Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

With Virtual Machines, Management Is Key: Page 2 of 3

With forethought, virtual servers with complementary usage loads can comfortably share the same physical platform. An enterprise-class server running multicore processors optimized for virtualization (AMD-V, Intel VT) can easily host five, 10, or more guest operating systems.

CONTROL AND EXPOSURE
Problem is, even magic bullets can misfire. The ease and speed with which virtualized servers can be deployed on a host platform is tempting some IT pros to bypass the formal, established change-control processes most organizations have in place. Don't do it. It's too easy to deploy a noncompliant guest server on a host running mission-critical production VMs, increasing risk. When VM-specific security policies are lacking, plan/build/run disciplines are abridged to launch/run/pray.

Traditional safety nets in the form of IP-based security tools may be ineffective because VM communications within a host server never venture onto the physical network. VMs could be at risk of attack from a compromised guest.

The answer is to remember that a server running as a VM is still a server, with all the requisite maintenance and management requirements. IT shops have never had this level of flexibility and creative control in client-server environments, but we've also never had this level of exposure.

While traditional operations center management vendors are upgrading their products to support virtualized machines, new entrants such as Cirba are releasing analysis and management software targeting VMotion environments.