Virtualized security: Choosing the right approach

Virtualized security: Choosing the right approach

Date: Nov 21, 2013

In this presentation, Chris Hoff discusses the operational, technical and compliance challenges infosec pros face in their approach to virtualized security. He examines five specific options and the pros and cons of each:

1. Physical appliance enforced security 
2. Virtual appliance enforced security
3. Combination of physical and virtual appliances
4. Workload-based isolation with security enforced in the hypervisor and/or a combination of hypervisor and virtual appliance
5. The hybrid model

Chris Hoff is vice president of Strategy and Planning at Juniper Networks after serving as the company’s chief security architect. He has held similar roles at Cisco Systems, Unisys Corp. and Crossbeam Systems. Hoff is a founding member and technical advisor to the Cloud Security Alliance, founder of the CloudAudit projectand HacKid conferenceand writes the Rational Survivability blog. Follow him on Twitter @beaker.

 

More on Virtualization Security Issues and Threats

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: