It seems that the data security landscape is constantly changing. Every day, new threats arise and fresh best practices emerge to keep companies at the forefront of protecting sensitive information. PKWARE’s staff of experts in data security share their thoughts in our blog, highlighting the most current topics on data security, management, and reduction. Check back frequently and join the conversation.

Virtual Network Security Risks

Posted by on in Virtualization

Many companies are moving toward network virtualization to increase the speed, efficiency and flexibility of their IT infrastructure. But in the process, they may be compromising network security, playing a "dangerous game of catch-22," explained Enterprise Networking Planet. While companies make the move to virtual networks - sometimes without taking the proper security precautions - the frequency and level of complexity of cyberattacks is increasing. Data encryption may provide one solution for companies that are transitioning their IT into virtual environments.

Security expert Dave Shackleford told TechTarget that some companies make the move to virtual machines without understanding how that will impact security. Virtual machines are a set of files that take the place of a physical machine, explained Shackleford. But instead of having servers in a data center, you have entire systems being controlled from a storage area network (SAN). These SANs may not be secured appropriately.

"For example, VMs sometimes have a separate file for active memory in the case of VM snapshots or backups," explained TechTarget. "When credit cards are being processed, for example, this sensitive data may reside in the memory file, potentially allowing an attacker to [steal the information]."

One solution to this problem is data encryption for dormant virtual machines. By encrypting dormant virtual machines companies can ensure that even if confidential information is stolen from virtual environments, it's not useable. This can be especially important for companies that deal with highly regulated information in a virtual setting.

Comments

  • No comments made yet. Be the first to submit a comment

Leave your comment

Guest Wednesday, 02 October 2013