Email Alerts
-
Which hypervisor features provide the most virtual server security?
The advent of integrated hypervisor features, focused on security, is welcome news to many admins, but which ones provide the most benefit? Answer
-
Though OS-independent, thin hypervisors provide solid security
If you think smaller hypervisors are more vulnerable, think again. A thin hypervisor may be more secure than bare-metal versions. Answer
-
Virtual security tactics for Type 1 and Type 2 hypervisors
It's no surprise that Type 1 and Type 2 hypervisors require different security considerations, but we asked an expert to clarify. Answer
-
The value of a virtual security gateway in the data center
Matthew Pascucci discusses virtual security gateway appliances and whether they are a virtual data center necessity or just an overhyped product. Answer
-
JeOs and the benefits of a virtual security appliance
A virtual security appliance offers enterprises a number of benefits, including an optimized operating system that simplifies patch management. Answer
-
Cloud computing providers and PCI virtualization requirements
How should an enterprise approach its cloud computing providers following the debut of the PCI virtualization requirements? Charles Denyer explains. Answer
-
Can the VMware PCI Compliance Checker assess my compliance posture?
The VMware PCI Compliance Checker claims to assess the compliance of a VMware virtual environment. Does it work? Charles Denyer has the answer. Answer
-
Virtualized behavior-based monitoring: Improving performance visibility
Learn about virtual behavior-based monitoring tactics, which allow for easy anomaly detection and can help defend a virtualization infrastructure. Answer
-
Security/virtualization concerns: Where to place a firewall connection
Is it worthwhile to place signature-based blocking technology before a firewall connection? Learn more in this expert response from Anand Sastry. Ask the Expert
-
Virtualization security concerns: The threat of hypervisor malware
What is hypervisor malware, and how worried should enterprises employing virtualization be about it? Threats expert Nick Lewis explains. Ask the Expert
Security Management Strategies for the CIO