Virtualization Security: Where’s The Innovation?
Virtualization is standard operating procedure. It also breaks conventional defense mechanisms by hindering visibility and control, creating new attack avenues, increasing complexity, and blurring administrative roles between network and server teams. Our 2012 InformationWeek State of the Data Center Survey shows there’s no going back, even if we wanted to: Half of 256 respondents will have at least 50% of their production servers virtualized by the end of next year; 26% will have 75% or more. So it’s unfortunate that innovation in the virtualization security market is stalled. The holdup is twofold: First, the lack of a publicized breach targeting the hypervisor has made IT complacent. And second, there’s an unwillingness among vendors to take on VMware; it owns most of the market and controls the APIs, a big deal given the scant enterprise adoption of rival server hypervisors.
That leaves us with a limited number of major products for hypervisor network security. Two of them, VMware’s own vShield and Juniper’s vGW (Virtual Gateway, acquired from Altor), use the APIs provided under VMware’s VMsafe security program. Cisco, the other big player in this market, bases its technology around the proprietary Nexus 1000V virtual switch, which was developed in cooperation with VMware but isn’t dependent on VMsafe.
To learn more and to read the entire article at its source, please refer to the following page, Virtualization Security: Where’s The Innovation?- InformationWeek