Email Alerts
-
Can the VMware PCI Compliance Checker assess my compliance posture?
The VMware PCI Compliance Checker claims to assess the compliance of a VMware virtual environment. Does it work? Charles Denyer has the answer. Answer
-
AV storm
An AV storm is the performance degradation that occurs when antivirus software simultaneously scans multiple virtual machines (VMs) on a single physical host. Definition
-
Virtualized behavior-based monitoring: Improving performance visibility
Learn about virtual behavior-based monitoring tactics, which allow for easy anomaly detection and can help defend a virtualization infrastructure. Answer
-
PCI encryption, virtualization standards: Interpreting PCI guidelines
Get expert advice on understanding the PCI encryption requirements and virtualization guidance in this video. Video
-
How to connect virtual environments to DMZ network architecture
Connecting virtualized environments to DMZ network architecture creates new challenges. Network managers must learn new design methodologies to protect virtual traffic in the DMZ. Tip
-
Eye On: Virtualization Security
SearchSecurity.com's "Eye On" series examines a security topic each month. In May, the series explores virtualization security and the technologies and methodologies available to reduce vulnerabilities and improve virtualization processes. Article
-
Reduce virtualization security risks by thinking physical, experts say
Firms reassessing their virtualized infrastructure should apply the same security best practices they’ve been using to secure their physical systems. News
-
Hypervisor security planning: Guidelines
With proliferation of server virtualization, hypervisor security is an emerging concern. Though theoretical, we look at the risks and mitigation measures. Tip
-
Auditing virtualization: Security training for infosec pros
This chapter discusses auditing virtualized environments, and begins with an overview of common virtualization technologies and key controls. Tip
-
Security in virtualization: IDS/IPS implementation strategy
Considering virtualization? Take into account that your IDS or IPS may not work the same way in a virtualized environment as it does in a physical one. Expert Dave Shackleford explains how to address this potential problem. Tip
Security Management Strategies for the CIO