Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Report Available On Information Security Threats Of Virtualisation

Research And Markets : 21 April, 2010  (New Product)
Opportunities and Threats to Information Security when embracing virtualisation technology is the subject of a new report available from Research and Markets
Research and Markets has announced the addition of the 'Embracing Virtualization: Opportunities and Threats to Information Security' report to their offering.

Virtualization and its variations has become a major technology, impacting computer security over the long term. We try to analyse its global impact on information systems security, and the mutations of cybercriminality it may induce.

Today, virtualization offers significant opportunities in terms of cutting infrastructure and maintenance costs. For this reason, it is not surprising that a large number of businesses are making the switch to these technologies, and especially cloud computing, which is often cited as a promising technology.

Yet, application hosting on an outside Cloud Computing service is coupled with risk. First of all, there are the risks tied to any kind of external application hosting, which can threaten not only the availability of the applications but also the confidentiality and integrity of the data being manipulated. Although this risk is not fundamentally different from traditional service provider risks, specific aspects of cloud computing, such as the geographic location of virtual machines able to move between data centers, and the resulting legal risks, must be considered.

At present, even though cybercriminals do not perceive Cloud Computing as revolutionary, some have attempted to host certain malicious operations (including spam, intrusion attempts, and malware) on widely used clouds, such as Amazon EC2. These new architectures, which draw on the pooling of public IP addresses between several VMs, are problematic for security systems that are based on IP reputation analysis.

The major advantage to desktop virtualization is the fact that the information leak risk, as a result of IT equipment being lost or stolen, is almost entirely eliminated. However, these technologies require IS penetration detection systems to be totally reconsidered.

Our recommendation to banks having opted for virtualization of all or part of there is to examine the applications to be virtualized on a case by case basis, in order to size resources and study the specific risks. Service providers must meet strict service level requirements and, in so far as possible, be subject to routine audits.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo