UBM: TECH DIGITAL RESOURCE LIBRARY

The CISO's Guide to Virtualization Security

Jan 10, 2014

Download In today's data centers, IT often virtualizes new applications and workloads by default. Virtualization is the norm; deploying a physical server is the exception. The technology is mature and enterprise adoption is high, yet information security does not have a significant focus on virtual security.

This guide describes the security challenges within virtualized environments and shows how to apply the concepts of Forrester's Zero Trust Model of information security to secure the virtual environment effectively.


Whitepaper