Today, more and more customers with the need to prevent leaks are focusing on virtualization and want to use virtualization instead of traditional cryptographic anti-disclosure software, but is virtualization really that good? Is it really possible to solve the need for a company's leak prevention? Today, let's briefly explain the many problems and weaknesses that virtualization will encounter in the Enterprise leak prevention:
Disadvantages of Virtualization:
1. cost-prohibitive,
Reducing costs is the first response that many people have to benefit from desktop virtualization, but is that really the case? As you can count, desktop virtualization is not free, the initial cost is not low, infrastructure transformation, IT infrastructure changes, the requirements for the relevant technical personnel are higher, but also the need for additional virtualization software and licensing fees. And if the purchase of genuine operating system and application software, these licenses are also a lot of, and normal physics machine.
2. High Maintenance costs
Although the number of technicians maintained is reduced, but the skills are higher, maintenance costs may be several times or more, when a virtual machine problem, the technician needs to determine whether the virtual machine itself or the underlying problem, this adds complexity. Single point of failure, is the problem that virtualization has to face, users in the consideration of cost output in various aspects often can not do storage redundancy, so the data are placed on a storage, storage crashes or server damage caused by catastrophic consequences.
3. High performance requirements for servers
The client's usage points determine the performance of the server, a virtualized server needs to run multiple clients on it, the server's network load and server load will be a serious test, such as those who need to do large-scale drawing design, Autocad,proe, SolidWorks and other resources consume a great deal of software, will be a great test, want to smooth operation is bound to enhance the server configuration, the budget will be higher, otherwise the work of staff development will have a great impact.
4. Cloud Platform Leak risk
Employee client side that can not escape a problem is the need to Sisu network, if not to the Internet, it will cause a lot of inconvenience, such as the need to check information, communicate with the outside world, and so on. In this case, there will be a risk of leaks, information on the virtualization client, employees can freely transfer the data, resulting in the disclosure of information, which also virtualization of the Internet to prevent leaks can not be protected.
5. risk of hardware tuning leaks
With regard to peripheral connection, some virtualization is allowed to connect peripherals, while others may be a single-cut directly do not allow access to peripherals. But for the needs of peripheral debugging customers, not allow access to peripherals that is not possible, which will directly affect the normal work, and allow the use of peripherals, there will be a problem, that is the core information leaks, employees in the process of debugging can be directly out of the data.
To sum up, the enterprise in the development of information may inevitably choose virtualization, but virtualization is only a product of enterprise informatization and not a specific product to prevent leaks, users in the selection time should not be used to solve the need to use virtualization at the same time to address the demand for the idea, because the software is not the same face, This will form a misunderstanding in the selection, the future use will have a greater impact.
This article is from the "Believe Up" blog, please be sure to keep this source http://lujunxin.blog.51cto.com/9368206/1753422
The weaknesses of virtualization in the field of leak protection