Virtualization and Security
This presentation provides an introduction to virtualization, virtualization architecture, key risks with virtualization, specific audit concerns and recommendations for evaluation of a virtualized environment.
This presentation provides an introduction to virtualization, virtualization architecture, key risks with virtualization, specific audit concerns and recommendations for evaluation of a virtualized environment.
This whitepaper discusses the things to consider before taking the plunge into virtualization – because "Collapsing multiple physical devices into software affects the<br /> people and processes supporting the data center. Therefore, enterprises should thoroughly evaluate how business processes, administrative rights, capacity planning, performance monitoring tools and security strategies will need to change."
This whitepaper makes the case for manageability as a cornerstone of Virtualization. The authors contend that Virtualization 1.0 – that is how the story started! – was about maximizing functionality of shared infrastructure. Virtualization 2.0 is about performance i.e. squeezing the last drop out of virtual infrastructure so the focus should be on monitoring and management solutions.
This whitepaper discusses the drivers compelling organizations to pursue virtualization as a solution, describes the benefits of virtualization, and demonstrates network virtualization in action.
This paper defines cloud computing, provides an architecture for creating market oriented clouds, discusses market-based resource management strategies, proposes creating global cloud exchanges, and presents some representative cloud platforms.
The study tries to better understand the impact of production server virtualization on IT service management procedures and controls/datacenter operating practices. 
This presentation provides a quick overview of the business basics of virtualization – what is it? history of virtualization? Is the Gartner maturity model still valid?
This white paper discusses a coordinated approach for intrusion detection and prevention in a virtualization environment. 
This paper explores the opportunities and challenges in the real world application of virtualization. Since the concept depends on the inter-play of hardware and software, the paper investigates two popular models of virtualization – Intel’s Hyper-threading technology and VMWare’s ESX server software. A case study is included to present a
This presentation provides an introduction to virtualization.