Email Alerts
-
Should VMware vulnerabilities in JRE impede implementing virtualization?
Could recent VMware vulnerabilities in JRE hamper virtualization implementation? In this expert response, Michael Cobb explains that VMware attacks are theoretical at this point and shouldn't stop you from implementing virtualization if your risk ass... Ask the Expert
-
VMware security best practices guide
Without the proper VMware security, your entire IT infrastructure could be at risk. VMware security best practices can keep your environment safe. Resource Guide
-
How to steal a virtual machine and its data in 3 easy steps
Stealing a virtual machine and its data is pretty easy. If you know how it's done, you can figure out how to prevent it and avoid some potentially costly administrative missteps. Article
-
Web security strategy: Use cloud security services
Web security used to be mainly URL filtering and protocol validation, but as Eric Ogren explains, Web security clouds improve security with little impact on performance. Column
-
How to maintain network control plane security
Use access control lists and secure configurations to maintain the security of your organization's network control plane. Tip
-
Security challenges with cloud computing services
Panel discusses cloud computing security issues including encryption and user authentication. Article
-
Secure virtual desktop software enables remote client security
Virtual desktops control endpoints and cut costs for an Atlanta-based financial company. The setup helps IT control core essentials and enforce acceptable use policy. Column
-
At VMworld 2009, companies focus on virtual desktops for security
While security is not a major theme at VMworld 2009, companies are turning attention to virtual desktop infrastructures to improve security and address remote employees. Column
-
Security fundamentals remain focus of virtualization deployments
Companies are avoiding virtualization security technologies until the market matures and established security vendors address threat mitigation and compliance issues. Article
-
Installing and configuring vShield Zones
VMware addressed virtual machine security concerns in vSphere 4.0 with the release of vShield Zones. Learn how to install and configure it for your VMware infrastructure. Tip
Security Management Strategies for the CIO