ITO America Business Technology Publication
 
              
About ITO America
IT Optimization Solution Centers
CIO Resource Centers
BSM & ITILv3
BI
Customer Centric Enterprise and Customer Experience Management
Data Center Optimization
Data Center Security and Integrity
Enterprise Mobility
Green IT and Energy Efficient Data Centers
SaaS and Cloud Computing
Service Oriented Architecture and BPM
Unified Business Communications
Virtualization and Data Center Automation
WAN Application Delivery
CIO Thought Leadership and Contributions
 Podcasts
Videos
Webinars
Business Technology Analyst Partners and Media Partners
ITO America Testimonials and Previous Clients
ITO America Media Kit
ITO America Information Technology Optimization News
Contact ITO America staff
ITO America IT Industry Events
ROI Analysis

Business Technology Whitepapers and Articles
Business Technology Article
PDF Document Download

Document:

Security concerns cloud virtualization deployments



You must be a logged in to view this document.

Click here if you've lost or would like to change your password?
Register on ITO America Business Technology website

Register on ITOAmerica.com and gain access to countless articles, podcasts, videos and more, contributed by some of the top minds in business technology!


E-mail:
Password:
Verify Password:
Password must be 7-15 characters in length.
Articles in Business Technology
Excerpt:

Virtual servers are prone to the same attacks that plague servers, as well as to new threats that exploit weaknesses in hypervisor technology.

Server virtualization makes it possible to run multiple applications and operating systems on fewer hardware resources based on demand.
There are four top concerns about securing virtual environments:

  • Virtual-machine escapes could propagate security problems: IT managers worry that security attacks design to exploit a hypervisor could infect virtual machines that reside on the same physical host, in what is known as a 'virtual-machine escape'.
  • Virtual machines multiply patching burdens: The threat of virtual-server sprawl- a scenario in which the ease of deploying virtual machines results in more instances than planned- makes staying on top of patches and updates for operating systems critical in a virtual environment.
  • Running virtual machines in the DMZ: Many IT manager avoid putting virtual servers in the DMZ, and other IT managers won't run mission-critical application on virtual machines in the DMZ or even on those machines protected by corporate firewalls.
  • The newness of hypervisor technology could be an invitation to hackers: Industry watchers advice security managers to remain a bit skeptical about virtual operating systems and their potential to introduce more hold and vulnerabilities than they can patch manually.