New & Notable
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Server virtualization risks and monitoring News
September 12, 2011
VMware has its work cut out for it integrating PacketMotion's hardware-based security appliances. Some virtualization pros say user access management isn’t on their radar yet.
November 09, 2010
PCI DSS 2.0 officially acknowledges server virtualization, but PCI compliance in virtual environments is still more art than science.
November 08, 2010
Virtualization product vendors offer guidance for PCI-compliant virtual data centers. These briefs also include news on CA's acquisition of Hyperformix and Zimbra's certification program.
August 19, 2010
A cryptic VMworld preview video sent industry-watchers' imaginations running wild about a new 'vFabric' offering. But it was much ado about two already previewed products: vShield Edge and App.
Server virtualization risks and monitoring Get Started
Bring yourself up to speed with our introductory content
Storing log data is an important part of the log management process. Maintain performance, security and backup policies with careful log consolidation. Continue Reading
Logs can produce immense amounts of data, but logging standards, such as standardized formats and security procedures, can help IT professionals minimize information overload. Continue Reading
Log files can contain enormous amounts of potentially useful information, but without log data analysis and log filtering, it can be difficult to sort, prioritize and read. Continue Reading
Evaluate Server virtualization risks and monitoring Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
In TechTarget's annual IT Priorities survey, information technology professionals across industries provide a glimpse of their 2018 IT strategy plans and pet projects. Continue Reading
IT organizations hear plenty of myths about isolation and security when they compare containerization vs. virtualization. One DevOps and containerization consultant sets the record straight in this podcast. Continue Reading
Container isolation doesn't cut it in production. Instead, beef up security from the infrastructure to the application code, and be prepared to use some new tools to do it. Continue Reading
Manage Server virtualization risks and monitoring
Learn to apply best practices and optimize your operations.
Before implementing virtualization in your data center, assess all of its potential risks -- from system outages to cyberattacks -- and how to manage them. Continue Reading
Monitoring a large or complex environment can be a major undertaking, but the right technology can make it a more straightforward process. That's where SNMP comes in. Continue Reading
In an increasingly virtualized world, there's always the risk of falling prey to a cyberattack. The best way to prevent an attack is to have a solid security plan in place. Continue Reading
Problem Solve Server virtualization risks and monitoring Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Both containers and VMs offer different ways of meeting an organization's application deployment requirements. And virtualization containers present different security challenges than VMs. Continue Reading
Physical servers had built-in security safeguards that VMs don't. While it'd be hard to sneak off with a server, a VM can be stolen with little fuss. Continue Reading
A software-defined data center expands the role of the virtual administrator, but this added responsibility means potential for crippling mistakes. Continue Reading