Virtualized data centers are about to face major security threats

Source: Internet
Author: User
Keywords Virtualization of data centers security servers
Tags .mall data data center data centers datacenter security security solutions security vulnerabilities

Today, large and small companies are implementing or planning to implement virtualization technologies that migrate from physical data centers to virtualized data centers. As a result, the security of this virtualized datacenter needs to be carefully considered, among other things. Why do you need virtual machine protection because you have already deployed enough effective security solutions in your physical data center? Those who have implemented virtualization technologies will further support this view, saying that there are few security threats in today's virtualization world. So why worry about it?

Both of these issues are well-founded, but given the growing trend of security threats, we will soon see security vulnerabilities in virtualized data centers. You will find that all virtualization technology vendors, such as VMware, Jie, and Microsoft, are already patching up their software to plug vulnerabilities.

Data center is the next target

Why is it like this? The answer is simple. Every software today is vulnerable to security threats, so virtualization is no exception: because, ultimately, virtualization is a software. There is no threat now, and it does not mean that there will be no further threat. As more companies deploy virtualization technologies to their data center environments, hackers will gradually shift their focus and start looking for security vulnerabilities in virtualized environments. "In virtualized data centers, this part of the virtual machine is becoming more and more important," said Amit Nath, general manager of Trend Technology India Inc. Someone will attack the virtual machine sooner or later. We've never heard of a virtualization environment with too many security threats, but over the next 6-9 months we'll see more threats and attacks. ”

Virtualization Data Center does not have boundary security

Most CIOs may think that their physical data centers are properly protected by all the latest security solutions. In this respect, Amit added: "When you deploy virtualization technology, border security is gone because you don't really know where your virtual machines are." "In a virtualized environment, although you reduce the number of physical servers, it also puts numerous virtual machines into a single physical server." As a result, it is difficult to track virtual machines. In addition, you may create a standby virtual machine, so that in the event of a failure of the master virtual machine, the standby virtual machine can be overhead and failover mechanisms are implemented. In addition, additional virtual machines are added because more applications need to be deployed. In such a case, how can a virtual machine track so many VMS from a physical server seamlessly to another physical server?

Do a good job of virtual machine security

So finally, now that the security threats to virtual machine technology are likely to emerge, what do you do? You obviously need security software that can deal with those threats. Again, you need to keep a few things in mind. First, are you going to install a separate Anti-malware program on every virtual machine? It's a tedious process, and it's a waste of resources. Amit Nath said: "Imagine running anti-virus scans on all your virtual machines at the same time." This completely drags down the system's performance. "So what you need is a solution that doesn't seriously consume system resources. Otherwise, you can't cram the many virtual machines you need into a single physical server. As a result, you often need to buy more hardware servers, which reduces the return on investment in implementing virtualization technologies.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.