Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Addressing the Unique IT Security Risks Posed by the Virtual Data Center

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

As noted by analysts such as Gartner, virtualization technology is becoming not only increasingly ubiquitous but also increasingly heterogeneous in nature as organizations deploy bare-metal hypervisors from vendors such as VMware and Citrix.

In parallel with this, organizations are also leveraging virtualization technology built into the latest UNIX, Linux and Windows operating systems.

According to a recent report from Nemertes Research, 93 per cent of organizations are deploying server virtualization, and companies typically have virtualized 40 per cent of their application workload.

This growing ubiquity and the ability for business-critical guest systems to proliferate and seamlessly move - as well as migrate - across a data center can lead to a loss of control from a security and management perspective.

As a result, the need to secure these guest systems’ underlying hypervisors from insider and outsider threats cannot be ignored.

IT managers need unified, global control over their evolving physical and virtual data center to meet security and compliance requirements.

This webinar will:

  • Help you understand the unique security and management requirements organizations will encounter as they migrate from the physical to virtual data center
  • Provide key success factors for securing hypervisor platforms, guest operating systems and applications across these environments
  • Analyze the trade-offs that companies frequently face when balancing ease of administration against enhanced security
  • Describe the compliance-driven requirements for access controls, privilege management and auditing that apply to the various components of a virtualized infrastructure
  • Provide a best-practice roadmap for migrating to a virtual infrastructure that provides corporate IT security managers with the controls they need while enabling departmental system administrators to do their work efficiently

This webinar is for:

  • IT security and compliance executives who have global oversight and responsibility for corporate data centers
  • IT departmental and line-of-business managers who are currently managing or planning for a migration to a virtualized environment
  • IT system administrators and other IT personnel involved in the day-to-day administration of virtual hosts and the client applications running on them



Steve Gold

Steve Gold, Infosecurity Magazine

    David McNeely

    David McNeely Director of Product Management, Centrify Corporati

      Eugene Schultz

      Eugene Schultz Chief Technology Officer at Emagined Security, an