TechTarget

CW+ Premium Content/E-Handbooks

Thank you for joining!
Access your Pro+ Content below.
02/2013

Virtualization Security: Protecting Virtualized Environments

Sponsored by ComputerWeekly.com

Hardening the hypervisor should really be viewed as a standard practice, much as it should be for enterprise servers of any importance. There are an incredible number of configuration options for the major platforms (ESXi, Hyper-V, and XenServer). This extract identifies the most fundamental principles, getting you to a sound security state that conforms to industry best practices.

Table Of Contents

  • Securing Hypervisors
  • Hypervisor Configuration and Security
  • Hypervisor Architecture

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close