Virtualization is the process of running multiple virtual instances of a device on a single physical hardware resource. Security virtualization is the process, procedure and policy that ensures that the virtualized hardware infrastructure is secure and protected.
Problems Security Virtualization Addresses
Virtualization centralizes administrative tasks while improving scalability and workloads, and leads to the consolidation of network infrastructure, lower OPEX, and ease of management. However, virtualization also introduces security challenges that physical security systems cannot adequately protect against:
File sharing between hosts and guests is not secure.
Isolation between components such as guest OSs and applications, hypervisors, hardware are weakened.
Multiple servers are consolidated which increases the risk that a compromise may spread from applications on the same host.
For intrusion prevention systems (IPS), malware targeted for physical and virtual machines causes infection via the virtual network. Other security threats include unauthorized access, denial of service, and exploits.
Many organizations do not realize that using their existing legacy security solutions can expose them to these types of attacks and data loss.
Security virtualization acts as a barrier to secure perimeter access to a network. It provides dedicated security services and assured traffic isolation within the cloud, along with customizable firewall controls as an additional managed service. Enterprises and service providers can leverage their virtualization investment to create a granular security perimeter, giving dedicated security resources within a cloud construct to tenants and service subscribers.