Friday, April 3, 2009

Virtualization: An abstract World out there !!

Do you feel like you need to escape the typical hardware and operating system lifecycle “treadmill?” Like a dog trying to catch it's tail..

For Application Virtualization what are the application your organization use and how the users are accessing the Applications? How these users are spread and the related challenges in the WAN environment?

Securing the IT infrastructure in today’s computing environment may well be the biggest challenge faced by organizations. Not only must organizations ensure the integrity of their systems and data, but often they must also prove that their security processes and policies measure up against standards and regulations established and enforced by national standards-developing entities.
In addition, the recent popularization of virtualized environments adds a new layer of complexity to the security picture. Businesses are just beginning to comprehend the security implications of these environments. To tackle these security issues, many organizations adopt a security approach that addresses vulnerabilities through security policy and systems designed to protect the integrity of the IT infrastructure. This approach recognizes that the integrity of the IT infrastructure may be easily compromised by malicious attacks from external sources, but often lacks a means of addressing compromises that originate from within the organization through both intentional and inadvertent employee actions. And ironically, the very systems responsible for providing security—the firewalls, intrusion detection systems, and others—often go unmonitored.

No comments: