O'Reilly logo

Virtualization Security: Protecting Virtualized Environments by Dave Shackleford

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11

Additional Security Considerations for Virtual Infrastructure

This chapter will explore several different areas of virtualization, with some general security guidelines and considerations for each. The first area that will be covered is desktop virtualization. More and more organizations are investigating virtual desktop technologies as their existing workstations and laptops grow obsolete. There are a number of use cases that make sense for some organizations, and security concerns and challenges will vary from one to the next. The second area that we'll cover in this chapter is storage virtualization and the security concepts and controls that administrators need to be aware of within their storage environments. Finally, this chapter ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required