Virtualization Technology and Security Challenges

Virtualization Technology and Security Challenges

Ghossoon M. Waleed Al-Saadoon, Ebrahim Al Naemi
DOI: 10.4018/978-1-4666-6583-5.ch014
OnDemand:
(Individual Chapters)
Available
$33.75
List Price: $37.50
10% Discount:-$3.75
TOTAL SAVINGS: $3.75

Abstract

The aim of server virtualization is to eliminate the Hardware equipment in the Datacenter and maximize the utilization of the existing resources. This helps companies in achieving the business goals and objectives in cost effective manner and better support and integration. Virtualization technology changes the protection way of security, as most of hardware and software become after virtualization such as servers, switches, Logical Unit Numbers (LUNs) etc. and it's no longer trying to protect a physical hardware, (Hurwitz & et al, 2013). The overall objective of this chapter is to find out the solution for reducing the keep regular increasing recurring cost and risk involved in information technology management and maintenance. The chapter is about finding out the solution from which it's possible to ultimately lower the cost, speed deployment, provide additional disaster recovery options, and ease testing and developing, and provide unprecedented mobility, flexibility and reliability.
Chapter Preview
Top

Server Consolidation

It is not unusual to achieve 10:1 virtual to physical machine consolidation. This means that ten server applications can be run on a single machine that had required as many physical computers to provide the unique operating system and technical specification environments in order to operate. Server utilization is optimized and legacy software can maintain old Operating System (OS) configurations while new applications are running in VMs with updated platforms.

Although a server supporting many Virtual Memories (VMs) will probably have more memory, CPUs, and other hardware it will use little or no more power and occupy the same physical space reducing utilities costs and real estate expenditures.

Testing and Development

Use of a VM enables rapid deployment by isolating the application in a known and controlled environment. Unknown factors such as mixed libraries caused by numerous installs can be eliminated. Severe crashes that required hours of reinstallation now take moments by simply copying a virtual image.

Dynamic Load Balancing and Disaster Recovery

As server workloads vary, virtualization provides the ability for virtual machines that are over utilizing the resources of a server to be moved to underutilized servers. This dynamic load balancing creates efficient utilization of server resources.

Disaster recovery is a critical component for IT, as system crashes can create huge economic losses. Virtualization technology enables a virtual image on a machine to be instantly re-imaged on another server if a machine failure occurs.

Key Terms in this Chapter

Virtualization Technology: Changes the protection way of security, as most of hardware and software become after virtualization such as servers, switches, Logical Unit Numbers (LUNs) etc. and it’s no longer trying to protect a physical hardware.

Domain Name System (DNS): A hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities.

Exchange Server 2010: Each server that is a member of the DAG can host either an active or passive copy of each of the three total mailbox databases.

Platform Virtualization: Platform virtualization or Hardware virtualization refers to the creation of a virtual machine that acts like a real computer with an operating system.

Disaster Recovery: A critical component for IT, as system crashes can create huge economic losses. Virtualization technology enables a virtual image on a machine to be instantly re-imaged on another server if a machine failure occurs.

Mailbox: Each server that is a member of the DAG is capable of hosting active or passive copies of mailbox databases that reside on servers in the group.

Virtual Machines: When software executed on the virtual machines is separated from the underlying hardware resources. For example, a computer that is running Microsoft Windows may host a virtual machine that looks like a computer with the Ubuntu Linux operating system; Ubuntu-based software can be run on the virtual machine.

Complete Chapter List

Search this Book:
Reset