The wave of hype around server virtualization technology has already receded as solution providers and their customers bury their heads in their SANs and work with mature and maturing technologies ...
In surveys of senior-level IT managers, security is consistently one of the top five concerns, along, specifically, with security related to the hot technology of the moment. Most recently those ...
When it comes to sampling innovative technology, Schwan Foods, a multibillion-dollar frozen food producer, digs right in. How to seed security into the cloud The Marshall, Minn., company became an ...
On the surface, security questions surrounding virtual servers don’t seem much different than those for the physical machines on which they run. In fact, starting a virtual security audit by keeping ...
From virtual rootkit "aka Blue Pill" attacks to attacks that make it possible to break out of a virtual machine's operating system to the underlying server OS -- there's been plenty of talk about ...
Adding fuel to the hype is that fact that many IT organizations say they prioritized operational speed over most other factors, including security planning, when they started creating hundreds of new ...
Blue Lane Technologies, a VMware Technology Alliance Partner, announced the immediate availability of VirtualShield, a software based vulnerability shield that is designed to provide instant ...
The US National Security Agency (NSA) has published guidance on how to properly secure IP Security (IPsec) Virtual Private Networks (VPNs) against potential attacks. Besides providing organizations ...
Malicious hypervisors. Subversive virtual machines. Live migration impersonators. Welcome to the world of server virtualization, where the threats are new and the traditional security tools like ...
Virtual environments have as many security risks as their physical counterparts. Users need to take security into consideration throughout their design process. Dave Rosenberg has more than 15 years ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results