dcsimg

Using Same Old Security

  • Using Same Old Security-
    A majority (86.3 percent) agreed that securing the virtual infrastructure was as important as securing the physical environment. Almost 60 percent used traditional security tools to secure the virtual environment, though 51.3 percent felt traditional solutions were not adequate for the task and 24.5 percent weren't sure about it.
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9

Using Same Old Security

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
  • Using Same Old Security-3
    A majority (86.3 percent) agreed that securing the virtual infrastructure was as important as securing the physical environment. Almost 60 percent used traditional security tools to secure the virtual environment, though 51.3 percent felt traditional solutions were not adequate for the task and 24.5 percent weren't sure about it.
In the rush to virtualization, security seems to be an afterthought, according to a survey of 302 IT professionals by security vendor Prism Microsystems. Though these pros seem aware of the dangers that come with virtualization, many are using get-by strategies and failing to heed best practices. Those practices could prove to be costly in the end – especially if there’s a data breach. That’s why, with money so tight, Prism Microsystems’ Steve Lafferty, VP of marketing, advocates for a “single point of control to seamlessly monitor the entire IT infrastructure, from the physical to the virtual.”