Editorial: Putting virtual security on the table

In the first of ARN’s Market Guide series for the New Year, we’ve tackled two of the hottest IT topics around: Security and virtualisation.

Virtualisation has come a long way in the last few years, initially taking over server platforms and now driving into storage, applications, networks and the desktop. As virtual environments become commonplace in all facets of computing and the datacentre, industry advisors are urging channel players to be alert to securing them.

The argument is two-fold: On the one hand, a virtual infrastructure faces the same security risks as a physical one. These range from individuals abusing access and privileges internally through to Web-based security threats, malware, viruses and data violations. In addition, implementing virtualisation technology alters a customer’s broader IT architecture, potentially leaving it vulnerable to all sorts of nasties. On the flip side, virtualisation has its own set of security issues which need to be addressed, such as protecting the hypervisor, or host, layer. Virtual server sprawl is another area where security practices can lapse and breaches occur.

In this guide on securing virtual environments, we look at ways to ensure you don’t expose customers to risk. Key tips include undertaking a fresh analysis of an organisation’s overall security set-up, as well as ensuring best practices across virtual deployments.

At a broader level, the economic slowdown is also expected to change how customers perceive their IT infrastructure. As more and more organisations look to save money, the temptation to cut spending on anything not deemed “critical” will be significant. Integrators and service providers will need to make sure customers don’t implement virtualisation to the detriment of security.

Alongside our tips and tricks on securing different virtual environments, we’ve included a case study on how local integrator, Sonnet, assisted one digital media company to improve its IT infrastructure and customer coverage using a secure virtualisation platform.

We’ve also listed a range of products aimed at securing physical and non-physical IT scenarios.

2014 ARN Women in ICT Awards - Nominations close October 27!: Nominations have opened for WIICTA 2014 and will stay open until October 27. But don't be late, be among the first in and NOMINATE NOW!!!

More about ARNSonnet Corporation

Comments

Comments are now closed

 
Computerworld
CIO
Techworld
CMO

Latest News

02:05PM
20th Century Fox deploys HP Moonshot servers
01:27PM
Adobe begins encrypting user data collected from Digital Editions app
12:17PM
St George turns on fingerprint login for Apple iOS Internet banking
12:01PM
DDoS attacks skyrocket: Akamai State of Internet Report
More News
29 Oct
NewLease & Microsoft Technical Sessions
30 Oct
Ovum 2020 Telecoms Summit
30 Oct
NewLease & Microsoft Technical Sessions
05 Nov
vForum 2014
View all events