Email Alerts
-
Managing virtualization patches
Keeping all of your patches up-to-date is a tedious but necessary task in order to ensure a fully protected data center. This dedicated e-zine highlights tips and strategies for making patch management easier and less time-consuming. E-Zine
-
Secure virtualization: Beyond traditional VM security
The same old IT security methods aren't enough to create a secure virtual environment. To achieve secure virtualization, you must go above and beyond. FAQ
-
Best of VMworld 2010 Awards: Security and virtualization
The Best of VMworld 2010 Awards recognized the best security and virtualization products at VMworld 2010. Slideshow
-
Server virtualization security best practices guide
This virtual machine security guide outlines server virtualization security best practices and weighs the pros and cons of different virtual server security methods. Resource Guide
-
Guarding against virtualization security risks and vulnerabilities
You can limit virtualization security risks and vulnerabilities by understanding attack vectors. This section of our virtualization security guide helps you prevent attacks. Resource Guide
-
Virtual security: Developing a plan and procedures
This section of our virtual security guide covers how to design and execute a plan to protect your server virtualization infrastructure's sensitive information. Resource Guide
-
Hyper-V virtualization security guidelines and tips
Data centers can't depend solely on Microsoft for Hyper-V security. You can implement several configurations and procedures to secure Hyper-V virtualization. Resource Guide
-
VMware security: Protecting a VMware environment
There are several ways to improve VMware security to protect a VMware environment from hackers and exploits. In this section, we show you how. Resource Guide
-
Virtual networking design, configuration and management guide
This guide on virtual networking architecture and management explores how to design physical and virtual networks to reduce latency and manage virtual networks efficiently. Guide
-
Virtual environments are different from physical environments
The greater automation provided by virtualization has to be set against additional challenges like density and complexity. Learn how to contend with these hurdles in this sample chapter from "The Shortcut Guide to Selecting the Right Virtualization S... Best Practices Guide
-
VMware vs. Microsoft: Ferocious pricing war from the user perspective
This week, users chimed in on the VMware vs. Microsoft pricing and licensing war and critics questioned VMware’s Hadoop-on-vSphere strategy. Feature | 22 Jun 2012
-
Shionogi breach spotlights virtualization security
A disgruntled ex-employee admitted to deleting VMs at the pharmaceutical company, highlighting the need for proper enforcement of access-control policies in virtual environments. News | 19 Aug 2011
-
Virtualization security helps state agency recover from breach
After a security breach in 2008, New Mexico’s Human Services Department turned to tools from Juniper and HyTrust to harden its virtual server environment. News | 20 Jul 2011
-
Mind the air gap: Can security and consolidation coexist?
Segmenting data on separate physical servers isn’t the only way to ensure security these days. In many cases, virtualization does just as good a job. COLUMN | 20 May 2011
-
PacketMotion claims alternative to virtual firewalls
PacketMotion's new virtual appliance can detect events and anomalies at the transaction level and stop rogue transactions as they happen, the vendor says. News | 02 May 2011
-
VMware users eye changes to Update Manager
No one’s heartbroken that VMware Update Manager won’t patch guest OSes after vSphere 4.1, but some users have suggestions for the product’s continued development. News | 21 Apr 2011
-
VMware vShield Manager design raises availability concerns
One of the major technical kinks that has yet to be worked out in VMware’s vShield virtualization security product line is what happens when the vShield Manager appliance fails. News | 10 Feb 2011
-
VMware pushes vShield, virtualization security vision
VMware says its vShield virtualization security products will pave the way toward cloud computing, but users said concerns such as licensing costs to ecosystem support are holding them back. News | 24 Jan 2011
-
Q&A;: Citrix's Crosby on XenServer and the cloudy future
XenServer is for more than XenDesktop, cloud computing is more than glorified server virtualization and security concerns about the cloud are overstated, according to Citrix CTO Simon Crosby. Article | 20 Dec 2010
-
Virtualization pros grapple with PCI DSS 2.0
PCI DSS 2.0 officially acknowledges server virtualization, but PCI compliance in virtual environments is still more art than science. Article | 09 Nov 2010
- See More: News on Virtualization security and patch management
-
How to recognize and prevent a hypervisor attack to protect data
A hypervisor attack can hand hackers the keys to your virtual kingdom. But, with the proper precautions and tools, you can minimize the risk. Tip
-
Virtualization and hypervisor security vulnerabilities to look out for
Virtualization and hypervisor security vulnerabilities are a real threat to organizations, and physical security tools may not help your efforts. Tip
-
DMZ setup: Ditching virtual machines for Platform as a Service
Using Platform as a Service to host DMZ workloads brings cloud computing benefits to your DMZ setup. It’s easier to scale and less complex to build. Tip
-
How DMZ design improves VM security in the cloud
With VM hosting in the cloud, your main concern is VM security. But with a solid DMZ design, you can keep VMs properly isolated. Tip
-
DMZ design: Bringing virtualization and security admins together
DMZ design is often a source of conflict between IT admins and security pros. With virtualization, it’s possible to consolidate trust zones in your DMZ setup. Tip
-
Preventing under-the-radar attacks with virtual network security
Virtual network security remains a problem for many admins, often because they’re not using the right tools. Virtual networks require VM protection from the inside. Tip
-
Virtualization security: How vulnerable is your hypervisor?
Choosing the right hypervisor for your infrastructure is not only critical for deployment and management purposes, but it also comes into play with virtualization security. Tip
-
Top 3 virtualization challenges: DR, backup and security
Virtual disaster recovery, virtualization security and VM backup are three main virtualization challenges, but don’t let them impede your virtualization project. Tip
-
Virtualization challenges: Security, storage and VM sprawl
The deeper you get into a virtualization project, the more challenges you face. Virtualization security and backup management are some of the most common. Tip
-
Virtual security: New attack vectors, new ballgame
With physical security, you don't have to consider breaches of virtual machines, utilities or virtual disk files. But virtualization creates new security risks and vulnerabilities. Tip
- See More: Tips on Virtualization security and patch management
-
What are your biggest virtualization challenges?
Virtualization challenges are inherent to any deployment. If licensing, capacity planning and vendor bashing really grinds your gears, you’re not alone. Answer
-
What’s your most terrifying virtualization management story?
We asked our advisory board to share their most terrifying virtualization management tales. Their stories may scare you … into another career. Answer
-
Consolidation security issues
When consolidating your data center security issues are bound to pop up. Site expert Andrew Kutz addresses this issue in this expert response. Ask the Expert
-
VMware source code leak: The implications
While the extent of the VMware source code is still in question, that hasn’t stopped IT shops from wondering about the potential fallout. Podcast
-
Citrix XenServer 5.5 beta available for download
This Week in Virtualization: Citrix Systems releases the XenServer 5.5 beta in advance of next week's Synergy conference, and VMware users clamor for vSphere 4. Podcast
-
Cloud computing: All the rage, but what about the mechanics?
Lost in the flurry of discussion about cloud computing at VMworld 2008 and elsewhere is how exactly it will work. Scott Lowe, senior engineer for ePlus Technology, Inc., breaks down some of the mechanics of the cloud. Video
-
What are your biggest virtualization challenges?
Virtualization challenges are inherent to any deployment. If licensing, capacity planning and vendor bashing really grinds your gears, you’re not alone. Answer
-
VMware vs. Microsoft: Ferocious pricing war from the user perspective
This week, users chimed in on the VMware vs. Microsoft pricing and licensing war and critics questioned VMware’s Hadoop-on-vSphere strategy. Feature
-
Managing virtualization patches
Keeping all of your patches up-to-date is a tedious but necessary task in order to ensure a fully protected data center. This dedicated e-zine highlights tips and strategies for making patch management easier and less time-consuming. E-Zine
-
VMware source code leak: The implications
While the extent of the VMware source code is still in question, that hasn’t stopped IT shops from wondering about the potential fallout. Podcast
-
How to recognize and prevent a hypervisor attack to protect data
A hypervisor attack can hand hackers the keys to your virtual kingdom. But, with the proper precautions and tools, you can minimize the risk. Tip
-
Virtualization and hypervisor security vulnerabilities to look out for
Virtualization and hypervisor security vulnerabilities are a real threat to organizations, and physical security tools may not help your efforts. Tip
-
What’s your most terrifying virtualization management story?
We asked our advisory board to share their most terrifying virtualization management tales. Their stories may scare you … into another career. Answer
-
Shionogi breach spotlights virtualization security
A disgruntled ex-employee admitted to deleting VMs at the pharmaceutical company, highlighting the need for proper enforcement of access-control policies in virtual environments. News
-
DMZ setup: Ditching virtual machines for Platform as a Service
Using Platform as a Service to host DMZ workloads brings cloud computing benefits to your DMZ setup. It’s easier to scale and less complex to build. Tip
-
Virtualization security helps state agency recover from breach
After a security breach in 2008, New Mexico’s Human Services Department turned to tools from Juniper and HyTrust to harden its virtual server environment. News
- See More: All on Virtualization security and patch management
About Virtualization security and patch management
• For virtualization administrators, securing virtual machines (VMs) presents a host of challenges, including how to use patch management tools with virtual machines, how to centralize and minimize patch management tasks, tracking highly mobile and dynamic VMs to secure virtual servers against malware, viruses and other security threats; using automated security tools for virtual machines understanding the differences between securing physical and virtual machines; identifying security threats and other risks that affect virtual machines via a network; and learn about best practices such as keeping a host OS patched and hardened, establishing policies, standards and procedures, and watching out for useful third-party products to ease patch management burdens.