Advertisment

Virtualisation can open security bolts

author-image
CIOL Bureau
Updated On
New Update

PUNE, INDIA: Few understand the security implications of the disruptive innovation called virtualization. The rapid adoption of virtualization technology has created multiple benefits for IT organizations.

Advertisment

Advantages such as the reduction of cost through more efficient resource utilization are obvious; however, these benefits can quickly be negated if virtualization opens a door to a major security incident, points out a report by Research&Markets an international market research organization.

In this study, EMA provides guidance for IT practitioners seeking to secure their virtual environments as it suggests a five-phase approach to virtualization taking an initial look at virtualization threats and vulnerabilities, and considers the security benefits of virtualization.

Market insight from EMA's 2008 virtualization survey of over 600 enterprises takes a sampling of the steps organizations are-and are not-taking today to secure virtual environments.

Advertisment

Until virtualized security measures mature, this report focuses on what enterprises can do today to secure virtualization and seize the unique opportunity to integrate security early in the adoption of this game-changing technology-before it's too late.

The recommended measures revolve around infrastructure consolidation strategy and design, administrative process management, network strategy and design in extending the layered security model, configuration management, and risk assessment.

It suggests a phased strategy to address security gaps through Infrastructure Consolidation Strategy and Design, Network Strategy and Design in Extending the Layered Security Model, defining administrative processes and managing administration risks, proactive security in operations etc.

Also in spotlight for virtualized environments, are issues like Vulnerabilities in virtualization Planning and Design, Vulnerabilities in Operational Deployment, Configuration Issues, Virtualization Sprawl, Administrative Errors etc.