New & Notable
Server virtualization security management and compliance policies News
May 25, 2018
Learning the ins and outs of the Chef InSpec product is only half the battle for compliance as code. The thornier task for some enterprises is to bridge the gap between compliance expertise and DevOps execution.
September 12, 2011
VMware has its work cut out for it integrating PacketMotion's hardware-based security appliances. Some virtualization pros say user access management isn’t on their radar yet.
November 09, 2010
PCI DSS 2.0 officially acknowledges server virtualization, but PCI compliance in virtual environments is still more art than science.
November 08, 2010
Virtualization product vendors offer guidance for PCI-compliant virtual data centers. These briefs also include news on CA's acquisition of Hyperformix and Zimbra's certification program.
Server virtualization security management and compliance policies Get Started
Bring yourself up to speed with our introductory content
Storing log data is an important part of the log management process. Maintain performance, security and backup policies with careful log consolidation. Continue Reading
Logs can produce immense amounts of data, but logging standards, such as standardized formats and security procedures, can help IT professionals minimize information overload. Continue Reading
Log files can contain enormous amounts of potentially useful information, but without log data analysis and log filtering, it can be difficult to sort, prioritize and read. Continue Reading
Evaluate Server virtualization security management and compliance policies Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
In TechTarget's annual IT Priorities survey, information technology professionals across industries provide a glimpse of their 2018 IT strategy plans and pet projects. Continue Reading
IT organizations hear plenty of myths about isolation and security when they compare containerization vs. virtualization. One DevOps and containerization consultant sets the record straight in this podcast. Continue Reading
Container isolation doesn't cut it in production. Instead, beef up security from the infrastructure to the application code, and be prepared to use some new tools to do it. Continue Reading
Manage Server virtualization security management and compliance policies
Learn to apply best practices and optimize your operations.
Administrators must prepare carefully before moving test or development VMs to production. Check connectivity, security, compliance and licensing before beginning a migration. Continue Reading
With compliance as a service, organizations can lean more heavily on their cloud providers to ensure adherence with certain regulations -- but not without some risk. Continue Reading
Before implementing virtualization in your data center, assess all of its potential risks -- from system outages to cyberattacks -- and how to manage them. Continue Reading
Problem Solve Server virtualization security management and compliance policies Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In an increasingly virtualized world, there's always the risk of falling prey to a cyberattack. The best way to prevent an attack is to have a solid security plan in place. Continue Reading
Don't let unplanned changes take a toll on your virtualized environment. Stop rogue servers in their tracks by identifying them and then deciding whether to keep or remove them. Continue Reading
Both containers and VMs offer different ways of meeting an organization's application deployment requirements. And virtualization containers present different security challenges than VMs. Continue Reading