Editorial: Putting virtual security on the table

In the first of ARN’s Market Guide series for the New Year, we’ve tackled two of the hottest IT topics around: Security and virtualisation.

Virtualisation has come a long way in the last few years, initially taking over server platforms and now driving into storage, applications, networks and the desktop. As virtual environments become commonplace in all facets of computing and the datacentre, industry advisors are urging channel players to be alert to securing them.

The argument is two-fold: On the one hand, a virtual infrastructure faces the same security risks as a physical one. These range from individuals abusing access and privileges internally through to Web-based security threats, malware, viruses and data violations. In addition, implementing virtualisation technology alters a customer’s broader IT architecture, potentially leaving it vulnerable to all sorts of nasties. On the flip side, virtualisation has its own set of security issues which need to be addressed, such as protecting the hypervisor, or host, layer. Virtual server sprawl is another area where security practices can lapse and breaches occur.

In this guide on securing virtual environments, we look at ways to ensure you don’t expose customers to risk. Key tips include undertaking a fresh analysis of an organisation’s overall security set-up, as well as ensuring best practices across virtual deployments.

At a broader level, the economic slowdown is also expected to change how customers perceive their IT infrastructure. As more and more organisations look to save money, the temptation to cut spending on anything not deemed “critical” will be significant. Integrators and service providers will need to make sure customers don’t implement virtualisation to the detriment of security.

Alongside our tips and tricks on securing different virtual environments, we’ve included a case study on how local integrator, Sonnet, assisted one digital media company to improve its IT infrastructure and customer coverage using a secure virtualisation platform.

We’ve also listed a range of products aimed at securing physical and non-physical IT scenarios.

2014 ARN Women in ICT Awards - Nominate Now!: Nominations have opened for WIICTA 2014 and will stay open until October 22. But don't be late, be among the first in and NOMINATE NOW!!!

More about ARNSonnet Corporation

Comments

Comments are now closed

 

Latest News

02:07PM
Avnet clinches Lenovo global distribution deal
01:46PM
Steve Wozniak to teach at UTS
11:19AM
Apple's Yosemite OS shares Spotlight search terms by default
11:01AM
NewLease's emerging markets expansion to be led by former Microsoft executive
More News
21 Oct
NewLease & Red Hat Breakfast Briefing (Melbourne)
21 Oct
DCIM Solutions Architect
22 Oct
NewLease & Microsoft Technical Sessions
23 Oct
NewLease & Red Hat Breakfast Briefing (Sydney)
View all events