Protecting Virtual Datacenters Protecting Virtual Datacenters

Protecting Virtual Datacenters

A Secure Access to VMware vCloud With SecurePass

Publisher Description

While Cloud itself is not technically any different from traditional hosting, housing or outsourcing with geographical business continuity, the revolution is in the concept of optimizing costs while allowing greater flexibility. It all sounds good and easy, but what about your company security? You are outsourcing part of your datacenter in a virtual datacenter hosted in a provider, or you are storing part of your core data in an application hosted somewhere and this changes the way security has been conceived so far.


VMware with its vCloud Director software is among the players of IaaS infrastructure software, organizing outsourced companies into virtual datacenters or vDatacenters. Because vDatacenters allow great flexibility by orchestrating customers' datacenters via a simple web interface, identity theft increases the risks of data being compromised or services being disrupted: by compromising a single identity, a malicious user can log in to the vCloud portal and fully control the virtual datacenter from anywhere.


This publication describes how the author addressed the issue of breaking into virtual datacenters on two different organizations that adopted VMWare vCloud. The target audience of this publication is a VMWare vCloud administrator or an end customer, both wishing to understand the security risks behind cloud technologies and wishing to enhance such security.

  • GENRE
    Computing & Internet
    RELEASED
    2012
    21 August
    LANGUAGE
    EN
    English
    LENGTH
    33
    Pages
    PUBLISHER
    Giuseppe Paterno'
    SELLER
    Giuseppe Paterno
    SIZE
    2.8
    MB
    The Official (ISC)2 Guide to the CCSP CBK The Official (ISC)2 Guide to the CCSP CBK
    2016
    Cloud Security Guidelines for IBM Power Systems Cloud Security Guidelines for IBM Power Systems
    2016
    CISSP For Dummies CISSP For Dummies
    2018
    ISC2 CISSP Certified Information Systems Security Professional Official Study Guide ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
    2024
    Destination CISSP Destination CISSP
    2024
    Managing Digital Certificates across the Enterprise Managing Digital Certificates across the Enterprise
    2018
    Software Security For You Software Security For You
    2015
    Transport Layer Transport Layer
    2015
    The Path of Least Resistance: Computer Security Is Common Sense The Path of Least Resistance: Computer Security Is Common Sense
    2012
    Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force
    2012
    Security Vs. Convenience Security Vs. Convenience
    2012
    Storage and Network Convergence Using FCoE and iSCSI Storage and Network Convergence Using FCoE and iSCSI
    2014