TECHNOLOGYBRIEF. The Impact of Virtualization on Network Security. Discover. Determine. Defend.

Size: px
Start display at page:

Download "TECHNOLOGYBRIEF. The Impact of Virtualization on Network Security. Discover. Determine. Defend."

Transcription

1 The Impact of Virtualization on Network Security Discover. Determine. Defend.

2 EXECUTIVE SUMMARY Virtualization is a concept that has become highly visible in the last few years because of its perceived benefits in reducing costs, enabling rapid deployment, and improving system availability. These benefits are rooted in the ability of virtualization to separate a physical host into discrete sub-environments known as virtual machines. Virtual machines operate like physical machines in that they run their own operating system and applications. Yet virtual machines exist as file images and can be quickly provisioned, copied, moved, and restored. With all of its benefits, however, virtualization also creates new security risks. For example, an attacker who gains access to one virtual machine can potentially compromise every other virtual machine on that host by exploiting the virtual machine monitor, or hypervisor, on that host. Other risks are created by virtual machine sprawl, where virtual machines are scattered throughout a network because of a lack of coordination in provisioning and updating them. Security risks become more tangible because a virtual machine that is not properly tracked and managed may not have updated patches or proper configuration control, leading to vulnerabilities that can be exploited. INTRODUCTION Virtualization has been receiving significant attention because of the various benefits it offers to organizations. Examples include reducing costs, improving system availability, and enhancing speed of infrastructure deployment. According to a survey conducted by Symantec in late 2007, 90 percent of the survey respondents have implemented or are considering virtualization for their data centers, and 50 percent have actually implemented it. Virtualization projects range from server consolidation and disaster recovery to the simplification of provisioning for desktops and associated applications. Security is a relevant issue, however. Industry analysts are now saying that virtualization actually creates new attack opportunities. Unfortunately, there is not a lot of awareness about what these new opportunities may be. An InformationWeek poll conducted in 2007 revealed that 43% of respondents believed that virtualized hardware was just as secure as physical hardware, and only 12% had put in formal strategies to protect their virtualized systems. This paper seeks to address various questions that may arise about the impact of virtualization on security: What new risks are created by implementing virtualization? What steps need to be taken to secure a virtual system or network? How can I leverage my existing investment in security to protect virtual systems? Guidance on protecting virtualized environments and best practices will also be provided. VIRTUALIZATION DEFINED Market leader VMware describes virtualization as the separation of a resource or request for a service from the underlying physical delivery of that service. There are various types of virtualization from a technical standpoint, but the one discussed in this paper is known as server or full virtualization, which is the most prevalent type used for production. Server virtualization divides a physical host into discrete sub-environments known as virtual machines or VMs. Each VM is a true representation of a physical host with its own processor, memory, storage, and network connections. A control program, also known as a virtual machine monitor (VMM) or a hypervisor, abstracts and coordinates access to the physical host hardware (i.e., processor, memory, storage, etc.) so it can be used simultaneously by multiple VMs. Server virtualization can be further divided into Type 1 and Type 2 virtualization. Figure 1 illustrates the differences between the two types. Type 1 relies on a hypervisor that runs directly on the physical host hardware or with a strippeddown, streamlined operating system. Figure 1. Type 1 vs. Type 2 virtualization 2

3 The hypervisor is therefore running closer to the bare metal of the physical host because it does not rely on an intermediary general-purpose operating system such as Linux or UNIX. Examples of Type 1 virtualization include VMware ESX Server and Citrix XenServer. Type 2 virtualization uses a hypervisor that runs as a standard application on a physical host s operating system. The hypervisor therefore does not have the direct access to the physical hardware that a Type 1 hypervisor has. Examples of Type 2 virtualization include VMware Server, VMware Workstation, Microsoft Virtual PC, and Parallels. Virtualization has several properties that provide the foundation for many of its benefits. These properties are partitioning, isolation, and encapsulation and each is defined below: Partitioning: Each virtual machine has its own respective processor, memory, network connection, and storage so it can run a completely separate operating system and applications from other VMs on the same physical host. Physical resources such as memory and disk space can be potentially pooled and shared among VMs. Isolation: Virtual machines are isolated from each other and from the host machine. Any crash or corruption on a VM should not affect any other VM. Encapsulation: Each virtual machine is encapsulated as a single file that can be easily copied or moved to another host. The state of a VM can be preserved as a snapshot that can be quickly restored. Other examples of virtualization that will not be explored here are operating system virtualization (operating system is separated into virtual OS partitions that share a common kernel) and application virtualization (an application runs in a small virtual environment with its own registry entries, files, and global objects). Examples of operating system virtualization are Solaris zones and User Mode Linux, while examples of application virtualization are the Java Virtual Machine and the Common Language Runtime used by Microsoft s.net. ADDITIONAL CAPABILITIES Three additional terms also require explanation because they are involved in the discussion of how virtualization affects network security. Virtual Infrastructure describes a set of management services that help to optimize utilization of virtual resources and better meet availability, maintenance, and service-level objectives. Virtual infrastructure includes the ability to create and manage pools of resources, as well as the ability to dynamically relocate virtual machines from one physical machine to another without downtime. Virtual Networks involves hypervisor-layer support for virtual switches and virtual network interfaces. A virtual network makes it possible for multiple VMs to operate on a single physical server and directly communicate with each other. In addition, virtual LANs (VLANs) are typically supported, enabling the formation of broadcast segments within a virtual network or even across a combination of virtual and physical systems. Virtual Appliances are similar to soft appliances. A soft appliance is an application packaged along with its operating system and any other components that it needs to function. Upon booting from the appliance CD, the application self-installs on to the hard drive and effectively converts a physical server into a dedicated system for the given application (e.g., a firewall). A virtual appliance is similar to a soft appliance but with a few key differences. A virtual appliance runs as a virtual machine image so it requires the presence of a hypervisor and is not directly installed on the hard drive. Also, it is much more mobile because it is an ordinary file and can be copied or migrated to another physical host. BUSINESS BENEFITS FOR VIRTUALIZATION Virtualization solutions have tremendous benefits for businesses. They can help control costs, reduce energy consumption, improve system availability, and enable organizations to respond to new business opportunities more quickly. They also help to avoid failure and infection scenarios and simplify ongoing system administration. Systems can now be deployed and restored almost instantly, and they can be migrated to other parts of the network with only a few mouse clicks to minimize downtime due to maintenance. Organizations have been therefore taking the initiative to launch various virtualization projects: Consolidate and optimize server infrastructure by reducing the number of dedicated, low-utilization systems 3

4 Simplify test and development (e.g., for patches, applications, operating systems) by enabling rapid provisioning and reset of test systems and eliminating the need for dedicated test hardware Improve infrastructure agility and business continuity by rapidly provisioning new systems and dynamically repurposing existing ones SECURITY CONSIDERATIONS With all of these benefits, however, there may also be new security risks. Organizations must take care not to have the benefits of virtualization eroded because they fail to recognize and respond to these risks. For example, the presence of a hypervisor creates the possibility of new vulnerabilities. Researchers have already proven that it is possible to perform VM escape, or access the physical host operating system from a VM. For example, Ed Skoudis and Tom Liston of Intelguardians, a security consulting company, demonstrated at a 2007 SANS conference the ability to exploit a hypervisor vulnerability from a VM and execute arbitrary code on the host operating system. Other research has shown that it is possible to crash a hypervisor from a VM by sending random data sequences to a VM s virtual hardware such as the network card, video driver, or floppy disk controller. Hyperjacking is the practice of using an exploit from a VM to gain control of the hypervisor. Hyperjacking would also enable a malicious user to compromise all the other VMs on that host because the hypervisor has privileged access to those VMs. The compromised hypervisor could then function as a rootkit in disguising its presence from security tools running either in the VMs or externally. It could also modify any VM traffic sent to or received from other hosts on the network. This has significant implications from a data integrity standpoint. Even if a hypervisor is not compromised, a malicious user who gains access to a single VM could potentially launch attacks against other VMs on the same physical host without detection. Traditional security tools such as firewalls and intrusion detection/prevention systems typically do not have visibility into traffic between VMs on the same host. Even if the user has legitimate access to one VM, there is no visibility into any traffic sent to other VMs on the same host. Other security risks are caused more directly by poor management practices than by vulnerabilities. The phenomenon known as VM sprawl is the propagation of VMs without adequate coordination or oversight. VM sprawl originates from multiple causes: System administrators deploy new VMs without sufficient planning. Little attention is paid to such lifecycle elements as support, patching, configuration, and end of life because of the ease and speed in provisioning the VMs. Sprawl is intensified further in decentralized environments where there is lack of coordination in VM deployment among IT groups. Administrators and users copy VMs to new hosts throughout the network because the VMs exist as file images and can be easily transferred via portable USB drives or network transfer. Users create or copy VMs to their laptops or desktops for development and testing purposes without coordination with the IT group. These VMs often do not meet configuration standards or security requirements. Snapshots enable a VM to be rolled back to a previous state, which means that patches can now be undone. VMs that are powered off or suspended are likely to be ignored and not receive updated patches and configuration changes. The result of VM sprawl is that VMs are distributed across multiple physical hosts, in various states of patching and configuration. No single group tracks where a VM is located, what its patching and configuration status is, or what its purpose is. Security risks become more tangible because a VM that is not properly tracked and managed may not have updated patches or proper configuration control, leading to vulnerabilities that can be exploited. Organizations usually employ patch management or configuration management tools to mitigate these types of security risks. It is difficult to use these tools effectively, however, when the locations, patch states, and configurations of systems are constantly changing. Also, the number of systems to manage increases by an order of magnitude because of virtualization s ability to quickly provision new hosts. 4

5 BEST PRACTICES FOR SECURITY It is possible to mitigate against this new set of risks by adopting a set of best practices: 1. Use standard security practices where it makes sense. For example, practice defense-in-depth strategies to layer multiple security technologies such as firewalls and intrusion detection/prevention systems. Also, apply traditional host-based security mechanisms such as antivirus and antispyware agents on virtual hosts as if they were physical hosts. 2. In a similar fashion, practice the same configuration controls on both physical and virtual machines alike, and regularly audit VMs for compliance. 3. Monitor traffic to and from VMs. This topic will be explored in a subsequent section of this paper. 4. Protect the hypervisor, if possible. This is most effectively done with hypervisor vendor or thirdparty products that can protect against stack and heap overflows and other vulnerabilities. Mechanisms that can help verify code integrity, such as the Trusted Platform Module (TPM) standard, are also useful. 5. Consider using an embedded hypervisor that does not include a general-purpose operating system to minimize the possibility of hypervisor vulnerabilities. 6. Implement segmentation when determining how to deploy VMs on physical hosts. Ensure that VMs on the same host are at equivalent trust levels so if one host is compromised, gaining control on the other VMs would not result in a significant security breach. Do not implement a VM that crosses trust zones, such as a virtualized firewall. 7. Guard against VM sprawl by maintaining an inventory of VMs and the physical host they reside on. All migrations should be documented and potentially subject to an approval process. Avoid overly complex environments by keeping operating systems and applications consistent for VMs on the same host. Retire VMs when they are no longer being accessed. 8. Develop a system to uniquely identify VMs by criteria other than hostname, IP address, or current host placement. VMs can be moved around the network far too easily for IP address and host placement to be useful identifiers, and the hostname is not reliable unless a naming scheme for VMs is strictly enforced. MAC address may be reliable (unless it is deliberately altered) because vendors such as VMware may use distinctive MAC addresses for VMs. This identification system should also be used to identify rogue VMs that are created by users on desktops or laptops. 9. Apply patching and content update processes to both operational and offline VMs. Snapshots should contain the latest set of patches and the process of restoring a snapshot should be documented and potentially subject to approval. Some patch vendors may provide integrations with virtualization vendors to patch offline VMs automatically. 10. Manage VMs as both files and systems simultaneously. Prevent unauthorized access to or tampering with offline VMs, because walking away with an entire disk volume can now be as easy as copying a single file to a high-capacity USB drive. 11. When creating VMs and snapshots, cryptographically sign the VM file images so when they are distributed and deployed, the user can verify their integrity. MONITORING VIRTUAL MACHINE TRAFFIC Best practices in intrusion detection and prevention recommend that sensors be deployed in various monitoring zones such as inside the firewall in the DMZ, between an enterprise s wireless and wired segments, between partner networks, and in front of highly valuable assets. There are no concrete rules of sensor placement but in general, sensors should be placed at the various ingress and egress points on a network. Malicious traffic can only be detected if it passes through a sensor, and more sensors should provide better visibility into network traffic than fewer. One of the potential security risks created by virtualization is losing visibility into traffic between VMs on the same host. Even if there are only a handful of VMs deployed on a host, a malicious user who compromises one VM can launch attacks against the other VMs without the attack traffic being detected. Even if a user has legitimate access to one VM, this user is free to launch attacks, illegitimately access data, or commit other policy violations against the other VMs without being detected. A user with access to one VM can reach even more systems over time as hosts become increasingly capable of hosting a large number of VMs. This is due to a number of factors: greater hypervisor efficiency in resource allocation, more direct access between VMs and hardware because of hardware virtualization support, and more powerful CPUs and larger amounts of memory per host. 5

6 There are three general approaches that enterprises can take when monitoring traffic to and from virtual machines: 1. Deploy VM-based sensors 2. Deploy sensors on hosts used for VMs 3. Deploy existing physical sensors Deploy VM-based sensors. The most compelling reason to deploy sensors as virtual machines on hosts is to gain further visibility into VM traffic. Traffic can be examined to both search for possible exploits as well as conduct flow analysis and evaluate if a user on one VM is accessing a service on another VM that is not permitted. A VM sensor can either be deployed passively so it can monitor traffic between VMs and other physical hosts, or inline so it can block traffic. Figure 2 shows the difference between a VM sensor deployed to monitor traffic and one deployed to block traffic. Deployment of a VM sensor requires the hypervisor to support virtual networking capabilities such as switching, promiscuous mode, and bridging. The hypervisor s features may constrain deployment options. For example, it may be possible to only monitor traffic between VMs on the same host and not block it. Despite these advantages, however, there are a number of disadvantages to using VM sensors: Security. If a malicious user gains access to the hypervisor from a VM, all other VMs on that host including the sensor are now vulnerable to compromise. The malicious user could either disable the sensor or configure the sensor to ignore any attack traffic sent by that user. Management. The number of sensors to manage could increase by an order of magnitude as sensors are placed on physical hosts. Each sensor also generates its own set of alerts and the overall count of false positives could increase as well. Performance. The sensor VM consumes resources such as CPU and memory that could be used by other VMs, so performance for these other VMs could be adversely impacted. Tuning. Ideally, the sensor VM will be tuned appropriately to the other VMs on the host. It will support rules and signatures appropriate to the operating systems and applications running on these other VMs. If VMs are migrated between physical hosts without updating the sensor VM intrusion policies, then the sensor will not run optimally and could cause further performance issues. The only exception to this is if the sensor can automatically determine the operating systems and applications running on the other VMs. Configuration complexity. Deploying a sensor VM requires additional network configuration changes so the sensor can monitor or block traffic from other VMs. These changes may include setting up a virtual switch or switches and enabling promiscuous mode. These changes must be tracked and possibly monitored for troubleshooting purposes. All of this adds to overall complexity. Figure 2. Deploying sensor virtual machines in monitoring mode vs. blocking mode Another advantage could be greater granularity of sensors. If an organization follows the recommended practice of keeping all VMs on a host at the same trust level, then some VM sensors could be considered more critical than others because of the hosts they are running on. This permits a prioritization of alerts generated by sensors. Deploy sensors on hosts used for VMs. An alternative to running an intrusion sensor as a virtual machine is to run the sensor directly on the host. This approach has the same advantages as running the sensor as a VM, especially because the sensor can monitor or block all VM traffic. The sensor is also simpler to deploy and maintain in that it does not require the additional network configuration changes required for a sensor VM. Figure 3 illustrates how the sensor can monitor all VM traffic without running as a VM itself. 6

7 Figure 3. Deploying sensor on host operating system to monitor VM traffic On the other hand, this approach has many of the disadvantages of the VM approach including security, management, performance, and tuning. It also requires a hypervisor implementation that supports a host operating system on which to install the sensor. This includes all Type 2 deployments, as well as Type 1 deployments with a service console, such as VMware ESX 3.x. Virtualization vendors such as VMware and Citrix (Xen) have announced that they are moving to more of a true Type 1 virtualization model. Their embedded hypervisor products run close to the physical hardware without a full intermediary operating system. As this model becomes more prevalent, a sensor formerly installed on the host operating system will now run as a VM and leverage a hypervisor API to access VM traffic. Such an API may or may not exist today but it becomes an important component of the monitoring solution. Deploy existing physical sensors. As one can see with the other approaches, there are clearly pros and cons to deploying sensors either as VMs or on a host supporting VMs. All of this does not automatically imply that existing physical sensors are now obsolete. If virtualization is used to increase the number of hosts per subnet but does not change how traffic enters or exits the network, then the organization should be able to detect any intrusion with its existing sensor network. For example, an enterprise may currently deploy sensors between zones such as the wireless segment, VPN concentrators, DMZ, internal corporate network, and data center. It uses virtualization to increase the number of systems in the data center, but all traffic leaving and entering the data center is already being monitored by sensors. Figure 4 illustrates this concept. In this scenario, malicious traffic should be detected by the existing sensors as it enters the data center network segment. There may not be any additional benefit to deploying a virtual sensor within a host in the data center. Relying on existing physical sensors has some significant advantages. Existing investments in security infrastructure can be leveraged. Also, clear boundaries for system ownership can be maintained. In other words, a physical sensor is clearly owned by the security group, while it is not as clear who owns a sensor VM that is running in a host managed by the server group. The disadvantages of physical sensors have already been mentioned in passing, but they focus on the inability to monitor traffic between VMs. Any attack traffic sent between VMs cannot be detected. Even if physical sensors are monitoring all of the ingress and egress points on the network, the sensors cannot detect exploit traffic or policy violations sent by a legitimate user on one VM to the other VMs on the host. Figure 4. Deploying physical sensor to monitor VM traffic 7

8 The advantages and disadvantages of all three approaches are summarized in Table 1. MONITORING APPROACH ADVANTAGES DISADVANTAGES VM-based sensors Gain visibility into traffic between VMs Vulnerable to hypervisor exploit More sensors to manage Impacts VM performance More tuning required Configuration complexity Sensors on host Gain visibility into traffic between VMs Simpler to configure than VM-based sensors Vulnerable to hypervisor exploit More sensors to manage Impacts VM performance More tuning required May not support embedded hypervisors Physical sensors Preserves existing security investments Clear boundaries for system ownership Lacks visibility into traffic between VMs Table 1. The advantages and disadvantages of sensor VM configuration approaches CONCLUSION With a compelling and seemingly assured set of benefits to be realized, it seems obvious that virtualization solutions are poised to take today s enterprises by storm. As this occurs, however, consideration will need to be given to the impact that virtualization will have on security. Changes will inevitably need to be made to ensure that the resulting hybrid environment of virtual and physical computing systems remains sufficiently protected. It is important for organizations to take the following steps as they move to virtualization: Understand what virtualization is and how it will offer concrete benefits for your organization. Provide a clear business case of these benefits. Assess the impact of virtualization on your organization s security. Follow the best practices mentioned here, such as continuing to use traditional security practices where applicable, implementing a segmented trust model, and avoiding VM sprawl with careful management. Investigate where existing security technologies may be sufficient and where they may need to be supplemented with new virtual technologies. Have a clear understanding of the pros and cons. of various approaches. For more information about Virtualization, or the Sourcefire 3D System, visit Sourcefire s web site at or contact Sourcefire today. About Sourcefire Sourcefire, Inc., a world leader in intrusion prevention, is transforming the way organizations manage and minimize network security risks with its 3D Approach - Discover, Determine, Defend - to securing real networks in real-time. The company's ground-breaking network defense system unifies intrusion and vulnerability management technologies to provide customers with superior network security. Founded in 2001 by the creator of Snort, Sourcefire is headquartered in Columbia, MD and has been consistently recognized for its innovation and industry leadership by customers, media, and industry analysts alike with more than 18 awards and accolades since January 2005 alone. Recently, the company was positioned in the Leaders Quadrant of Gartner s Magic Quadrant for Network Intrusion Prevention System Appliances report and the Sourcefire 3D System was named Best Security Solution, at the 2006 SC Magazine Awards. At work in leading Fortune 1000 and government agencies, the names Sourcefire and founder Martin Roesch have grown synonymous with innovation and intelligence in network security Sourcefire, Inc. Sourcefire 3D System, Sourcefire RNA, Intrusion Sensor, RNA Sensor, Defense Center, Sourcefire Success Pack, Sourcefire VRT and Snort are trademarks or registered trademarks of Sourcefire. All rights reserved. REV

Mitigating Information Security Risks of Virtualization Technologies

Mitigating Information Security Risks of Virtualization Technologies Mitigating Information Security Risks of Virtualization Technologies Toon-Chwee, Wee VMWare (Hong Kong) 2009 VMware Inc. All rights reserved Agenda Virtualization Overview Key Components of Secure Virtualization

More information

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................

More information

Network Access Control in Virtual Environments. Technical Note

Network Access Control in Virtual Environments. Technical Note Contents Security Considerations in.... 3 Addressing Virtualization Security Challenges using NAC and Endpoint Compliance... 3 Visibility and Profiling of VMs.... 4 Identification of Rogue or Unapproved

More information

Virtualization System Security

Virtualization System Security Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability

More information

Demystifying Virtualization for Small Businesses Executive Brief

Demystifying Virtualization for Small Businesses Executive Brief Demystifying Virtualization for Small Businesses White Paper: Demystifying Virtualization for Small Businesses Demystifying Virtualization for Small Businesses Contents Introduction............................................................................................

More information

Virtualization Security and Best Practices. Rob Randell, CISSP Senior Security Specialist SE

Virtualization Security and Best Practices. Rob Randell, CISSP Senior Security Specialist SE Virtualization Security and Best Practices Rob Randell, CISSP Senior Security Specialist SE Agenda General Virtualization Concepts Hardware Virtualization and Application Virtualization Types of Hardware

More information

BEST PRACTICES. DMZ Virtualization with VMware Infrastructure

BEST PRACTICES. DMZ Virtualization with VMware Infrastructure BEST PRACTICES DMZ Virtualization with ware Infrastructure ware BEST PRACTICES Table of Contents Virtualized DMZ Networks... 3 Three Typical Virtualized DMZ Configurations... 4 Partially Collapsed DMZ

More information

Network Segmentation in Virtualized Environments B E S T P R A C T I C E S

Network Segmentation in Virtualized Environments B E S T P R A C T I C E S Network Segmentation in Virtualized Environments B E S T P R A C T I C E S ware BEST PRAC TICES Table of Contents Introduction... 3 Three Typical Virtualized Trust Zone Configurations... 4 Partially Collapsed

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

CA ARCserve Replication and High Availability Deployment Options for Hyper-V

CA ARCserve Replication and High Availability Deployment Options for Hyper-V Solution Brief: CA ARCserve R16.5 Complexity ate my budget CA ARCserve Replication and High Availability Deployment Options for Hyper-V Adding value to your Hyper-V environment Overview Server virtualization

More information

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

Secure Virtualization in the Federal Government

Secure Virtualization in the Federal Government White Paper Secure Virtualization in the Federal Government Achieve efficiency while managing risk Table of Contents Ready, Fire, Aim? 3 McAfee Solutions for Virtualization 4 Securing virtual servers in

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

What is virtualization

What is virtualization Virtualization Concepts Virtualization Virtualization is the process of presenting computing resources in ways that users and applications can easily get value out of them, rather than presenting them

More information

Deployment Options for Microsoft Hyper-V Server

Deployment Options for Microsoft Hyper-V Server CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES

More information

How To Protect Your Cloud From Attack

How To Protect Your Cloud From Attack A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to

More information

HP Virtual Controller and Virtual Firewall for VMware vsphere 1-proc SW LTU

HP Virtual Controller and Virtual Firewall for VMware vsphere 1-proc SW LTU HP Virtual Controller and Virtual Firewall for VMware vsphere 1-proc SW LTU Data sheet Product overview The HP TippingPoint Virtual Controller + Virtual Firewall (vcontroller+vfw) extends our leading intrusion

More information

Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.

Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved. Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security

More information

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Architecting the Internal Cloud Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Building the Internal Cloud Virtualization is the Key How Virtualization Affects

More information

managing the risks of virtualization

managing the risks of virtualization managing the risks of virtualization Chris Wraight CA Technologies 28 February 2011 Session Number 8951 abstract Virtualization opens the door to a world of opportunities and well managed virtualization

More information

Servervirualisierung mit Citrix XenServer

Servervirualisierung mit Citrix XenServer Servervirualisierung mit Citrix XenServer Paul Murray, Senior Systems Engineer, MSG EMEA Citrix Systems International GmbH paul.murray@eu.citrix.com Virtualization Wave is Just Beginning Only 6% of x86

More information

Meeting the Challenges of Virtualization Security

Meeting the Challenges of Virtualization Security Meeting the Challenges of Virtualization Security Coordinate Security. Server Defense for Virtual Machines A Trend Micro White Paper August 2009 I. INTRODUCTION Virtualization enables your organization

More information

Building A Secure Microsoft Exchange Continuity Appliance

Building A Secure Microsoft Exchange Continuity Appliance Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building

More information

VIRTUALIZATION SECURITY IN THE REAL WORLD

VIRTUALIZATION SECURITY IN THE REAL WORLD VIRTUALIZATION SECURITY IN THE REAL WORLD Growing Technology Virtualization has become the standard for many corporate IT departments. The market for server virtualization infrastructure has matured, surpassing

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed

More information

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention Your Security Challenges Defending the Dynamic Network! Dynamic threats 䕬 䕬 䕬 䕬 Many threats

More information

Virtualization Essentials

Virtualization Essentials Virtualization Essentials Table of Contents Introduction What is Virtualization?.... 3 How Does Virtualization Work?... 4 Chapter 1 Delivering Real Business Benefits.... 5 Reduced Complexity....5 Dramatically

More information

Learn the essentials of virtualization security

Learn the essentials of virtualization security Learn the essentials of virtualization security White Paper Table of Contents 3 Introduction 4 Hypervisor connectivity and risks 4 Multi-tenancy risks 5 Management and operational network risks 5 Storage

More information

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL

More information

5 Best Practices to Protect Your Virtual Environment

5 Best Practices to Protect Your Virtual Environment CONTENTS OF THIS WHITE PAPER Security Virtualization s Big Hurdle..1 Why Old-STyle Protections Fall short..2 Best Practices...3 Create A VM Service Good List... 3 Monitor and Protect the Hypervisor...

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g Virtualization: Architectural Considerations and Implementation Options Virtualization Virtualization is the

More information

How To Protect A Virtual Desktop From Attack

How To Protect A Virtual Desktop From Attack Endpoint Security: Become Aware of Virtual Desktop Infrastructures! An Ogren Group Special Report May 2011 Executive Summary Virtual desktops infrastructures, VDI, present IT with the unique opportunity

More information

Learn the Essentials of Virtualization Security

Learn the Essentials of Virtualization Security Learn the Essentials of Virtualization Security by Dave Shackleford by Dave Shackleford This paper is the first in a series about the essential security issues arising from virtualization and the adoption

More information

The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements:

The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements: Compliance Brief The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements: Using Server Isolation and Encryption as a Regulatory Compliance Solution and IT Best Practice Introduction

More information

Secure your Virtual World with Cyberoam

Secure your Virtual World with Cyberoam White paper Secure your Virtual World with Cyberoam www.cyberoam.com Virtualization The Why and the What... Rising Data Center costs... Ever-increasing demand for data storage... Under-utilized processors...

More information

Virtualization Technology

Virtualization Technology Virtualization Technology A Manifold Arms Race Michael H. Warfield Senior Researcher and Analyst mhw@linux.vnet.ibm.com 2008 IBM Corporation Food for Thought Is Virtual Reality an oxymoron or is it the

More information

Desktop Virtualization. The back-end

Desktop Virtualization. The back-end Desktop Virtualization The back-end Will desktop virtualization really fit every user? Cost? Scalability? User Experience? Beyond VDI with FlexCast Mobile users Guest workers Office workers Remote workers

More information

Extending Microsoft Hyper-V with Advanced Automation and Management from Citrix

Extending Microsoft Hyper-V with Advanced Automation and Management from Citrix Extending Microsoft Hyper-V with Advanced Automation and Management from Citrix August 2009 Table of Contents Introducing Citrix Essentials for Hyper-V 3 Challenges of Server Virtualization 3 Components

More information

CA Cloud Overview Benefits of the Hyper-V Cloud

CA Cloud Overview Benefits of the Hyper-V Cloud Benefits of the Hyper-V Cloud For more information, please contact: Email: sales@canadianwebhosting.com Ph: 888-821-7888 Canadian Web Hosting (www.canadianwebhosting.com) is an independent company, hereinafter

More information

Security Auditing in a Virtual Environment

Security Auditing in a Virtual Environment Security Auditing in a Virtual Environment Security auditing considerations within a Virtual Environment Increasing and widespread use of the virtual platform can be seen as a direct response by enterprises

More information

VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE

VMware Security Briefing. Rob Randell, CISSP Senior Security Specialist SE VMware Security Briefing Rob Randell, CISSP Senior Security Specialist SE Agenda Security Advantages of Virtualization Security Concepts in Virtualization Architecture Operational Security Issues with

More information

SOURCEFIRE RNA (REAL-TIME NETWORK AWARENESS)

SOURCEFIRE RNA (REAL-TIME NETWORK AWARENESS) SOURCEFIRE RNA (REAL-TIME NETWORK AWARENESS) DEALING WITH DYNAMIC THREATS INTRODUCTION The Maginot Line is considered to be one of the greatest failures of military history. It is a line of fortifications,

More information

Evolution from the Traditional Data Center to Exalogic: An Operational Perspective

Evolution from the Traditional Data Center to Exalogic: An Operational Perspective An Oracle White Paper July, 2012 Evolution from the Traditional Data Center to Exalogic: 1 Disclaimer The following is intended to outline our general product capabilities. It is intended for information

More information

Citrix XenServer Industry-leading open source platform for cost-effective cloud, server and desktop virtualization. citrix.com

Citrix XenServer Industry-leading open source platform for cost-effective cloud, server and desktop virtualization. citrix.com Citrix XenServer Industry-leading open source platform for cost-effective cloud, server and desktop virtualization. 2 While the core server virtualization market has matured, virtualization itself is seeing

More information

Symantec Endpoint Protection 12.1.2

Symantec Endpoint Protection 12.1.2 Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high

More information

Securing Industrial Control Systems on a Virtual Platform

Securing Industrial Control Systems on a Virtual Platform Securing Industrial Control Systems on a Virtual Platform How to Best Protect the Vital Virtual Business Assets WHITE PAPER Sajid Nazir and Mark Lazarides sajid.nazir@firstco.uk.com 9 Feb, 2016 mark.lazarides@firstco.uk.com

More information

Best Practices for Managing Virtualized Environments

Best Practices for Managing Virtualized Environments WHITE PAPER Introduction... 2 Reduce Tool and Process Sprawl... 2 Control Virtual Server Sprawl... 3 Effectively Manage Network Stress... 4 Reliably Deliver Application Services... 5 Comprehensively Manage

More information

IBM Endpoint Manager for Core Protection

IBM Endpoint Manager for Core Protection IBM Endpoint Manager for Core Protection Device control and endpoint protection designed to guard against malware and loss of sensitive data Highlights Delivers real-time endpoint protection against viruses,

More information

Securing Virtual Applications and Servers

Securing Virtual Applications and Servers White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating

More information

Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY IN A HYBRID CLOUD ENVIRONMENT REV. 1.1

Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY IN A HYBRID CLOUD ENVIRONMENT REV. 1.1 sm Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY IN A HYBRID CLOUD ENVIRONMENT REV. 1.1 Open Data Center Alliance Usage: Virtual Machine (VM) Interoperability in a Hybrid Cloud

More information

A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions

A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions AMD DAS (DASH, AMD Virtualization (AMD-V ) Technology, and Security) 1.0 is a term used to describe the various

More information

Adaptive IPS Security in a changing world. Dave Venman Security Engineer, UK & Ireland

Adaptive IPS Security in a changing world. Dave Venman Security Engineer, UK & Ireland Adaptive IPS Security in a changing world Dave Venman Security Engineer, UK & Ireland 2 Who Is Sourcefire? Mission: To help customers manage increasing risks and regulations by providing the most effective,

More information

Lecture 2 Cloud Computing & Virtualization. Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu

Lecture 2 Cloud Computing & Virtualization. Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu Lecture 2 Cloud Computing & Virtualization Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu Outline Introduction to Virtualization The Major Approaches

More information

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has

More information

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.

More information

TechTarget Windows Media

TechTarget Windows Media TechTarget Windows Media SearchWinIT.com SearchExchange.com SearchSQLServer.com SearchEnterpriseDesktop.com SearchWindowsServer.com SearchDomino.com LabMice.net E-Guide Hyper-V: What you need to know before

More information

VMWARE VSPHERE 5.0 WITH ESXI AND VCENTER

VMWARE VSPHERE 5.0 WITH ESXI AND VCENTER VMWARE VSPHERE 5.0 WITH ESXI AND VCENTER CORPORATE COLLEGE SEMINAR SERIES Date: April 15-19 Presented by: Lone Star Corporate College Format: Location: Classroom instruction 8 a.m.-5 p.m. (five-day session)

More information

VDI Security for Better Protection and Performance

VDI Security for Better Protection and Performance VDI Security for Better Protection and Performance Addressing security and infrastructure challenges in your VDI deployments Trend Micro, Incorporated» See why you need security designed for VDI environments

More information

An overwhelming majority of IaaS clouds leverage virtualization for their foundation.

An overwhelming majority of IaaS clouds leverage virtualization for their foundation. 1 2 3 An overwhelming majority of IaaS clouds leverage virtualization for their foundation. 4 With the use of virtualization comes the use of a hypervisor. Normally, the hypervisor simply provisions resources

More information

Increase Utilization, Decrease Energy Costs With Data Center Virtualization

Increase Utilization, Decrease Energy Costs With Data Center Virtualization Increase Utilization, Decrease Energy Costs With Data Center Virtualization Produced by SearchDataCenter.com Presenter: Ron Priester Sponsored by Copyright 2008 HP. All Rights Reserved. Reproduction, adaptation,

More information

PARALLELS SERVER BARE METAL 5.0 README

PARALLELS SERVER BARE METAL 5.0 README PARALLELS SERVER BARE METAL 5.0 README 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information on the Parallels Server Bare Metal

More information

Secure Cloud-Ready Data Centers Juniper Networks

Secure Cloud-Ready Data Centers Juniper Networks Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

Virtualization. Dr. Yingwu Zhu

Virtualization. Dr. Yingwu Zhu Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the

More information

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server

More information

FISMA / NIST 800-53 REVISION 3 COMPLIANCE

FISMA / NIST 800-53 REVISION 3 COMPLIANCE Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security

More information

Virtual Desktop Infrastructure

Virtual Desktop Infrastructure Virtual Desktop Infrastructure Improved manageability and availability spur move to virtualize desktops Many companies have turned to virtualization technologies for their servers and in their data centers

More information

Lecture 02b Cloud Computing II

Lecture 02b Cloud Computing II Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,

More information

Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.

Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Keywords: virtualization, virtual machine, security. 1. Virtualization The rapid growth of technologies, nowadays,

More information

Virtualization and the U2 Databases

Virtualization and the U2 Databases Virtualization and the U2 Databases Brian Kupzyk Senior Technical Support Engineer for Rocket U2 Nik Kesic Lead Technical Support for Rocket U2 Opening Procedure Orange arrow allows you to manipulate the

More information

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex

More information

Hypervisor Competitive Differences: Beyond the Data Sheet. Chris Wolf Senior Analyst, Burton Group

Hypervisor Competitive Differences: Beyond the Data Sheet. Chris Wolf Senior Analyst, Burton Group Hypervisor Competitive Differences: Beyond the Data Sheet Chris Wolf Senior Analyst, Burton Group Agenda Project background Evaluation criteria Vendor scorecards Project Background Three month Burton Group

More information

Effective End-to-End Cloud Security

Effective End-to-End Cloud Security Effective End-to-End Cloud Security Securing Your Journey to the Cloud Trend Micro SecureCloud A Trend Micro & VMware White Paper August 2011 I. EXECUTIVE SUMMARY This is the first paper of a series of

More information

Solution Guide Parallels Virtualization for Linux

Solution Guide Parallels Virtualization for Linux Solution Guide Parallels Virtualization for Linux Overview Created in 1991, Linux was designed to be UNIX-compatible software that was composed entirely of open source or free software components. Linux

More information

Unisys ClearPath Forward Fabric Based Platform to Power the Weather Enterprise

Unisys ClearPath Forward Fabric Based Platform to Power the Weather Enterprise Unisys ClearPath Forward Fabric Based Platform to Power the Weather Enterprise Introducing Unisys All in One software based weather platform designed to reduce server space, streamline operations, consolidate

More information

Virtualization and Cloud Computing

Virtualization and Cloud Computing Virtualization and Cloud Computing Security is a Process, not a Product Guillermo Macias CIP Security Auditor, Sr. Virtualization Purpose of Presentation: To inform entities about the importance of assessing

More information

VMware vsphere 5.1 Advanced Administration

VMware vsphere 5.1 Advanced Administration Course ID VMW200 VMware vsphere 5.1 Advanced Administration Course Description This powerful 5-day 10hr/day class is an intensive introduction to VMware vsphere 5.0 including VMware ESX 5.0 and vcenter.

More information

Remote PC Guide Series - Volume 1

Remote PC Guide Series - Volume 1 Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts

More information

New Security Perspective for Virtualized Platforms

New Security Perspective for Virtualized Platforms , July 3-5, 2013, London, U.K. New Security Perspective for Virtualized Platforms Abdelmajid Lakbabi, Said El hajji, Ghizlane Orhanou, Kaouthar Chetioui Abstract Recently, an important transition in IT

More information

VMware vsphere 5.0 Boot Camp

VMware vsphere 5.0 Boot Camp VMware vsphere 5.0 Boot Camp This powerful 5-day 10hr/day class is an intensive introduction to VMware vsphere 5.0 including VMware ESX 5.0 and vcenter. Assuming no prior virtualization experience, this

More information

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection

More information

Parallels Virtuozzo Containers

Parallels Virtuozzo Containers Parallels Virtuozzo Containers White Paper Top Ten Considerations For Choosing A Server Virtualization Technology www.parallels.com Version 1.0 Table of Contents Introduction... 3 Technology Overview...

More information

PICO Compliance Audit - A Quick Guide to Virtualization

PICO Compliance Audit - A Quick Guide to Virtualization WHITE PAPER August 2011 Passing Compliance Audit: Virtualize PCI-compliant Workloads with the Help of HyTrust and Trend Micro Deep Security HYTRUST AND TREND MICRO DEEP SECURITY TOC Contents Virtualization

More information

Symantec Endpoint Protection 12.1.4

Symantec Endpoint Protection 12.1.4 Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec

More information

Virtual Desktop Infrastructure Planning Overview

Virtual Desktop Infrastructure Planning Overview WHITEPAPER Virtual Desktop Infrastructure Planning Overview Contents What is Virtual Desktop Infrastructure?...2 Physical Corporate PCs. Where s the Beef?...3 The Benefits of VDI...4 Planning for VDI...5

More information

How To Manage A System Vulnerability Management Program

How To Manage A System Vulnerability Management Program System Vulnerability Management Definitions White Paper October 12, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that allows

More information

Data Center Manager (DCM)

Data Center Manager (DCM) DATA SHEET Data Center Manager (DCM) Unified Virtual/Physical Data Center Fabric Management Benefits LOWER OPERATIONAL COSTS High degree of automation within physical and virtual environments to streamline

More information

ALTERNATIVES FOR SECURING VIRTUAL NETWORKS

ALTERNATIVES FOR SECURING VIRTUAL NETWORKS White Paper ALTERNATIVES FOR SECURING VIRTUAL NETWORKS A Different Network Requires a Different Approach Extending Security to the Virtual World Copyright 2013, Juniper Networks, Inc. 1 Table of Contents

More information

9/26/2011. What is Virtualization? What are the different types of virtualization.

9/26/2011. What is Virtualization? What are the different types of virtualization. CSE 501 Monday, September 26, 2011 Kevin Cleary kpcleary@buffalo.edu What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,

More information

Implementing and Managing Windows Server 2008 Hyper-V

Implementing and Managing Windows Server 2008 Hyper-V Course 6422A: Implementing and Managing Windows Server 2008 Hyper-V Length: 3 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology: Windows Server 2008 Type: Course Delivery Method:

More information

Parallels Server 4 Bare Metal

Parallels Server 4 Bare Metal Parallels Server 4 Bare Metal Product Summary 1/21/2010 Company Overview Parallels is a worldwide leader in virtualization and automation software that optimizes computing for services providers, businesses

More information

Server virtualization overview

Server virtualization overview overview Virtualization within the IT environment helps you make more efficient use of existing software and hardware resources. You can use popular virtualization software to create VMs (virtual machines)

More information

HP Data Protector software. Assuring Business Continuity in Virtualised Environments

HP Data Protector software. Assuring Business Continuity in Virtualised Environments HP Data Protector software Assuring Business Continuity in Virtualised Environments Would not it be great if your virtual server environment actually translated to a better reality? One where you could

More information

How To Manage Sourcefire From A Command Console

How To Manage Sourcefire From A Command Console Sourcefire TM Sourcefire Capabilities Store up to 100,000,000 security & host events, including packet data Centralized policy & sensor management Centralized audit logging of configuration & security

More information

virtualization.info Review Center SWsoft Virtuozzo 3.5.1 (for Windows) // 02.26.06

virtualization.info Review Center SWsoft Virtuozzo 3.5.1 (for Windows) // 02.26.06 virtualization.info Review Center SWsoft Virtuozzo 3.5.1 (for Windows) // 02.26.06 SWsoft Virtuozzo 3.5.1 (for Windows) Review 2 Summary 0. Introduction 1. Installation 2. VPSs creation and modification

More information

Symantec NetBackup 7.1 What s New and Version Comparison Matrix

Symantec NetBackup 7.1 What s New and Version Comparison Matrix Symantec 7.1 What s New and Version Comparison Matrix Symantec 7 allows customers to standardize backup and recovery operations across physical and virtual environments with fewer resources and less risk

More information

Does your Citrix or Terminal Server environment have an Achilles heel?

Does your Citrix or Terminal Server environment have an Achilles heel? CRYPTZONE WHITE PAPER Does your Citrix or Terminal Server environment have an Achilles heel? Moving away from IP-centric to role-based access controls to secure Citrix and Terminal Server user access cryptzone.com

More information

VMware Virtual Infrastucture From the Virtualized to the Automated Data Center

VMware Virtual Infrastucture From the Virtualized to the Automated Data Center VMware Virtual Infrastucture From the Virtualized to the Automated Data Center Senior System Engineer VMware Inc. ngalante@vmware.com Agenda Vision VMware Enables Datacenter Automation VMware Solutions

More information