What's more, the technologies, best practices, and strategies used for securing physical environments do not provide sufficient protection for virtual environments.
Virtualization Security includes step-by-step configurations for the security controls that come with the three leading hypervisor--VMware vSphere and ESXi, Microsoft Hyper-V on Windows Server 2008, and Citrix XenServer.
- Includes strategy for securely implementing network policies and integrating virtual networks into the existing physical infrastructure
- Discusses vSphere and Hyper-V native virtual switches as well as the Cisco Nexus 1000v and Open vSwitch switches
- Offers effective practices for securing virtual machines without creating additional operational overhead for administrators
- Contains methods for integrating virtualization into existing workflows and creating new policies and processes for change and configuration management so that virtualization can help make these critical operations processes more effective.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.