Virtualization Network Security Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

The visualization has made a great impact on the development of IT technologies and the network communication. Moreover, it is a great benefit from the point of view of saving of the investment for the data centers. The implementation of the virtualization provides the certain advantages to the environment from the point of view of the security.

In case of the theft or the loss of the device, the risk of the important data loss is diminished due to the centralized storage. If the virtual machine is affected by the virus attack, it can be recovered by returning it to the previous state. The implementation of the desktop virtualization provides the additional possibilities for the operational system control, by bringing it into accordance with the requirements of the organization. The visualization decreases the possibilities of the system errors and improves the ways of their solution. The possibility of the roles separation promotes the arrangement of the enterprises activity in accordance with its requirements.

In general, the virtualization gives the new security opportunities for the enterprises. It creates another network “that is a hybrid between the established physically centred network and the new virtual or logical environment”(Virtualization Security,2012). For the purposes of the better security of the network, the virtualisation must be implemented simultaneously with the new virtual infrastructure. The virtualization resulted the creation of the data service centres of the new generation with the improved efficiency and with the readiness for the most critical workloads.

One of the possible solutions for the virtualization is the Microsoft Hyper-V. It is the specific platform that permits the isolated systems to share a single hardware platform.

With the help of the virtualization technology Hyper-V allows to create the virtualized environment and to control it. During the mounting of Hyper-V, the installation of the required components takes place.

Hyper-V provides the infrastructure that allows to realize the virtualization of the applications and the workloads. It permits to fulfil the different tasks, aiming the increasing of the effectiveness of the firm and the cost cutting. For instance the creation and the extension of the private cloud. Hyper-V helps to expand the usage of the common resources and to regulate their usage in accordance with the changing requirements. Hyper-V promotes the effective usage of the equipment. By means of the concentrating of the servers and the workloads on the small part of the more powerful computers, it is possible to reduce the resources consumption. The strategy of the installation of the centralized virtual desktops promotes the faster fulfilment of the business tasks and the incensement of the data security.

Another possible solution is VMware ESXi. It is the hardware hypervisor, which is set directly on the physical server and which separates it on several virtual machines. All the virtual machines use the same resources and may work simultaneously. The Hypervisors control of the VMware ESXi platform is realized by means of the remote control.

The control means of the hypervisor is integrated in the VMkernel. Thereby the volume of the required disc space is decreased up to 150 Mbyte. This fact significantly reduces the sensitivity of the hypervisor to the attacks of the harmful software and the network dangers, making it more reliable and secure.

The VMware ESXI architecture has not many generic parameters and is more convenient in the usage. That is why the virtual infrastructure, which is based on it, is more convenient in servicing.

Reference List

. (2012). Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, July 4). Virtualization Network Security. https://ivypanda.com/essays/virtualization-security-issues/

Work Cited

"Virtualization Network Security." IvyPanda, 4 July 2020, ivypanda.com/essays/virtualization-security-issues/.

References

IvyPanda. (2020) 'Virtualization Network Security'. 4 July.

References

IvyPanda. 2020. "Virtualization Network Security." July 4, 2020. https://ivypanda.com/essays/virtualization-security-issues/.

1. IvyPanda. "Virtualization Network Security." July 4, 2020. https://ivypanda.com/essays/virtualization-security-issues/.


Bibliography


IvyPanda. "Virtualization Network Security." July 4, 2020. https://ivypanda.com/essays/virtualization-security-issues/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1