PRO+ Premium Content/Virtual Data Center

Thank you for joining!
Access your Pro+ Content below.
February 2011, Vol. 31

Virtual security: New attack vectors, new ballgame

When it comes to securing virtual environments, you have to take different measures from those for traditional physical security. With virtual security, new attack vectors --that is, the means by which a hacker gains control of a server OS -- must be protected to prevent breaches. Because of these vectors -- and thus risks -- virtual security requires you to secure the host and each virtual machine (VM). In this tip, we cover the kinds of attacks you should be concerned about as you develop a virtualization security strategy as well as considerations and best practices for the various components of your infrastructure. More on virtual machine security Virtual machine security Virtual security: developing a plan and procedures Server virtualization security best practices guide Virtual machine monitoring and security guide Physical security There are many physical attack vectors, from physical consoles to a guest OS to the applications that run on an OS. To secure a physical system, you must have a locked data center that ...

Access this PRO+ Content for Free!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

Safe Harbor

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue