Verified Document

Virtualization Security Term Paper

Virtualization Security ITEM

Virtualization: Benefits of XenServer

Disadvantage of XenServer

Virtualization Security Challenges

Implementation of XenServer

VIRTUALIZATION SECURITY

The objective of this study is to examine the use of Citrix XenServer which is a free virtualization platform based on the open-source Xen hypervisor and to examine the implications, advantages and disadvantages of having an open-source virtualization product such as XenServer.

XenServer is a "full open source model beginning with the new XenServer 6.2." (Citrix, 2015, p.1) Xenserver provided by Citrix is a paid version however, the upside to the paid version is that it is inclusive of both maintenance and support as well as having CPU socket licensing. It is reported that the "DNA of Xen and XenSource...is open source." (Citrix, 2015, p.1) In addition it is reported that "open source software leads proprietary software in cloud infrastructure [and] open source enables collaborative development and drives public trust." (Citric, 2015, p. 1) Furthermore, open source communities empower users and broaden market reach." (Citrix, 2015, p. 1)

I. Virtualization: Benefits of XenServer

Virtulization is described as "the decoupling of logical computing resources from physical hardware." (Trend Micro, 2015, p. 2) Virtualization offers the...

Parts of this document are hidden

View Full Document
svg-one

By virtualizing and consolidating underutilized XenApp servers, and applications silos the investment in existing IT resources can be maintained while simultaneously reducing server footprint in the datacenter and achieving a far greater degree of server utilization." (Citrix, 2015, p. 6)
In addition virtualization of the server and XenServer's "dynamic workload management...introduces a new and simplified management paradigm for XenApp environments." (Citrix, 2015, p. 6) 'Custom Systems Corporation' states that the advantages of XenServer include that there "is almost no overhead. The Xen Server Host can fit on a small RAID 1 partition, needs very little RAM, and doesn't need to be managed as often as a Windows Host Server." (2014, p. 1) This enables all the fast hard drives and RAM to be allotted to the Virtual Services rather than this taking up the Windows Host Server." ( Custom Systems, 2014, p. 1) The export or migration of a VM with XenServer is quite easy and this is not true of the Microsoft Hyper-V.

II. Disadvantages of XenServer

According to 'Custom Systems' the XenServer is not as easy to manage as Microsoft Hyper-V. While the install goes much quicker, in order to provide proper management of the Virtual Servers of XenServer, needed will be an install of the Xen Center Console…

Sources used in this document:
References

Meeting the Challenges of Virtualization Security (2014) Trend Micro. Retrieved from: http://www.trendmicro.com/cloud-content/us/pdfs/business/white-papers/wp_meeting-the-challenges-of-virtualization-security.pdf

Microsoft Hyper-V vs. Citrix Xen Server (2014) Custom Systems. Retrieved from: http://www.customsystems.com/microsoft-hyper-v-vs.-citrix-xen-server/

XenServer 6.2 Is Now Fully Open Source (2013) Citrix. Retrieved from; http://blogs.citrix.com/2013/06/25/xenserver-6-2-is-now-fully-open-source/

Clearly better virtualization with Citrix XenServer (nd) Retrieved from: https://www.moonsoft.fi/materials/citrix_better_virtualization.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Security for Networks With Internet Access
Words: 4420 Length: 12 Document Type: Term Paper

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

Security Issues in Cloud Computing
Words: 1450 Length: 5 Document Type: Data Analysis Chapter

Despite these concerns however the world's largest companies still actively promote and routinely hype the value of cloud computing without mentioning the myriad of risk associated with this platform, despite its continual maturation from a security and stability standpoint [2]. An example of this is type of hype is when Microsoft's Steve Balmer described cloud computing as the next frontier and Dr. Ajei Gopal verified that the cloud is there

Virtualization and Biometrics As Etzioni
Words: 1430 Length: 3 Document Type: Article Review

Some Key applications are:Physical Acces facility and secure-area access, time-and-attendance monitoring. Growth: Flat, starting at 13% of total market revenues and ending at 14%. Logical Access: PC, networks, mobile devices, kiosks, accounts. Growth: From 21% to 31% of total market revenues. Identity Services: Background check enrollment, credentialing, document issuance. Growth: Decline from 65% to 47% of total market revenues. Surveillance and Monitoring: Time and attendance, watchlists. Growth: From less

Virtualization Technologies Virtualization Refers to
Words: 2722 Length: 8 Document Type: Research Paper

A virtualized environment also meets the requirement of offsite backup storage and geographical compliance requirements. Virtualization is also important to an organization with a mobile workforce because it enhances data concentration hence posing less risk of data loss compared to having the data dispersed on removable media, portable computers or embedded devices while out in the field. If the organizations security staff carefully constructs applications that restrict access and services

Security and Cloud Computing
Words: 2417 Length: 8 Document Type: Research Paper

Cloud Computing: Security Threats & Countermeasures, Auditing and Strategies Regarding the Cloud Abstract The cloud is the latest development in the world of the Information Age. It provides a way for data to be stored, shared, managed, and protected in an efficient and effective manner. This paper looks at some of the security threats and countermeasures that can be conducted to help make the cloud safer. It examines why auditing is essential

Networking, System Support, and Virtualization
Words: 2181 Length: 7 Document Type: Research Proposal

Ethical Concerns of the Research This research would adhere to the ethical aspect of studies in order to come up with quality information. One of the main ethical aspects of this research would entail integrity. This involves keeping promises and agreement during the administration of questionnaires and execution of interviews. This relates to the maintenance of confidentiality of the information by the population sample with reference to the agreement terms. The

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now