September 13, 2012

Securing Virtual Applications and Servers

Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating the security policies of physical environments is not an option because these policies can limit the advantages of virtualization and do not address new security challenges inherent in applications and data residing in virtual server environments.

Virtual applications - applications that have been optimized to run on virtual infrastructures - are typically webbased, making it possible for authorized users to input information, synchronize it, and later access it. Examples include business application servers such as Microsoft Exchange Server, SAP, and Oracle E-Business Suite, as well as custom developed applications typically consisting of a web server, database server, development framework, and the application itself.

To secure these virtual applications, a new security framework must be deployed - one that works within the virtualization layer of the data center, connects it to the physical data center, and addresses additional requirements of scalable, multitenant environments.

Download Paper

Search Webtorials

Get E-News and Notices via Email




I accept Webtorials' Terms and Conditions.

Trending Discussions

See more discussions...

Featured Sponsor Microsites



Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Continuing past this point indicates your acceptance of our terms of use as specified at Terms of Use.

Webtorial® is a registered servicemark of Distributed Networking Associates. The Webtorial logo is a servicemark of Distributed Networking Associates. Copyright 1999-2018, Distributed Networking Associates, Inc.