
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
Securing virtual environments for VMware, Citrix, and Microsoft hypervisors
Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices, and strategies used for securing physical environments do not provide sufficient protection for virtual environments. This book includes step-by-step configurations for the security controls that come with the three leading hypervisor--VMware vSphere and ESXi, Microsoft Hyper-V on Windows Server 2008, and Citrix XenServer.
- Includes strategy for securely implementing network policies and integrating virtual networks into the existing physical infrastructure
- Discusses vSphere and Hyper-V native virtual switches as well as the Cisco Nexus 1000v and Open vSwitch switches
- Offers effective practices for securing virtual machines without creating additional operational overhead for administrators
- Contains methods for integrating virtualization into existing workflows and creating new policies and processes for change and configuration management so that virtualization can help make these critical operations processes more effective
This must-have resource offers tips and tricks for improving disaster recovery and business continuity, security-specific scripts, and examples of how Virtual Desktop Infrastructure benefits security.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Table of Contents
- Title
- Copyright
- Publisher's Note
- Dedication
- Acknowledgments
- About the Author
- Introduction
- Chapter 1: Fundamentals of Virtualization Security
- Chapter 2: Securing Hypervisors
- Chapter 3: Designing Virtual Networks for Security
- Chapter 4: Advanced Virtual Network Operations
- Chapter 5: Virtualization Management and Client Security
- Chapter 6: Securing the Virtual Machine
- Chapter 7: Logging and Auditing
- Chapter 8: Change and Configuration Management
- Chapter 9: Disaster Recovery and Business Continuity
- Chapter 10: Scripting Tips and Tricks for Automation
- Chapter 11: Additional Security Considerations for Virtual Infrastructure
- Index
- End User License Agreement