Project Management

Network Segmentation in Virtualized Environments

Free registration required

Executive Summary

This paper provides information that will enable to configure virtualized trust zones correctly and deploy them seamlessly. It provides detailed descriptions of three different virtualized trust zone configurations and identifies best practice approaches that enable secure deployment. It is very important to understand that the biggest risk to the virtual environment is misconfiguration, not the technology. Thus strong audit controls are needed to avoid misconfiguration, either accidental or malicious.

  • Format: PDF
  • Size: 596.1 KB