476 KB | 3 files | PDF
Virtualization technologies create efficiencies by viewing disparate physical systems as singular assets. But by putting all your management eggs in one virtual basket, you run the risk of compromising enormous segments of your infrastructure.
Virtualization promises enormous gains in efficiency and control for IT. However, virtualization adds layers of technology, which can increase security management concerns and require the implementation of additional security controls. Also, combining many systems onto a single physical computer can cause a larger impact on the organization if security is compromised.
This paper from the National Institute of Standards and Technology is designed to walk federal agencies through the steps needed to successfully roll out virtualization without compromising network security. The advice included in the article, such as ensuring that admin tools for the virtualization solution are completely locked down, is of course applicable to any organization.
Included in this zip file are:
Whether you're looking to hire one or looking for a position yourself, use this detailed job description to find out what the role of a Technology Project Manager entails. ... More >>
Chapter 1 delves into the first four stages of systematic strategic planning, including clarifying current conditions, identifying competitive advantages, defining opportunities and developing strategies. ... More >>
This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to manage defects, and an analysis of the root causes of defects. ... More >>