SHARE
Facebook X Pinterest WhatsApp

Securing the Virtual Enterprise

Configuration errors even in the best of times are the bane of IT existence. As IT environments have become more complex thanks to the advent of virtualization and cloud computing,the opportunity to misconfigure any number of devices has exponentially increased. To help IT organizations deal with that issue, Juniper Networks today at the VMworld 2011 […]

Written By
MV
Mike Vizard
Aug 29, 2011

Configuration errors even in the best of times are the bane of IT existence. As IT environments have become more complex thanks to the advent of virtualization and cloud computing,the opportunity to misconfigure any number of devices has exponentially increased.

To help IT organizations deal with that issue, Juniper Networks today at the VMworld 2011 conference rolled out version 5.0 of the vGW Virtual Gateway for managing security in virtual machine environments. Major enhancements to the vGW Virtual Gateway include the ability to continuously monitor virtual machine gold images to make sure security policies are not violated. In addition, Juniper has added anti-virus software to the security gateway for virtualization environments and tightened integration between the vGW Virtual Gateway, which is based on technology that Juniper acquired when it purchased Altor Networks, and the vCenter management platform.

According to Johnnie Konstantas, director of marketing for cloud security at Juniper Networks, this latest version of the Juniper security gateway for virtual environments closely associates configuration management with security. Konstantas notes that it makes strategic sense because most security and compliance issues are tied to configuration errors that make it possible for the system to be compromised in the first place.

In the absence of automated approaches to managing IT that eliminate the possibility for human error, the next best thing is a system that alerts IT managers to when specific IT conditions have been changed. There are plenty of such approaches for physical servers, including offerings from Juniper. But virtual environments, says Konstantas, require a layer of dedicated security management software.

Virtual machines and the hypervisor technology that they rely on are for the most part secure. But everything above that on a virtual machine, including the guest operating systems, is subject to the same security and configuration issues as any other application environment. As such, given all the complexity involved in managing those environments, it’s probably even more likely that the security of the virtual environment is going to be more easily compromised than traditional physical servers simply because the number of things that can go wrong has dramatically been increased.
 

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Hyperscalers: Will They Upend the Mainframe Market?
Tom Taulli
Nov 22, 2021
PagerDuty Report: Stress on IT Teams on the Rise
Mike Vizard
Jul 30, 2021
VMware Adds Subscription Option for VMware Cloud
Mike Vizard
Mar 31, 2021
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.