Premium Content

Access "Seeking nirvana: virtualisation without security risk"

Published: 03 Jan 2013

Cost pressures and the rise of cloud computing have led many businesses to turn to lower-cost virtual environments on premise and in the cloud, but a lack of expertise and experience may be exposing these organisations to unnecessary security risk. Researchers and other members of the security industry believe that in addition to a general lack of understanding about how virtual environments work, the fact that the business is so focused on performance and cost, often means security is either overlooked or tagged on only at the end. According to Forrester security and risk analyst Andrew Rose, many IT professionals think a virtual server is just the same as a physical one, even though the risks are different. As organisations seek the economic benefits of virtualising their IT environments, servers are no longer individual pieces of equipment that are hard-wired into carefully controlled physical networks. Instead, they are complex software instances running on top of virtual networks and connecting to increasingly virtualised storage layers, which means ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • The next frontier for managed print services
    The-next-frontier-for-managed-print-services-(1361197877_756).jpg
    E-Handbook

    The managed print services (MPS) market has matured since many organisations inked their first deal. Organisations moving beyond first generation ...

  • World-Class EA: The Agile Enterprise
    World-Class-EA---The-Agile-Enterprise-(1360587978_371).jpg
    E-Handbook

    The concept of “agile” has recently come to the fore, typically in connection with technical activities, such as software development. Subsequently, ...

  • Security Visualisation
    Security-visualisation-(1358519141_684).jpg
    E-Handbook

    This article is guideline of how to generate a visual representation of a given dataset and use in the evaluation of known security vulnerabilities. ...