Defining a set of security and compliance policies is a key first step. But enforcing security policy is not as easy. Defining a set of security and compliance policies is a key step. Having a ...
In surveys of senior-level IT managers, security is consistently one of the top five concerns, along, specifically, with security related to the hot technology of the moment. Most recently those ...
On the surface, security questions surrounding virtual servers don’t seem much different than those for the physical machines on which they run. In fact, starting a virtual security audit by keeping ...
Malicious hypervisors. Subversive virtual machines. Live migration impersonators. Welcome to the world of server virtualization, where the threats are new and the traditional security tools like ...
Users and vendors address the unique problems, and opportunities, involved in virtual servers with NAC-like functions and IPS-firewall appliances from such vendors as ConSentry Networks, Reflex ...
When it comes to sampling innovative technology, Schwan Foods, a multibillion-dollar frozen food producer, digs right in. How to seed security into the cloud Sign up here. The Marshall, Minn., company ...
Blue Lane Technologies, a VMware Technology Alliance Partner, announced the immediate availability of VirtualShield, a software based vulnerability shield that is designed to provide instant ...