The Wayback Machine - https://web.archive.org/web/20120508004537/http://cloudcomputing.sys-con.com/node/2266814

Welcome!

Cloud Expo Authors: Tim Crawford, Pat Romanski, Liz McMillan, Maureen O'Gara, Elizabeth White

Related Topics: Virtualization, Search, Cloud Expo, Security

Virtualization: Blog Feed Post

Five Security Principles for Virtualized Environments

Virtualization has created a much more efficient environment for our technology, but raised some new types of security risks

Over the past decade, we’ve become much more robust in our approach to information security. We recognize that our company’s largest vulnerabilities have to do with its computer systems, and that data security is at the core of loss prevention, disaster recovery, and even normal operations.

Virtualization has created a much more efficient environment for our technology, but it’s also raised some new types of security risks. If you’re going to keep business running as usual and keep it secure, you need to know how to mitigate some of these risks.

Here are some things to keep in mind when considering security and your virtualized environment:

  1. Virtualization is not, in itself, necessarily insecure. It’s not the virtualization technology that creates risk; rather, it’s the way that virtualized applications and workloads are being implemented and deployed that creates the problem.
  2. Security should be part of the discussion from the beginning. According to one Garter survey, as many as 40% of virtualization projects didn’t look at the involvement of the security team until after the initial planning and design stages were well underway, or even complete.
  3. The hypervisor is the area of the most potential risk. The hypervisor has the ability to oversee multiple workloads on a single physical server. In the past, a threat that occurred to one physical server only threatened one workload. Now, a threat to one physical server threatens many workloads.
  4. Workloads should be consolidated in line with trust levels. Whenever possible, you want to build a security architecture that is able to address both physical and virtual environments with the same security policies and reporting.
  5. Even simple security issues like antivirus scheduling are part of the virtualization discussion. For example, if you simply accept the default scanning times for server instances, you might have a number of virtual servers all decide to scan for viruses at the same time and wind up with a significant overload on the physical machine.

Virtualization providers are well aware of the kinds of implications that the technology has on security, and as time goes on they’re providing more and better tools to handle these complex concerns.

Read the original blog entry...

More Stories By Unitiv Blog

Unitiv, Inc., is a professional provider of enterprise IT solutions. Unitiv delivers its services from its headquarters in Alpharetta, Georgia, USA, and its regional office in Iselin, New Jersey, USA. Unitiv provides a strategic approach to its service delivery, focusing on three core components: People, Products, and Processes. The People to advise and support customers. The Products to design and build solutions. The Processes to govern and manage post-implementation operations.

Cloud Expo Breaking News
SYS-CON Events announced today that ComputeNext Inc. will exhibit at SYS-CON's 10th International Cloud Expo, which will take place on June 11–14, 2012, at the Javits Center in New York City, New York. What’s the scope of your “single pane of glass”? If you’re a cloud architect wouldn’t you be better suited with a telescope than a magnifying glass? The ComputeNext marketplace and workload manager sprawls across public clouds, eliminating vendor and platform lock-in. A single point of payment a...
In this CEO Power Panel at the 10th International Cloud Expo, moderated by Cloud Expo Conference Chair Jeremy Geelan, leading executives in the Cloud Computing and Big Data space will be discussing such topics as: Is it just wishful thinking to depict the Cloud as more than just a technology solution? If not, then what concrete examples best demonstrate cloud computing as an engine of business value? Big Data has existed since the early days of computing; why, then, do you think there is such...
“One of the greatest challenges to security in the cloud is management,” noted David Meizlik, Vice President of Marketing at Dome9 Security, in this exclusive Q&A; with Cloud Expo Conference Chair Jeremy Geelan. “With cloud computing,” Meizlik explained, “the infrastructure is owned and maintained by a third party, so you can’t just walk down the hall to get to your infrastructure.” Cloud computing represents the advent of a global computing utility that transcends national boundaries. Is that w...
With Cloud Expo 2012 New York (10th Cloud Expo) now five weeks away, what better time to introduce you in greater detail to the distinguished individuals in our incredible Speaker Faculty for the technical and strategy sessions at the conference...
Information Security and Risk has become a top concern of IT organizations and consumers alike. Concern about inadequate Info Security remains the #1 obstacle to greater adoption of Cloud Computing, according to Intel’s research. The rapid growth of Mobile and IP-connected Embedded devices, Cloud Computing, Social Networks, and “Consumerization of IT” is being met with, and in some cases contributing to, an escalating number and complexity of Cyber-threats. Tenants of the cloud need the ability ...
With Cloud Expo 2012 New York (10th Cloud Expo) now five weeks away, what better time to introduce you in greater detail to the distinguished individuals in our incredible Speaker Faculty for the technical and strategy sessions at the conference... We have technical and strategy sessions for you every day from June 11 through June 14 dealing with every nook and cranny of Cloud Computing and Big Data, but what of those who are presenting? Who are they, where do they work, what else have they w...
The average business in 2012 will double its amount of data, with more than half of that increase occurring within the cloud. Aggregation of data is no longer the competitive lever in itself, but rather the distribution and commercialization of data across multiple platforms. In his session at the 10th International Cloud Expo, Drew Bartkiewicz, VP Strategy at Mashery and a data economist, will analyze the massive intersection of Big Data Economics and Managed APIs as a way for Cloud and Mobil...
What are the legal implications and consequences of cloud computing in the healthcare and high-tech sectors? What are the potential legal protections and solutions from the point of view of providers, suppliers and consumers? In his session at the 10th International Cloud Expo, Paul Rubell, a Partner at Meltzer Lippe, will discuss the federal mandates that will encourage “meaningful use” of EHR technology by 2015, and what those mandates will require executives to understand about cloud comput...
The elastic resources offered by cloud computing have created an exciting opportunity for applications to handle very large workloads. However, writing applications that span an elastic pool of virtual servers creates huge challenges for developers. How can these virtual servers easily and efficiently share application data while avoiding scaliability bottlenecks? The answer lies in using in-memory data grids (IMDGs) to provide a powerful, easy-to-use, and highly scalable storage layer. IMDGs ...
With Cloud Expo 2012 New York (10th Cloud Expo) now five weeks away, what better time to introduce you in greater detail to the distinguished individuals in our incredible Speaker Faculty for the technical and strategy sessions at the conference... We have technical and strategy sessions for you every day from June 11 through June 14 dealing with every nook and cranny of Cloud Computing and Big Data, but what of those who are presenting? Who are they, where do they work, what else have they w...