Twelve Virtualization Myths Debunked - Slide 11

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14
Next Twelve Virtualization Myths Debunked-11 Next

Security myth: Virtualization is not secure.

Some negative talk comes from virtualization’s requirement for a host operation system. Those host operating systems are usually configured to bare bones, From there, the organization sets up Secure Shell (SSH) manually. Since the host operating system runs few, if any, network services, it is very secure.

It is also an excellent idea for each organization, regardless of size, to develop its own security standards as well as setting policies and procedures for complying with the internal standards.

Any software can be deemed unsafe. Virtualization is no more secure or less secure than physical server-based solutions. By following industry-standard best practices for configuring operating systems, storage solutions, and networking, any organization can create a secure environment. The U.S. Defense Information Systems Agency provides multiple guides for information assurance.

Virtualization, one of the fastest growing trends in IT, lets any organization run multiple server functions on a single computer. Virtualization also makes it easier to start up new server emulations quickly. In case of failure, organizations can move server functions to new computers without interrupting service. Beyond saving a lot of money on large sites, virtualization is also moving to PC networks and serves as a foundation for cloud computing. Many myths surround virtualization. Some started when past limitations still existed. Other myths get started and spread by those who have separate agendas or those who have a limited understanding of virtualization. Here are some of the most common myths, identified by Global Knowledge.

More Slideshows:


Cloud Apps: The Seven Deadly Sins Applications are the heart and soul of winning new cloud business, securing recurring revenue and ensuring customer satisfaction.

A Humorous Look at the Consumerization of IT CA Technologies' "CHIEF & CHUCK" take on the consumerization of IT.

Nine Benefits of Email Monitoring Knowing what is going on with your email communications is vital.

 

Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

 
More Slideshows

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.