Mobility

Database Security, Virtualization and Cloud Computing

Free registration required

Executive Summary

Since virtualization is now in use across nearly all enterprises, and future plans to move some applications to Cloud Computing are also in the making, it is time to ask whether one needs to update the IT security methodologies or continue to rely on the same tools the paper has relied on in the past. Many would agree that these computing models require an entirely different approach. Often, it seems network security models lag behind the technology changes occurring in the systems and software environment they are intended to protect. For example, it took firewall vendors a long time to realize that applications are no longer easily protected by simply opening and blocking ports.

  • Format: PDF
  • Size: 550.51 KB