Manage Learn to apply best practices and optimize your operations.

Network virtualization security: Best practices

Network virtualization security is a vital part of an enterprise's overall network security system. These tips identify the challenges faced by value-added resellers (VARs) attempting to create bulletproof virtual machine networks.

Virtualization offers many benefits and may be an easy sell to customers, but like all technologies, it's not without security implications. Value-added resellers (VARs) and systems integrators should educate customers on virtualization security and be prepared to mitigate risks introduced to customers' networks.


Virtualization security benefits and drawbacks
Historically, organizations have fallen into the trap of thinking about security implications after they deploy new technology. Virtualization offers so many compelling benefits that it's often an easy sell into IT architectures. But what about the security implications of using virtualization? In this tip, I'll present information about the security-related pros and cons of using virtualization technology. The goal is to give you an overview of the different types of concerns you should have in mind...

Read more about computer security issues and virtual machines.

Improving VM security: Best practices
While there are similarities between bulletproofing the security of physical and virtual machines (VMs), there are some fundamental differences -- such as updating processes -- that can catch IT managers off guard. These best practices for managing security for virtualization can help you shield your VMs from evildoers and users' security blunders...

Discover how managing network permissions is essential to securing virtual machines .

About the author
Anil Desai has managed data center environments that support thousands of virtual machines. He is an MCSE, MCSD, MCDBA and a Microsoft MVP (Windows Server -- Management Infrastructure). Anil has authored numerous books focusing on the Windows Server Platform, virtualization, Active Directory, SQL Server and IT management. Most recently, he has written
The Rational Guide to Managing Microsoft Virtual Server and The Rational Guide to Scripting Microsoft Virtual Server.


Dig Deeper on Managed network security services

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.