Email Alerts
-
Three hypervisor and virtual environment security concerns
Virtualization offers many benefits but also comes with plenty of risks. Keep these three things in mind when planning virtual environment security. Feature
-
Which hypervisor features provide the most virtual server security?
The advent of integrated hypervisor features, focused on security, is welcome news to many admins, but which ones provide the most benefit? Answer
-
Though OS-independent, thin hypervisors provide solid security
If you think smaller hypervisors are more vulnerable, think again. A thin hypervisor may be more secure than bare-metal versions. Answer
-
Virtual security tactics for Type 1 and Type 2 hypervisors
It's no surprise that Type 1 and Type 2 hypervisors require different security considerations, but we asked an expert to clarify. Answer
-
Evaluating network security virtualization products
Don't risk making mistakes when you evaluate network security virtualization products. Our six key points will keep you on track. Tip
-
Case Study: US supermarket chain solves security challenge virtually
A US supermarket chain has implemented an endpoint security system to secure legacy applications and to save additional development Case Study
-
The value of a virtual security gateway in the data center
Matthew Pascucci discusses virtual security gateway appliances and whether they are a virtual data center necessity or just an overhyped product. Answer
-
How to configure a VLAN to achieve the benefits of VLAN security
Expert Brad Casey explains how to configure a VLAN in order to achieve the benefits of VLAN security, including protection against insider attacks. Tip
-
Defending against watering hole attacks: Consider using a secure VM
Expert Nick Lewis analyzes the techniques employed by watering hole attacks and discusses how to use a secure VM to defend enterprises against them. Tip
-
Five Steps to Incident Management in a Virtualized Environment
Incident management (IM) is a necessary part of a security program. When effective, it mitigates business impact, identifies weaknesses in controls, and helps fine-tune response processes. Traditional IM approaches, however, are not always effective ... Reference
Security Management Strategies for the CIO