Advanced Search

Save Or Share This Report

For Security & Risk Professionals

The CISO's Guide To Virtualization Security

Get Off The Bench And Look Into Your Virtual Environment

January 12, 2012

Primary author headshot

Authors

Why Read This Report

In today's data centers, IT often virtualizes new applications and workloads by default. Virtualization is the norm; deploying a physical server is the exception. The technology is mature and enterprise adoption is high, yet information security does not have a significant focus on virtual security. Given the converged nature of virtual environments, security incidents can result in significant damage; therefore, it is critical that security professionals redouble their efforts and make securing their virtual infrastructure a priority. This guide describes the security challenges within virtualized environments and shows how to apply the concepts of Forrester's Zero Trust Model of information security to secure the virtual environment effectively.

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Timely and relevant, Forrester's RoleView research aligns to 13 leadership roles across business and technology management. Our expertise in customer experience, mobile, digital business, and big data will help your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($499 USD).

Purchase

Table of Contents

  • Virtualization Security Maturity Lags Behind Operations
  • Everyone Knows Virtualization's Benefits — But Not Its Risks
  • Better Late Than Never: Here's How To Get Into The Virtualization Security Game
  • Increase Your Team's Virtualization Knowledge
  • WHAT IT MEANS

  • Stick To Your IT Colleagues Like Glue
  • Supplemental Material
  • Related Research Documents

Recommended Research