This article can also be found in the Premium Editorial Download "Information Security magazine: Virtualization security dynamics get old, changes ahead."
Download it now to read this article plus other related content.
Beyond the Page is a monthly online Information Security magazine supplement, offering an in-depth, multimedia-centric look at a topic featured in a given month's issue. It's an opportunity to provide you with even more expertise from a selection of our best Information Security magazine contributors.
In addition to the contributor's magazine feature, Beyond the Page also offers an exclusive webcast presentation to help security practitioners and decision makers alike understand an issue from all angles, as well as an exclusive technical article that offers practical advice on implementation, management or troubleshooting.
In this November 2013 Information Security magazine Beyond the Page on virtual security, we examine a range of security issues you’ll encounter when implementing better security in the virtual environment and look at some new security models that are starting to give way to more agile, automated and integrated security offerings. See the content below.
Security feature: Virtualization security dynamics get old
Virtualization and cloud computing are part and parcel of enterprise networks today. Virtualization security, however, is still a bolt-on affair rather than a service layer that is well-integrated into infrastructures or tied to workloads directly. In this month’s cover story, author Chris Hoff looks at where we are today and the impact of cloud computing and software-defined networking on virtualization security strategies.
Virtualized security: Choosing the right approach
In this presentation, Chris Hoff discusses the operational, technical and compliance challenges infosec pros face in their approach to virtualized security. He examines five options and the pros and cons of each.
tip: Network virtualization: Which security model should you choose?
With a range of physical and virtual appliance security controls, here's how to find the right security model for enterprise data centers.
About the contributor:
Chris Hoff is vice president of Strategy and Planning at Juniper Networks after serving as the company’s chief security architect. He has held similar roles at Cisco Systems, Unisys Corp. and Crossbeam Systems. Hoff is a founding member and technical advisor to the Cloud Security Alliance, founder of the CloudAudit projectand HacKid conference and writes the Rational Survivability blog. Follow him on Twitter @beaker.
This was first published in November 2013