Protecting Virtual Datacenters Protecting Virtual Datacenters

Protecting Virtual Datacenters

A Secure Access to VMware vCloud With SecurePass

Beschreibung des Verlags

While Cloud itself is not technically any different from traditional hosting, housing or outsourcing with geographical business continuity, the revolution is in the concept of optimizing costs while allowing greater flexibility. It all sounds good and easy, but what about your company security? You are outsourcing part of your datacenter in a virtual datacenter hosted in a provider, or you are storing part of your core data in an application hosted somewhere and this changes the way security has been conceived so far.


VMware with its vCloud Director software is among the players of IaaS infrastructure software, organizing outsourced companies into virtual datacenters or vDatacenters. Because vDatacenters allow great flexibility by orchestrating customers' datacenters via a simple web interface, identity theft increases the risks of data being compromised or services being disrupted: by compromising a single identity, a malicious user can log in to the vCloud portal and fully control the virtual datacenter from anywhere.


This publication describes how the author addressed the issue of breaking into virtual datacenters on two different organizations that adopted VMWare vCloud. The target audience of this publication is a VMWare vCloud administrator or an end customer, both wishing to understand the security risks behind cloud technologies and wishing to enhance such security.

  • GENRE
    Computer und Internet
    ERSCHIENEN
    2012
    21. August
    SPRACHE
    EN
    Englisch
    UMFANG
    33
    Seiten
    VERLAG
    Giuseppe Paterno'
    GRÖSSE
    2.8
     MB
    Software Security For You Software Security For You
    2015
    Transport Layer Transport Layer
    2015
    Microsoft System Center Data Protection for the Hybrid Cloud Microsoft System Center Data Protection for the Hybrid Cloud
    2015
    The Path of Least Resistance: Computer Security Is Common Sense The Path of Least Resistance: Computer Security Is Common Sense
    2012
    Rethinking the Internet of Things Rethinking the Internet of Things
    2014
    Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force
    2012