Network virtualization in the cloud introduces a variety of security risks and vulnerabilities – as well as benefits...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
– to any cloud computing infrastructure.
This mini learning guide, brought to you by SearchCloudSecurity.com, discusses several different aspects of virtual network security, including how to evaluate virtual firewalls, network segmentation best practices and the top virtualization security risks and how organizations can manage them.
How to evaluate virtual firewalls
Virtual firewalls are an essential component to any virtual network security strategy, and enterprises have a plethora of virtual firewall products to choose from, so what should security personnel look when evaluating virtual firewall products and technology?
In this tip, Dave Shackleford, senior vice president of research and chief technology officer at IANS, explains how organizations can evaluate different virtual firewalls and unveils several factors every organization should consider when shopping for a virtual firewall.
ESXi firewall functionality in vSphere 5
The release of VMware’s vSphere edition, version 5, introduced a variety of new capabilities and options for organizations looking to secure their virtual network, one being the ESXi firewall, which essentially acts as a simple packet filter, and effectively adds an additional layer of defense to any virtualization deployment.
In this tip, Dave Shackleford examines the functions and capabilities of the ESXi firewall, as well as other features of vSphere 5, and explains why enterprises should strongly consider adding it to their virtualization security strategy.
Network segmentation best practices in virtual and private cloud environments
Network segmentation is nothing new in the world of network security, but the idea of incorporating network segmentation and achieving network isolation in a virtualized environment, although possible, is a bit more complicated.
Here, you will learn how network isolation techniques and technologies are different from traditional physical networks, as well as best practices for applying network segmentation in virtual and private cloud infrastructures to ensure security.
Top virtualization security risks and how to prevent them
With cloud computing comes the unique risks and threats introduced by virtualization. In this tip, Philip Cox unveils the top virtualization security risks, including improperly configured virtual firewalls and hypervisors, and what organizations need to do to protect against them to keep their virtual environments secure.