you're reading...

Virtualized Security Capabilities You’ll Need for Ultimate Protection

One of the most critical aspects of virtualized security is the ability to manage the environment. Most virtualized security solutions today need to support rapid deployment and be used to implement virtualization security policies, not just on an inside-vs.-outside basis, but also between organizations or applications within the same infrastructure. It needs to provide compliance and privacy within the organization and be able to migrate within the virtual infrastructure, and protect using the high-availability capabilities of the virtual infrastructure, offering protection continuity even as the infrastructure changes dynamically. It needs to be easily preconfigured and deployed along with the virtual machines that serve multi-component applications, making it easy to protect them and their data by default. Policies should be defined not only at the intersection of physical networks, but also between virtual-only networks within server farms or even on individual servers. Full threat prevention policies must be implemented at the physical perimeter and at the connection point for mobile and personal devices. In short, virtualization security is not a simple task.

Today’s virtualization security solution needs to defend against botnets, Advanced Persistent Threats (APTs), and other attacks, while keeping your organization in control when using Web 2.0 applications. The architecture should consist of different security layers that work cooperatively with one another to dynamically detect, block, and report on malicious traffic while passing benign traffic through as efficiently as possible. It should be able to protect your organization from new, unknown threats – often called zero day threats.

  1. As you explore your virtualization security options, here are six capabilities you’ll need to consider:A cloud-based URL reputation enabled defense that protects web users from malicious web pages, while dramatically improving web throughput
  2. Ability to block unwanted email with 100% accuracy along with the viral payloads that spam often carries. Recognize spam regardless of the language, format, or content of the message – even image-based spam that anti-spam products often miss
  3. A URL filtering service that blocks access to dangerous and inappropriate web sites in the workplace. Able to filter URLs on both HTTP and HTTPS to close the HTTPS loophole many web filters leave wide open
  4. A powerful signature-based protection at the gateway against known viruses, trojans, worms, spyware, and rogueware
  5. Ability to scan all ports and protocols to block attacks that comply with standard protocols but carry malicious content, including buffer overflows, SQL injections, and remote file inclusions
  6. Ability to stay on top of the applications running on your network for tight security and high productivity and establish which applications can be used within your organization

If you’re attending Interop in Las Vegas this May, be sure to swing by booth 751 where we’ll be speaking on everything you need to know about virtualization security. Hope to see you there!


No comments yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: