Virtual Machine Introspection to Detect and Protect

Provided by: SecurityTube.net
Topic: Virtualization
Format: Webcast
As traditional host security strategies are not well integrated into virtual environments. For example, antivirus scans are a critical component of layered defense-in-depth, but in the cloud they rapidly exhaust available CPU and memory. The cloud environment nevertheless offers a unique opportunity: the ability to peer into a running operating system from an outside perspective, known as Virtual Machine Introspection (VMI).

Find By Topic