Premium Content

Access "Virtualization security: How vulnerable is your hypervisor?"

Published: 13 Oct 2012

This article is part of the null issue of null

IT security is facing a bit of a paradox. On one hand, the sheer number of security-related regulations that network administrators must comply with is unprecedented. On the other hand, the industry is only just beginning to understand the security implications associated with virtualization. So what should virtual data centers do to address virtualization security? More on virtualization security Virtual security: New attack vectors, new ballgame Hypervisors: Which is right for you? Top 4 virtualization security gotchas Server virtualization security best practices guide NIST issues virtualization security guidelines Guarding against virtualization security risks and vulnerabilities Before delving into virtualization security, let’s start out by taking a look at the hypervisor, which is used by virtualization platforms such as VMware ESX and Microsoft’s Hyper-V. There are a lot of myths surrounding the ability to exploit the hypervisor. One virtualization security myth is that it is possible for an attacker to compromise the hypervisor and then take control... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy