Virtualization

Read Complete Research Material

VIRTUALIZATION

Desktop and Server Virtualization and impact on Information Security Planning, Policy and Strategy

Table of Content

INTRODUCTION1

VIRTUALIZATION IMPACT INFORMATION SECURITY PLANNING2

Management Of Resource Consolidation3

Control Of Risk Exposure3

Run: Administrative Security Operations4

HISTORY5

DESKTOP VIRTUALIZATION6

TYPES OF VIRTUALIZATION7

Emulation8

Native virtualization8

Hardware Virtualization9

Paravirtualization10

Virtualization using Virtual Machine Monitor (VMM)11

3 MAJOR VIRTUALIZATION SYSTEMS12

VMware12

New support for operating systems:13

Supports 64-bit operating systems:14

Management Interface VMware Infrastructure (VI):14

Independent virtual machine console:14

More scalable virtual machines:14

Volume Shadow Copy Service (VSS):15

Support for the virtual machine interface (VMI):15

Communication interface VMware Virtual Machine (VMCI)15

Support for VIX API 1.515

MICROSOFT HYPER-V16

CITRIX18

Virtualization to applications20

Desktop PCs20

EXAMPLES OF VIRTUALIZATION IN USE21

CLOUD COMPUTING22

History of Cloud Computing23

Conclusion24

REFERENCE25

Introduction

This notion is intriguing and has been pending for numerous years; it appears you are eventually finding their way to creative and expert development. The virtual appliance in general is an entire functioning scheme that sprints as if it is established on a hardware stage independent (Agranoff 2008). Typically, numerous virtual appliances are simulated on a centered computer. For the functioning scheme guest work, the replication should be large enough. Virtualization is something that we hear more and more.

The stability of the products on the market and the inherent advantages of this technology were quickly installed in our data centers. Several people have quickly realized that products such as VMware, Virtual PC and Xen can offer solutions that perfectly meet the needs of centralization and operating hardware available. Virtualization is the act of running multiple OS on the same physical system. Today, each application requires a dedicated server that is often too powerful for the purposes of the application as it is (I do not see why we should install a domain controller on a 3GHz Dual Core Xeon with 2 Gigs of RAM when This server will be used to perhaps up to 3%). Given that the purpose of this article is not to explain virtualization and how it works, I will give you link to VMware is the leader in the field.

Virtualization Impact Information Security Planning

Virtualization is one of information technology the most revolutionary of these years. What many companies do not measure quite yet, however, is the impact that virtualization also has on safety. With virtualization, investments generate optimum benefits with more flexibility. But It also introduces new risks, most of which are unprecedented in the field of traditional computing. Unlike physical systems, multiple guest virtual machines share the same host. Virtual machines can be configured offline and deployed on demand, creating a much more dynamic environment. Functionality such as virtualized networking is abstraction of its physical topology. Securing these features directly to the administrative control. The result is an increased need for security in the administration of the Virtualization and processes and technologies for securing the administration must be oriented virtualization. In this report, Enterprise Management Associates (EMA) described a systematic approach to securing the administration virtualized systems, based on the philosophy of plan, do-check-act included in the ISO 27000 series of standards. While we are witnessing the beginnings of virtualization points access, all eyes are on the administration of Virtualization in the datacenter, which ...
Related Ads