Alerts
-
Secure virtualization: Beyond traditional VM security
The same old IT security methods aren't enough to create a secure virtual environment. To achieve secure virtualization, you must go above and beyond. FAQ
-
Server virtualization security best practices guide
This virtual machine security guide outlines server virtualization security best practices and weighs the pros and cons of different virtual server security methods. Resource Guide
-
Guarding against virtualization security risks and vulnerabilities
You can limit virtualization security risks and vulnerabilities by understanding attack vectors. This section of our virtualization security guide helps you prevent attacks. Resource Guide
-
Virtual security: Developing a plan and procedures
This section of our virtual security guide covers how to design and execute a plan to protect your server virtualization infrastructure's sensitive information. Resource Guide
-
VMware security best practices guide
Without the proper VMware security, your entire IT infrastructure could be at risk. VMware security best practices can keep your environment safe. Resource Guide
-
Virtual networking design, configuration and management guide
This guide on virtual networking architecture and management explores how to design physical and virtual networks to reduce latency and manage virtual networks efficiently. Guide
-
Virtualization implementations and optimization guide
This guide to virtualization implementations covers security strategies, storage infrastructures, hypervisor choice, virtualization optimization and more. Learning Guide
-
Advanced Virtualization e-book
Advanced Virtualization gives IT professionals the tools needed to examine existing virtualization deployments to ensure that their environments thoroughly meet disaster recovery, availability, storage and security requirements. This e-book also outl... E-Book
-
Cloud computing business model raises security, maturity concerns
Businesses are taking a cautious approach to adopting the cloud computing model, according to members of our Server Virtualization Advisory Board. Advisory Board
-
Virtualization security how-tos, best practices and tips
With new technology comes new security concerns. Alessandro Perili, founder of virtualization.info, brings you the latest news about security and virtualization. Special Report
- See More: Essential Knowledge on Server virtualization risks and monitoring
-
PacketMotion purchase no slam dunk for VMware
VMware has its work cut out for it integrating PacketMotion's hardware-based security appliances. Some virtualization pros say user access management isn’t on their radar yet. News | 12 Sep 2011
-
Virtualization pros grapple with PCI DSS 2.0
PCI DSS 2.0 officially acknowledges server virtualization, but PCI compliance in virtual environments is still more art than science. Article | 09 Nov 2010
-
VMware and partners release PCI guidance: Virtualization news in brief
Virtualization product vendors offer guidance for PCI-compliant virtual data centers. These briefs also include news on CA's acquisition of Hyperformix and Zimbra's certification program. Article | 08 Nov 2010
-
VMware 'vFabric' revealed as vShield enhancements
A cryptic VMworld preview video sent industry-watchers' imaginations running wild about a new 'vFabric' offering. But it was much ado about two already previewed products: vShield Edge and App. Article | 19 Aug 2010
-
VMware password management on the brain
A spate of new VMware password management products suggests that enterprises are grappling with security in virtualized environments. Article | 31 Mar 2010
-
Microsoft Hyper-V gets first security update: News in brief
Microsoft Hyper-V users could suffer a denial-of-service attack and should apply a security update; and other news in brief. Article | 11 Feb 2010
-
VMware shops weigh ESX vs. ESXi
Migrating from ESX to ESXi can be a hassle, but forward-looking users say there are clear management benefits from using the slimmed-down hypervisor. Article | 01 Feb 2010
-
How to steal a virtual machine and its data in 3 easy steps
Stealing a virtual machine and its data is pretty easy. If you know how it's done, you can figure out how to prevent it and avoid some potentially costly administrative missteps. Article | 07 Jan 2010
-
RSA posts security dos and don'ts: News in brief
A new RSA report offers best practices to ensure security compliance in a virtual world. Article | 03 Sep 2009
-
Vizioncore bundles virtualization security, management; news in brief
All six of Vizioncore's virtualization security and management offerings are now available in a new suite called vEssentials Complete. Article | 31 Aug 2009
- See More: News on Server virtualization risks and monitoring
-
CloudPhysics' resource management tool studies virtual infrastructures
A new service from startup CloudPhysics may have admins rethinking resource management. Would you send data to the cloud for analysis and comparison? Tip
-
How promiscuous mode affects virtual network security
Enabling promiscuous mode could spell doom for your virtual network security, especially if inexperienced IT pros are at the helm. So take caution. Tip
-
How to recognize and prevent a hypervisor attack to protect data
A hypervisor attack can hand hackers the keys to your virtual kingdom. But, with the proper precautions and tools, you can minimize the risk. Tip
-
Virtualization and hypervisor security vulnerabilities to look out for
Virtualization and hypervisor security vulnerabilities are a real threat to organizations, and physical security tools may not help your efforts. Tip
-
How virtual security appliances and tools protect a data center
Virtual security appliances and tools keep the bad guys out. But vendors approach virtual security differently and not every tool may suit your needs. Tip
-
Beating cloud security pessimists: The case for VM security
There are lots of people out there who say the cloud has poor VM security, but a few simple points about cloud security can beat their misguided arguments. Tip
-
Preventing under-the-radar attacks with virtual network security
Virtual network security remains a problem for many admins, often because they’re not using the right tools. Virtual networks require VM protection from the inside. Tip
-
Why physical performance monitoring tools aren't enough
Physical-world performance monitoring tools won't cut it in virtual infrastructures. They can overlook critical performance metrics for virtual machine monitoring. Tip
-
Virtual security: New attack vectors, new ballgame
With physical security, you don't have to consider breaches of virtual machines, utilities or virtual disk files. But virtualization creates new security risks and vulnerabilities. Tip
-
Virtual network security best practices
Since a network itself can become an attack vector, you need network security best practices to prevent a breach. Isolating vSwitches on your management network and using security apps intended for virtualization are two key tactics. Tip
- See More: Tips on Server virtualization risks and monitoring
-
Consolidation security issues
When consolidating your data center security issues are bound to pop up. Site expert Andrew Kutz addresses this issue in this expert response. Ask the Expert
-
Virtual machines in 10 years
A reader needs to save a virtual machine for 10 years. Read what advice Anil Desai gives. Ask the Expert
-
VM stall
VM stall is the point where it becomes just as cost-effective to deploy a physical server as it is to deploy a virtual server. Definition
-
Top five scenarios to avoid for a successful virtualization deployment
For all the benefits a virtualization deployment brings, it can bring just as much grief. Avoid these five scenarios to ensure success. Photo Story
-
Debating VMware security: Cloud, vShield and more
The long-term VMware security vision includes self-securing apps for cloud computing and an expanded vShield role. Two experts debate the merits of these VMware security plans. Podcast
-
VMware discount program offers volume deals
VMware says its new Volume Purchasing Program is like a frequent flier program for virtualization. The VMware discount program offers customers between 4% and 12% off. Podcast
-
VMware, Hyper-V together more in virtualized infrastructure
More IT shops are combining VMware, Hyper-V and other platforms in their virtualized infrastructure. Expert Greg Shields calls in to discuss the pros and cons of this approach. Podcast
-
Citrix XenServer 5.5 beta available for download
This Week in Virtualization: Citrix Systems releases the XenServer 5.5 beta in advance of next week's Synergy conference, and VMware users clamor for vSphere 4. Podcast
-
VMworld 2008 awards announced
At VMworld, SearchServervirtualization.com announces its Best ofVMworld 2008 awards spanning eight categories on the show floor. Video
-
CloudPhysics' resource management tool studies virtual infrastructures
A new service from startup CloudPhysics may have admins rethinking resource management. Would you send data to the cloud for analysis and comparison? Tip
-
Top five scenarios to avoid for a successful virtualization deployment
For all the benefits a virtualization deployment brings, it can bring just as much grief. Avoid these five scenarios to ensure success. Photo Story
-
How promiscuous mode affects virtual network security
Enabling promiscuous mode could spell doom for your virtual network security, especially if inexperienced IT pros are at the helm. So take caution. Tip
-
How to recognize and prevent a hypervisor attack to protect data
A hypervisor attack can hand hackers the keys to your virtual kingdom. But, with the proper precautions and tools, you can minimize the risk. Tip
-
Virtualization and hypervisor security vulnerabilities to look out for
Virtualization and hypervisor security vulnerabilities are a real threat to organizations, and physical security tools may not help your efforts. Tip
-
How virtual security appliances and tools protect a data center
Virtual security appliances and tools keep the bad guys out. But vendors approach virtual security differently and not every tool may suit your needs. Tip
-
Beating cloud security pessimists: The case for VM security
There are lots of people out there who say the cloud has poor VM security, but a few simple points about cloud security can beat their misguided arguments. Tip
-
PacketMotion purchase no slam dunk for VMware
VMware has its work cut out for it integrating PacketMotion's hardware-based security appliances. Some virtualization pros say user access management isn’t on their radar yet. News
-
VM stall
VM stall is the point where it becomes just as cost-effective to deploy a physical server as it is to deploy a virtual server. Definition
-
Preventing under-the-radar attacks with virtual network security
Virtual network security remains a problem for many admins, often because they’re not using the right tools. Virtual networks require VM protection from the inside. Tip
- See More: All on Server virtualization risks and monitoring
About Server virtualization risks and monitoring
Virtualization security threats are real, and a security breach of a physical server can take down all the virtual machines allocated to that server as well. Security threats are also varied; there are threats to operating systems, virtualization hypervisors, networks,and more. In this section, learn about virtualization security risks, how to track and monitor VMs for breaches, using firewalls with VMs, how to set access control and other best practices and policies to prevent security breaches, learn about using isolated security zoning for VMs, get news on the latest bugs and patches available for the various virtualization platforms, and get comparisons and research on the top virtualization security tools to protect virtualized servers from security threats.