Virtualization Security Term Paper

Length: 3 pages Sources: 3 Subject: Education - Computers Type: Term Paper Paper: #54430097 Related Topics: Firewalls, Computer Security, Microsoft Windows, Cloud Computing
Excerpt from Term Paper :

Virtualization Security


Virtualization: Benefits of XenServer

Disadvantage of XenServer

Virtualization Security Challenges

Implementation of XenServer


The objective of this study is to examine the use of Citrix XenServer which is a free virtualization platform based on the open-source Xen hypervisor and to examine the implications, advantages and disadvantages of having an open-source virtualization product such as XenServer.

XenServer is a "full open source model beginning with the new XenServer 6.2." (Citrix, 2015, p.1) Xenserver provided by Citrix is a paid version however, the upside to the paid version is that it is inclusive of both maintenance and support as well as having CPU socket licensing. It is reported that the "DNA of Xen and open source." (Citrix, 2015, p.1) In addition it is reported that "open source software leads proprietary software in cloud infrastructure [and] open source enables collaborative development and drives public trust." (Citric, 2015, p. 1) Furthermore, open source communities empower users and broaden market reach." (Citrix, 2015, p. 1)

I. Virtualization: Benefits of XenServer

Virtulization is described as "the decoupling of logical computing resources from physical hardware." (Trend Micro, 2015, p. 2) Virtualization offers the opportunity to "provide significant benefits...


By virtualizing and consolidating underutilized XenApp servers, and applications silos the investment in existing IT resources can be maintained while simultaneously reducing server footprint in the datacenter and achieving a far greater degree of server utilization." (Citrix, 2015, p. 6)

In addition virtualization of the server and XenServer's "dynamic workload management...introduces a new and simplified management paradigm for XenApp environments." (Citrix, 2015, p. 6) 'Custom Systems Corporation' states that the advantages of XenServer include that there "is almost no overhead. The Xen Server Host can fit on a small RAID 1 partition, needs very little RAM, and doesn't need to be managed as often as a Windows Host Server." (2014, p. 1) This enables all the fast hard drives and RAM to be allotted to the Virtual Services rather than this taking up the Windows Host Server." ( Custom Systems, 2014, p. 1) The export or migration of a VM with XenServer is quite easy and this is not true of the Microsoft Hyper-V.

II. Disadvantages of XenServer

According to 'Custom Systems' the XenServer is not as easy to manage as Microsoft Hyper-V. While the install goes much quicker, in order to provide proper management of the Virtual…

Sources Used in Documents:


Meeting the Challenges of Virtualization Security (2014) Trend Micro. Retrieved from:

Microsoft Hyper-V vs. Citrix Xen Server (2014) Custom Systems. Retrieved from:

XenServer 6.2 Is Now Fully Open Source (2013) Citrix. Retrieved from;

Clearly better virtualization with Citrix XenServer (nd) Retrieved from:

Cite this Document:

"Virtualization Security" (2015, March 23) Retrieved January 16, 2022, from

"Virtualization Security" 23 March 2015. Web.16 January. 2022. <>

"Virtualization Security", 23 March 2015, Accessed.16 January. 2022,

Related Documents
Security for Networks With Internet Access
Words: 4420 Length: 12 Pages Topic: Education - Computers Paper #: 31313380

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

Security Issues in Cloud Computing
Words: 1450 Length: 5 Pages Topic: Education - Computers Paper #: 95023300

Despite these concerns however the world's largest companies still actively promote and routinely hype the value of cloud computing without mentioning the myriad of risk associated with this platform, despite its continual maturation from a security and stability standpoint [2]. An example of this is type of hype is when Microsoft's Steve Balmer described cloud computing as the next frontier and Dr. Ajei Gopal verified that the cloud is there

Virtualization and Biometrics As Etzioni
Words: 1430 Length: 3 Pages Topic: Education - Computers Paper #: 61852163

Some Key applications are:Physical Acces facility and secure-area access, time-and-attendance monitoring. Growth: Flat, starting at 13% of total market revenues and ending at 14%. Logical Access: PC, networks, mobile devices, kiosks, accounts. Growth: From 21% to 31% of total market revenues. Identity Services: Background check enrollment, credentialing, document issuance. Growth: Decline from 65% to 47% of total market revenues. Surveillance and Monitoring: Time and attendance, watchlists. Growth: From less

Virtualization Technologies Virtualization Refers to
Words: 2722 Length: 8 Pages Topic: Education - Computers Paper #: 80475477

A virtualized environment also meets the requirement of offsite backup storage and geographical compliance requirements. Virtualization is also important to an organization with a mobile workforce because it enhances data concentration hence posing less risk of data loss compared to having the data dispersed on removable media, portable computers or embedded devices while out in the field. If the organizations security staff carefully constructs applications that restrict access and services

Security and Cloud Computing
Words: 2417 Length: 8 Pages Topic: Internet Paper #: 99841160

Cloud Computing: Security Threats & Countermeasures, Auditing and Strategies Regarding the Cloud Abstract The cloud is the latest development in the world of the Information Age. It provides a way for data to be stored, shared, managed, and protected in an efficient and effective manner. This paper looks at some of the security threats and countermeasures that can be conducted to help make the cloud safer. It examines why auditing is essential

Networking, System Support, and Virtualization
Words: 2181 Length: 7 Pages Topic: Education - Computers Paper #: 59722419

Ethical Concerns of the Research This research would adhere to the ethical aspect of studies in order to come up with quality information. One of the main ethical aspects of this research would entail integrity. This involves keeping promises and agreement during the administration of questionnaires and execution of interviews. This relates to the maintenance of confidentiality of the information by the population sample with reference to the agreement terms. The