Virtual Machine Introspection to Detect and Protect

As traditional host security strategies are not well integrated into virtual environments. For example, antivirus scans are a critical component of layered defense-in-depth, but in the cloud they rapidly exhaust available CPU and memory. The cloud environment nevertheless offers a unique opportunity: the ability to peer into a running operating system from an outside perspective, known as Virtual Machine Introspection (VMI).

Provided by: Topic: Virtualization Date Added: Oct 2014 Format: Webcast

Find By Topic