In April 2004 I wrote my first article on the topic of virtualization security. I was trying to bring attention to the security aspects of this “new” technology that was getting quite a bit of hype at ...
Virtualization can be both a blessing and a curse, serving up improved security while at the same time hiding dangers Almost any IT department worth its salt is deploying virtualization technology ...
We’ve already discussed the relative lack of tools to secure virtualized servers and infrastructures, the problems inherent in adding bolt-on tools, risks in connecting a VM to the wrong part of a ...
Virtualization technology, which allows multiple operating systems to run different applications on a single computer, has caught the attention of IT managers for its promise to let them better manage ...
There are plenty of virtualization security vendors leaping out of the shadows. Here are five new players worth a look.Altor Networks. This company's Virtual Network Security Analyzer and Virtual ...
Virtualization is proving its ability to reduce costs, but a new set of security threats is emerging as IT managers struggle to adjust to new ways of managing risk. Government IT upgrade projects may ...
One of the main reasons for deploying desktop virtualization is the security advantages it can provide, such as keeping sensitive data off the endpoint, according to Citrix. And Citrix is practicing ...
eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. BY: Arnaud Dimberton CANNES, France-Juan de Zulueta, vice ...
While adoption of server virtualization is proceeding at a gallop, the effort to refine virtualization security reached only a slow trot in 2009. Virtualization security: So far nothing Sign up here.
Survey reveals one-third of enterprise security managers believe the technologies make security 'harder,' while one-third say it was 'easier' Is moving to virtualization and cloud computing making ...
Defining a set of security and compliance policies is a key first step. But enforcing security policy is not as easy. Defining a set of security and compliance policies is a key step. Having a ...
In April 2004 I wrote my first article on the topic of virtualization security. I was trying to bring attention to the security aspects of this “new” technology that was getting quite a bit of hype at ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results