Security virtualization News
August 22, 2017
Based on VMware's session catalog, VMware on AWS is set to be the star of VMworld 2017, but we could be in for a few surprises. Our Advisory Board shares its thoughts.
June 21, 2017
The parent company of Terminix and Merry Maids blended security with its app development pipeline as part of its DevOps transformation.
November 08, 2016
In this blog roundup, networking bloggers discuss changes in OpenSwitch architecture, SD-WAN's advantages and disadvantages, and the latest container security project.
August 07, 2015
Video: KPMG's Ronald Plesco discusses the main emerging security trends -- security analytics, the Internet of Things and virtualization -- and what else is on the horizon for the industry.
Security virtualization Get Started
Bring yourself up to speed with our introductory content
Windows 10 Isolated User Mode (IUM) is a virtualization-based security feature in Windows 10 that uses secure kernels to keep business data and processes separate from the underlying OS. Continue Reading
Risks abound, and no amount of preparation or caution will eliminate them entirely from our lives. This is as true now as it was in the past, and it likely will remain true in the future.
While technology enables us all to work more effectively and productively, the necessity of managing IT risk remains. Risk follows wherever we go -- from the data center to the cloud, from virtualized workloads to containers. Smart IT organizations are continuously assessing threats and then devising ways to minimize them. That's the goal, at least.
This issue of Modern Infrastructure examines some of the current approaches to managing IT risk, from maintaining security to handling costs.
In our cover story, TechTarget's Beth Pariseau writes about the particular challenges of container security. IT shops have been reluctant to put containers in production in large part because of the uncertainty about how secure they might be. Updates from Docker and more disciplined app development practices are making containers less risky, Pariseau writes. And there's reason to think that containers could be even more secure than VMs.
Getting comfortable with containers is a process not unlike how technology professionals learned how to safely use cloud services. It takes some time and effort, but managing IT risk can bring exciting and powerful new tools safely into the fold.Continue Reading
Most virtualization security tools still follow dedicated agent models, but some technologies are starting to offload resources to a dedicated VM and leverage hypervisor APIs. Continue Reading
Evaluate Security virtualization Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Put your knowledge of virtualization-based security in Windows 10 on the line with this quiz covering the ins and outs of features such as Isolated User Mode and Device Guard. Continue Reading
When it comes to fighting and protecting against ransomware, there are some major features of virtual disaster recovery that top physical environments. Continue Reading
Container isolation doesn't cut it in production. Instead, beef up security from the infrastructure to the application code, and be prepared to use some new tools to do it. Continue Reading
Manage Security virtualization
Learn to apply best practices and optimize your operations.
Prioritize security across your organization, and establish policies that employ best practices, like least-privilege tactics, security audits and update and patch automation. Continue Reading
Before implementing virtualization in your data center, assess all of its potential risks -- from system outages to cyberattacks -- and how to manage them. Continue Reading
With all the features in Windows 10 it's easy to lose track of a few. Test your knowledge of these overlooked features, including a virtualization-based security tool. Continue Reading
Problem Solve Security virtualization Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
It's possible for hackers to use a malicious hypervisor to access data on virtual machines. Expert Ed Moyle discusses how this works and the potential threat it poses. Continue Reading
In an increasingly virtualized world, there's always the risk of falling prey to a cyberattack. The best way to prevent an attack is to have a solid security plan in place. Continue Reading
Both containers and VMs offer different ways of meeting an organization's application deployment requirements. And virtualization containers present different security challenges than VMs. Continue Reading