Virtualization offers many benefits. However, as pointed out in this SC Magazine article, in the rush to capitalize on these benefits, some organizations may have overlooked the ramifications a virtualized environment has on a company’s security posture. “Legacy viruses, trojans, rookits, keyloggers and other malware can all do substantial damage to a VM and its […]
Virtualization offers many benefits. However, as pointed out in this SC Magazine article, in the rush to capitalize on these benefits, some organizations may have overlooked the ramifications a virtualized environment has on a company’s security posture.
“Legacy viruses, trojans, rookits, keyloggers and other malware can all do substantial damage to a VM and its host. Additionally, an infected VM can carry out attacks against other VMs as well as other physical servers on the network.
“An effective security strategy for most virtualized environments is to ‘double-down’ on conventional security wisdom, making sure to take a layered approach to security technologies. As the conventional wisdom states, there’s no such thing as a silver bullet that will bulletproof an organization’s security posture. This is doubly true for organizations rolling out a virtualized environment.”
Enterprise Networking Planet aims to educate and assist IT administrators in building strong network infrastructures for their enterprise companies. Enterprise Networking Planet contributors write about relevant and useful topics on the cutting edge of enterprise networking based on years of personal experience in the field.
Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.