Four Things You Need to Do to Protect your VMs

Four Things You Need to Do to Protect your VMs

According to Frank Gens, IDC Senior VP & Chief Analyst at Trend Micro, the number one concern about cloud services is security.

As you know, physical firewalls don’t inspect or filter the vast amount of traffic that originates from a hypervisor running several virtualized servers. It turns out that this is a significant vulnerability when you consider that VMs start, stop, and move from one hypervisor to another at the click of a button.

Additionally, few hypervisors have the access controls that even the most basic file server has, and once someone gains access to the hypervisor, they could potentially access and control all of the VMs housed there.

Finally, protective features have to handle all these movements and activities, and agent backups are complex to manage — with one agent required per VM.

Even with the vulnerabilities clearly spelled out, many IT managers may still have “secure the hypervisor” way down on their to-do list – there are just so many priorities. That’s fine, of course – until the unthinkable happens.

So how should IT Managers protect VMs? Here are the four key things to consider:

[Read more…]

Optimize your network with due-diligent security controls [McAfee]

Most companies already have some form of protection against cyber-threats and malware, such as anti-virus software. But the threat landscape changes at warp speed, and it’s hard to keep up with the latest threats, and even harder to manage a diverse set of security tools.

One solution you might want to consider in your security toolkit is a Network Intrusion Prevention System, or IPS, which is an out-of-the-box hardware- and software-based system that helps take the guesswork out of security.

Not only does an IPS solution protect against the latest threats — including malware, botnets and denial-of-service attacks — it also streamlines security operations and can even unify network security management across physical and virtual environments.

If the current solution you have in place is causing more management headaches than peace of mind, you might want to consider IPS. Here’s why: An IPS solution inspects network traffic in near real time, identifying attacks using known vulnerabilities, as well as attack patterns with unusual activity. Not only can an IPS solution help prevent attacks on your data, it can also provide proactive protection for unpatched systems and zero-day attacks. [Read more…]

Endpoint no longer cuts it [ Symantec ]

Symantec Endpoint Protection 12 leverages reputation-based state-of-the-art defense against all types of attacks for both physical and virtual systems. Seamlessly integrating essential security tools into a single, high performance agent with a single management console, Endpoint Protection 12 provides leading protection without compromising efficiency and productivity.

Unrivalled security:
Symantec Endpoint Protection 12 blocks new and unknown threats missed by traditional signature, heuristic, behavioral and HIPS-based security solutions. All of the product’s security engines are now reputation-enabled, leveraging Insight’s online reputation database to identify and block malware attacks. Symantec’s Insight has analyzed the anonymous software adoption patterns from more than 175 million customer computers to automatically derive highly accurate security ratings for more than 2.5 billion unique software files—Insight has ratings for virtually every software file-good or bad-in existence. [Read more…]