Using Same Old Security 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 A majority (86.3 percent) agreed that securing the virtual infrastructure was as important as securing the physical environment. Almost 60 percent used traditional security tools to secure the virtual environment, though 51.3 percent felt […]
|
2|
3|
4|
5|
6|
7|
8|
9A majority (86.3 percent) agreed that securing the virtual infrastructure was as important as securing the physical environment. Almost 60 percent used traditional security tools to secure the virtual environment, though 51.3 percent felt traditional solutions were not adequate for the task and 24.5 percent weren�t sure about it.
In the rush to virtualization, security seems to be an afterthought, according to a survey of 302 IT professionals by security vendor Prism Microsystems. Though these pros seem aware of the dangers that come with virtualization, many are using get-by strategies and failing to heed best practices. Those practices could prove to be costly in the end – especially if there’s a data breach. That’s why, with money so tight, Prism Microsystems‘ Steve Lafferty, VP of marketing, advocates for a “single point of control to seamlessly monitor the entire IT infrastructure, from the physical to the virtual.�
Enterprise Networking Planet aims to educate and assist IT administrators in building strong network infrastructures for their enterprise companies. Enterprise Networking Planet contributors write about relevant and useful topics on the cutting edge of enterprise networking based on years of personal experience in the field.
Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.