Save or Share this Report

For Security & Risk Professionals

The CISO's Guide To Virtualization Security

Get Off The Bench And Look Into Your Virtual Environment

January 12, 2012

Primary author headshot


Why Read This Report

In today's data centers, IT often virtualizes new applications and workloads by default. Virtualization is the norm; deploying a physical server is the exception. The technology is mature and enterprise adoption is high, yet information security does not have a significant focus on virtual security. Given the converged nature of virtual environments, security incidents can result in significant damage; therefore, it is critical that security professionals redouble their efforts and make securing their virtual infrastructure a priority. This guide describes the security challenges within virtualized environments and shows how to apply the concepts of Forrester's Zero Trust Model of information security to secure the virtual environment effectively.

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($499 USD).


Table of Contents

  • Virtualization Security Maturity Lags Behind Operations
  • Everyone Knows Virtualization's Benefits — But Not Its Risks
  • Better Late Than Never: Here's How To Get Into The Virtualization Security Game
  • Increase Your Team's Virtualization Knowledge

  • Stick To Your IT Colleagues Like Glue
  • Supplemental Material
  • Related Research Documents