Virtualization has been around for many years. Today many organizations have adopted private clouds and private virtual systems. Looking ahead, many of them are deploying Amazon's Elastic Compute, Microsoft Cloud and VMWare based public cloud infrastructures to provide flexibility to provide certain primary application hosting such as cloud based email and CRM functions and a secondary storage "always-on" capability. With the continued reliance on cloud functions, there are fundamental security questions that need to be addressed:
How do you ensure your virtual images are not copied and re-spun up in another cloud? How do you integrate your existing two-factor deployment to cloud based applications?
How do you segment or deploy in-line IPS or host based FW's within a virtual network?
There are currently no results for this search.