Security Solutions Arriving for Virtualized Systems

New technology typically emerges one step ahead of needed security checks. That has been the case with the recent push to virtualized systems although one leading vendor is trying to alter that equation.

Paul Korzeniowski, Contributor

August 20, 2008

1 Min Read
Dark Reading logo in a gray background | Dark Reading

New technology typically emerges one step ahead of needed security checks. That has been the case with the recent push to virtualized systems although one leading vendor is trying to alter that equation.Virtualization is gaining traction because it has the potential to help businesses use their hardware more efficiently. As small and medium businesses begin to deploy such solutions, the question arises, How can we ensure these systems are secure? Answers to that question often have typically begun with a pregnant pause.

CheckPoint, one of the leading security suppliers, stepped up to fill the void. The companys VPN-1 Virtual Edition, which runs on runs on VMwares popular ESX or ESXi platforms, features VPN and firewall functions and can be integrated with CheckPoints unified threat management systems. The security software runs on the machine hosting the virtualization software and protects virtual machines from one another. The security product simplifies auditing, compliance and risk management requirements by providing unified logging for a companys entire security infrastructure, including its virtual systems.

Virtualized systems have been gaining lot of traction, and Microsofts (a platform that the CheckPoint system does not yet support) growing emphasis on this market segment should at least maintain the momentum. One challenge is these solutions are usually quite expensive; pricing for the CheckPoint software starts in the $1,000 per virtual machine range. While many small and medium businesses may still be searching for a business case to justify deployment of virtualized systems, those planning to move ahead with such deployments can now find needed security functions.

How much interest does your company have in virtualized systems? How concerned are you about the security features available with these systems?

About the Author

Paul Korzeniowski

Contributor

Paul Korzeniowski is a freelance contributor to InformationWeek who has been examining IT issues for more than two decades. During his career, he has had more than 10,000 articles and 1 million words published. His work has appeared in the Boston Herald, Business 2.0, eSchoolNews, Entrepreneur, Investor's Business Daily, and Newsweek, among other publications. He has expertise in analytics, mobility, cloud computing, security, and videoconferencing. Paul is based in Sudbury, Mass., and can be reached at [email protected]

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights