Addressing the Unique IT Security Risks Posed by the Virtual Data Center

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

As noted by analysts such as Gartner, virtualization technology is becoming not only increasingly ubiquitous but also increasingly heterogeneous in nature as organizations deploy bare-metal hypervisors from vendors such as VMware and Citrix.

In parallel with this, organizations are also leveraging virtualization technology built into the latest UNIX, Linux and Windows operating systems.

According to a recent report from Nemertes Research, 93 per cent of organizations are deploying server virtualization, and companies typically have virtualized 40 per cent of their application workload.

This growing ubiquity and the ability for business-critical guest systems to proliferate and seamlessly move - as well as migrate - across a data center can lead to a loss of control from a security and management perspective.

As a result, the need to secure these guest systems’ underlying hypervisors from insider and outsider threats cannot be ignored.

IT managers need unified, global control over their evolving physical and virtual data center to meet security and compliance requirements.

This webinar will:

  • Help you understand the unique security and management requirements organizations will encounter as they migrate from the physical to virtual data center
  • Provide key success factors for securing hypervisor platforms, guest operating systems and applications across these environments
  • Analyze the trade-offs that companies frequently face when balancing ease of administration against enhanced security
  • Describe the compliance-driven requirements for access controls, privilege management and auditing that apply to the various components of a virtualized infrastructure
  • Provide a best-practice roadmap for migrating to a virtual infrastructure that provides corporate IT security managers with the controls they need while enabling departmental system administrators to do their work efficiently

This webinar is for:

  • IT security and compliance executives who have global oversight and responsibility for corporate data centers
  • IT departmental and line-of-business managers who are currently managing or planning for a migration to a virtualized environment
  • IT system administrators and other IT personnel involved in the day-to-day administration of virtual hosts and the client applications running on them

 

Speakers

Steve Gold

Infosecurity Magazine

David McNeely

Director of Product Management, Centrify Corporati

Eugene Schultz

Chief Technology Officer at Emagined Security, an

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.