Access Control in Virtual Environments
Source: Fox Technologies
Rapid growth in the use of virtualization tools means system administrators are now able to isolate processes in exclusive run-time environments. While helping reduce issues stemming from program conflicts, software compatibility, and security concerns?. This trend is also multiplying access control and user provisioning problems in the data center. Without centralized identity management and access control, the productivity gains made through virtualization are easily reverted.