By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
How to steal a virtual machine and its data in three easy steps
Because a virtual machine (VM) is reduced to a single file, it offers administrators ample flexibility. The tradeoff, however, is that VMs are easy to steal. This tip outlines how to swipe a VM so that you can guard against virtual theft.
Consolidation security issues
Before embarking on a server consolidation project, you need to prepare accordingly. Having several VMs share the same network interface card, for example, leaves your virtual environment susceptible to spamming attacks. This short expert Q&A provides a few server consolidation security risks of which you should be aware.
Protecting storage networks from virtual machine security risks
Virtualization security vulnerabilities extend beyond VMs. When attached to virtualization hosts, storage networks can be attack vectors for hackers. This tip outlines storage configurations that can leave your infrastructure vulnerable and why you should keep your hypervisor and VM storage separated.
Top 10 ways virtualization threatens security
You might be surprised by how many common IT practices and misconceptions leave a virtual environment unsecure. Do you have a service console in a demilitarized zone, or DMZ? Do you have absolute faith in Secure Sockets Layer protection? These are just two of several, common practices that leave data centers susceptible to virtualization security risks.
Four things to remember about server virtualization security concerns
Virtualization shouldn't change core security principles, but it may alter specific procedures. When you turn a hardware switch with 50 cables into a virtual switch that connects multiple virtualization hosts, for example, intrusion protection policies should be modified. This tip covers similar server virtualization security concerns that arise when implementing a new virtual environment.