Network virtualization security: Best practices

Network virtualization security is a vital part of an enterprise's overall network security system. These tips identify the challenges faced by value-added resellers (VARs) attempting to create bulletproof virtual machine networks.

Virtualization offers many benefits and may be an easy sell to customers, but like all technologies, it's not without

security implications. Value-added resellers (VARs) and systems integrators should educate customers on virtualization security and be prepared to mitigate risks introduced to customers' networks.

 

Virtualization security benefits and drawbacks
Historically, organizations have fallen into the trap of thinking about security implications after they deploy new technology. Virtualization offers so many compelling benefits that it's often an easy sell into IT architectures. But what about the security implications of using virtualization? In this tip, I'll present information about the security-related pros and cons of using virtualization technology. The goal is to give you an overview of the different types of concerns you should have in mind...

Read more about computer security issues and virtual machines.


Improving VM security: Best practices
While there are similarities between bulletproofing the security of physical and virtual machines (VMs), there are some fundamental differences -- such as updating processes -- that can catch IT managers off guard. These best practices for managing security for virtualization can help you shield your VMs from evildoers and users' security blunders...

Discover how managing network permissions is essential to securing virtual machines .


About the author
Anil Desai has managed data center environments that support thousands of virtual machines. He is an MCSE, MCSD, MCDBA and a Microsoft MVP (Windows Server -- Management Infrastructure). Anil has authored numerous books focusing on the Windows Server Platform, virtualization, Active Directory, SQL Server and IT management. Most recently, he has written
The Rational Guide to Managing Microsoft Virtual Server and The Rational Guide to Scripting Microsoft Virtual Server.


 

This was first published in June 2007

Dig deeper on Application security and data protection

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

MicroscopeUK

SearchCloudProvider

SearchSecurity

SearchStorage

SearchNetworking

SearchCloudComputing

SearchConsumerization

SearchDataManagement

SearchBusinessAnalytics

Close