Email Alerts
-
VMware vShield Zones: What it is and how it works
One of the new technologies VMware released with vSphere is a security tool called vShield Zones. Learn how it works in the first part of this three-part series. Tip
-
How to implement virtual firewalls in a complex network infrastructure
If your enterprise has a complex network infrastructure, it might be necessary to implement virtual firewalls or multiple security contexts. Network security expert Mike Chapple explains the pros and cons of doing so. Ask the Expert
-
Quiz: Virtualization and compliance
How much have you gleaned from this Virtualization and compliance Security School lesson? Test you knowledge of cloud compliance best practices and the future of virtualization compliance. Quiz
-
How to find virtual machines for greater virtualization compliance
When it comes to compliance and virtualization, security vulnerabilities and privacy concerns are not the only issues of interest to auditors. Managing internal virtual machines can be a major security and compliance hurdle, particularly in environme... Tip
-
Countdown: Top 5 issues involving data loss and the virtualized cloud
In this podcast, learn the issues to consider when moving data into the cloud and how to work with your provider on security. Podcast
-
Sourcefire to ignite new offerings for virtualisation security
The firm behind the popular Snort IDS will foray into virtualisation security later this year in its Sourcefire 3D system with traffic inspection between virtual machines. Article
-
Safely implementing VMsafe-aware virtual appliances in your data center
VMsafe-aware virtual appliances can subject a virtualization environment to security risks, but smart administration can help you avoid a breach. Tip
-
Virtual appliances boost flexibility, improve security
Companies see the benefits of placing network-oriented security on a faster processor. Column
-
App service cloud could boost security, manageability
New products from Citrix Systems Inc. could help organizations get started creating a corporate application service. Column
-
Kodak CISO on virtualization, compliance
Kodak CISO Bruce Jones on compliance issues, cloud computing and virtualization. Also, security analyst Eric Ogren on virtualization and other trends from the 2009 RSA Conference. News
Security Management Strategies for the CIO