Virtualization Security
ITEM
Virtualization: Benefits of XenServer
Disadvantage of XenServer
Virtualization Security Challenges
Implementation of XenServer
VIRTUALIZATION SECURITY
The objective of this study is to examine the use of Citrix XenServer which is a free virtualization platform based on the open-source Xen hypervisor and to examine the implications, advantages and disadvantages of having an open-source virtualization product such as XenServer.
XenServer is a "full open source model beginning with the new XenServer 6.2." (Citrix, 2015, p.1) Xenserver provided by Citrix is a paid version however, the upside to the paid version is that it is inclusive of both maintenance and support as well as having CPU socket licensing. It is reported that the "DNA of Xen and XenSource...is open source." (Citrix, 2015, p.1) In addition it is reported that "open source software leads proprietary software in cloud infrastructure [and] open source enables collaborative development and drives public trust." (Citric, 2015, p. 1) Furthermore, open source communities empower users and broaden market reach." (Citrix, 2015, p. 1)
I. Virtualization: Benefits of XenServer
Virtulization is described as "the decoupling of logical computing resources from physical hardware." (Trend Micro, 2015, p. 2) Virtualization offers the...
By virtualizing and consolidating underutilized XenApp servers, and applications silos the investment in existing IT resources can be maintained while simultaneously reducing server footprint in the datacenter and achieving a far greater degree of server utilization." (Citrix, 2015, p. 6)
In addition virtualization of the server and XenServer's "dynamic workload management...introduces a new and simplified management paradigm for XenApp environments." (Citrix, 2015, p. 6) 'Custom Systems Corporation' states that the advantages of XenServer include that there "is almost no overhead. The Xen Server Host can fit on a small RAID 1 partition, needs very little RAM, and doesn't need to be managed as often as a Windows Host Server." (2014, p. 1) This enables all the fast hard drives and RAM to be allotted to the Virtual Services rather than this taking up the Windows Host Server." ( Custom Systems, 2014, p. 1) The export or migration of a VM with XenServer is quite easy and this is not true of the Microsoft Hyper-V.
II. Disadvantages of XenServer
According to 'Custom Systems' the XenServer is not as easy to manage as Microsoft Hyper-V. While the install goes much quicker, in order to provide proper management of the Virtual Servers of XenServer, needed will be an install of the Xen Center Console…
Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework
Despite these concerns however the world's largest companies still actively promote and routinely hype the value of cloud computing without mentioning the myriad of risk associated with this platform, despite its continual maturation from a security and stability standpoint [2]. An example of this is type of hype is when Microsoft's Steve Balmer described cloud computing as the next frontier and Dr. Ajei Gopal verified that the cloud is there
Some Key applications are:Physical Acces facility and secure-area access, time-and-attendance monitoring. Growth: Flat, starting at 13% of total market revenues and ending at 14%. Logical Access: PC, networks, mobile devices, kiosks, accounts. Growth: From 21% to 31% of total market revenues. Identity Services: Background check enrollment, credentialing, document issuance. Growth: Decline from 65% to 47% of total market revenues. Surveillance and Monitoring: Time and attendance, watchlists. Growth: From less
A virtualized environment also meets the requirement of offsite backup storage and geographical compliance requirements. Virtualization is also important to an organization with a mobile workforce because it enhances data concentration hence posing less risk of data loss compared to having the data dispersed on removable media, portable computers or embedded devices while out in the field. If the organizations security staff carefully constructs applications that restrict access and services
Cloud Computing: Security Threats & Countermeasures, Auditing and Strategies Regarding the Cloud Abstract The cloud is the latest development in the world of the Information Age. It provides a way for data to be stored, shared, managed, and protected in an efficient and effective manner. This paper looks at some of the security threats and countermeasures that can be conducted to help make the cloud safer. It examines why auditing is essential
Ethical Concerns of the Research This research would adhere to the ethical aspect of studies in order to come up with quality information. One of the main ethical aspects of this research would entail integrity. This involves keeping promises and agreement during the administration of questionnaires and execution of interviews. This relates to the maintenance of confidentiality of the information by the population sample with reference to the agreement terms. The