Virtualization: Security Tipping Point?
Results 1 to 2 of 2

Thread: Virtualization: Security Tipping Point?

  1. #1
    Senior Member phernandez's Avatar
    Join Date
    Aug 2003
    Location
    NYC
    Posts
    246

    Virtualization: Security Tipping Point?

    Does virtualization's new high profile warrant security worries?

    Are VM Environments Open to Attack? - LinuxInsider

    The mobility of virtual environments can also create a security quagmire. Virtual machines can "walk off": Since their containers can be downloaded to desktops and put on a memory stick, on which they can then leave the physical security perimeter.

    "Virtualization can be implemented and systems can be as secure as if they were running in an environment natively, Eric Mandel, CEO of managed hosting services firm BlackMesh, told LinuxInsider. "The idea behind using virtualization is to carve out multiple system [images] on one physical machine. The same security concepts apply to the virtual images as they do to a native system, with the exception that the owning system has to be locked down as well. There are always security risks that have to be considered in any environment."
    And that's just one example...

  2. #2
    Member
    Join Date
    May 2002
    Posts
    93
    When most of the 'experts' talk about security, they focus on the hack, the vulnerable system, the workarounds. These are all very important fields of view when talking about virtualization (instance escape being a hot topic now).

    But I like to look at the business continuity side as much as the technical. Everyone loves the idea of virtualization because there is a cost savings. Admins and developers take this cost savings a bit further, hitting up the lowest bidder for the hardware. Cheaper hardware is now being taxed because of the multiple functions it's performing. Next thing you know, raid arrays are failing and instead of losing one machine/capability, you're now losing 20.
    Tachyon

    |-----|Alcohol is my anti-drug |-----|

Similar Threads

  1. Autopsy of a successful intrusion
    By gore in forum Miscellaneous Security Discussions
    Replies: 11
    Last Post: June 13th, 2006, 04:06 AM
  2. Security Policy Model Creation for a Networked World
    By tenzenryu in forum The Security Tutorials Forum
    Replies: 11
    Last Post: November 4th, 2005, 06:10 PM
  3. Tips
    By XTC46 in forum Site Feedback/Questions/Suggestions
    Replies: 15
    Last Post: August 24th, 2005, 07:52 PM
  4. Pros point to flaws in Windows security update
    By SDK in forum Microsoft Security Discussions
    Replies: 21
    Last Post: August 20th, 2004, 01:12 PM
  5. 30 security holes in Oracle
    By SDK in forum Miscellaneous Security Discussions
    Replies: 1
    Last Post: August 5th, 2004, 06:13 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides