New & Notable
Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection News
December 09, 2013
Nation-states are turning their attacks toward the cloud. One expert explains why he believes security automation is the only viable defense tactic.
October 09, 2013
Expert Paul Kirvan discusses the debut of the VMware NSX platform and what it means to both network virtualization security and cloud security.
September 19, 2012
Company uses virtualization technology to isolate malware from the rest of the system.
August 28, 2012
The vCloud Networking and Security package, featuring vShield Edge and vShield App, is designed to make virtualization security easier to implement.
Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection Get Started
Bring yourself up to speed with our introductory content
Cloudburst VM (virtual machine) escape is an exploit method, credited to research firm Kostya Kortchinsky Immunity Inc., that takes advantage of IBM's Cloudburst cloud service provisioning software for cloud providers and a flaw in VMware ... Continue Reading
Hypervisor security is the process of ensuring the hypervisor, the software that enables virtualization, is secure throughout its life cycle, including during development, implementation, provisioning, management and de-provisioning. Continue Reading
An AV storm is the performance degradation that occurs when antivirus software simultaneously scans multiple virtual machines (VMs) on a single physical host. Continue Reading
Evaluate Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Enterprises have a lot of choice when it comes to virtual firewalls. Here’s what you should look for. Continue Reading
Manage Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection
Learn to apply best practices and optimize your operations.
Expert Dejan Lukan takes a look at some of the potential threats to cloud virtualization, and reviews the best security controls to prevent them. Continue Reading
Expert Dave Shackleford analyzes the likelihood and effects of cross-VM side channel attacks in the cloud and offers mitigations for concerned users. Continue Reading
Funding for security tools can be difficult to get. Ed Moyle offers alternative, low-cost tools to use for virtual asset inventorying. Continue Reading
Problem Solve Cloud Computing Virtualization: Secure Multitenancy - Hypervisor Protection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Security pros must be aware of complications that can develop after a virtualization deployment. Continue Reading
Managing software licenses in virtual environments is complicated. Find out strategies for tackling this challenge. Continue Reading
Vulnerabilities affecting VMware and other virtualization platforms underscore the need for patch management and risk management in virtual and cloud environments. Continue Reading