Virtualized Security

Interesting posts from McAfee (here) and the Hoff (here)…although we have a long way to go this will be one of the technologies that will push security forward. The ability to run security technologies, independent and abstracted from the OS, or VM image that is loaded and be able to assess and enforce the health and security of non-running VM images and also have capabilities to tie into the NIC for WOL, constraining the end-point and health-checking the loaded VM’s operational agents or configuration state is significant, but with all things it will introduce its own set of new attack methods replacing the ones that are no longer able to exploit the computing environment.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s