• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Virtualization Can Hurt Security, Gartner Says

    April 16, 2007 Alex Woodie

    Thousands of companies are adopting virtualization to increase the utilization rates of their servers and save money. But unless these companies take pains to properly secure their virtualized IT environments, it can end up hurting their security posture, reducing their agility, and increasing costs, Gartner warned last week.

    While there is a lack of uniformity and standards among virtualization technologies, there is one aspect that all virtualization products have in common, according to Gartner: They create a privileged layer that, if compromised, puts all consolidated workloads at risk. With so many eggs in one basket, it’s even more important to implement good security practices to protect critical data and applications.

    Unfortunately, most companies won’t take these extra steps to implement strong security for virtualized environments, Gartner says, and this will have a predictable effect. The analyst group says 60 percent of production virtual machines (VMs) implemented through 2009 will be less secure than their physical counterparts.

    “Many organizations mistakenly assume that their approach for securing VMs will be the same as securing any OS and thus plan to apply their existing configuration guidelines, standards and tools,” says Neil MacDonald, vice president and Gartner Fellow. “While this is a start, simply applying the technologies and best practices for securing physical servers won’t provide sufficient protections for VMs.”

    But don’t fret: Gartner says there are several steps that companies can take to start securing their VMs. Companies must protect their new weakest link–the hypervisor. They must be prepared to deal with the loss of separation of duties for administrative tasks. They must take pains to ensure the proper patching and signature support for VM and VM appliance images. They must somehow work around the decreased visibility into the host operating system and its network connections, as well as into intra-VM traffic, which needs to be inspected by security software. Companies must also be ready to implement security policies that can cope with VMs that are mobile. Lastly, IT professionals will have to get creative, because the security and management tools to accomplish many of these tasks in VM environments are “immature and incomplete,” Gartner says.

    “Organizations need to pressure security and virtualization vendors to plug the major security gaps,” MacDonald says. “Existing virtualization solutions address some of the gaps, but not all. It will take several years for the tools and vendors to evolve, as well as organizations to mature their processes and staff skills.”

    MacDonald will present more information on the security threats posed by virtualization technologies in a session titled “Securing Virtualization, Virtualizing Security,” during the Gartner Symposium/ITxpo 2007: Emerging Trends event, which is being held in two weeks in San Francisco.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 16, Number 15 -- April 16, 2007

    Sponsored by
    WorksRight Software

    Do you need area code information?
    Do you need ZIP Code information?
    Do you need ZIP+4 information?
    Do you need city name information?
    Do you need county information?
    Do you need a nearest dealer locator system?

    We can HELP! We have affordable AS/400 software and data to do all of the above. Whether you need a simple city name retrieval system or a sophisticated CASS postal coding system, we have it for you!

    The ZIP/CITY system is based on 5-digit ZIP Codes. You can retrieve city names, state names, county names, area codes, time zones, latitude, longitude, and more just by knowing the ZIP Code. We supply information on all the latest area code changes. A nearest dealer locator function is also included. ZIP/CITY includes software, data, monthly updates, and unlimited support. The cost is $495 per year.

    PER/ZIP4 is a sophisticated CASS certified postal coding system for assigning ZIP Codes, ZIP+4, carrier route, and delivery point codes. PER/ZIP4 also provides county names and FIPS codes. PER/ZIP4 can be used interactively, in batch, and with callable programs. PER/ZIP4 includes software, data, monthly updates, and unlimited support. The cost is $3,900 for the first year, and $1,950 for renewal.

    Just call us and we’ll arrange for 30 days FREE use of either ZIP/CITY or PER/ZIP4.

    WorksRight Software, Inc.
    Phone: 601-856-8337
    Fax: 601-856-9432
    Email: software@worksright.com
    Website: www.worksright.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Admin Alert: The Process and Pitfalls of Duplicating Libraries Oracle Declares a ‘Renaissance’ for J.D. Edwards World

    Leave a Reply Cancel reply

TFH Volume: 16 Issue: 15

This Issue Sponsored By

    Table of Contents

    • IBM Executives’ iSociety Chat: Direct Sales and a Developer Price Point
    • Massive $74 Billion Consolidation in the ERP Space
    • IBM Goes After Windows with User-Priced System i Servers
    • Lawson Sees Red Ink In Fiscal Third Quarter
    • IBM Upgrades High-End System i5 Servers
    • Vendors Propose Fibre Channel Over Ethernet Standard
    • Wheeling and Dealing to Move System i Iron
    • New 36 GB, 4mm Tape Drive Fills In the VXA Gap for i5 Servers
    • System i and the Web: Where We’ve Been and Where We’re Going
    • Virtualization Can Hurt Security, Gartner Says

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • Guild Mortgage Takes The 20-Year Option For Modernization
    • IBM i Licensing, Part 3: Can The Hardware Bundle Be Cheaper Than A Smartphone?
    • Guru: The Finer Points of Exit Points
    • Big Blue Tweaks IBM i Pricing Ahead Of Subscription Model
    • We Still Want IBM i On The Impending Power E1050
    • DRV Brings More Automation to IBM i Message Monitoring
    • Managed Cloud Saves Money By Cutting System And People Overprovisioning
    • Multiple Security Vulnerabilities Patched on IBM i
    • Four Hundred Monitor, June 22
    • IBM i PTF Guide, Volume 24, Number 25

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2022 IT Jungle

    loading Cancel
    Post was not sent - check your email addresses!
    Email check failed, please try again
    Sorry, your blog cannot share posts by email.