Almost 40 per cent of implemented server virtualisation may be open to attack.

 

According to a survey by Clavister, more than forty per cent of IT directors and managers that have implemented server virtualisation that may have left their IT networks open to attack because they wrongly believe that security was built in.

 

Of those surveyed, 38 per cent of survey participants admitted that they had already implemented the technology without being sure of its security.

 

Andreas Asander, VP product management at Clavister, said: “When companies implement virtualisation, it is very dangerous for them to believe that everything is automatically secure because they can actually face new security threats.

 

“Virtualisation offers new points of attack and gives access to a far wider number of applications than a traditional physical server. It is vital that IT staff take steps to achieve the same level of security in their virtualised environment that they had in their traditional environment.”

 

The company has encouraged IT managers and directors to re-define their security policy to include the virtualisation aspect and use virtual security gateways which run inside the virtual infrastructure

 

It also encouraged protection of the virtual administration center and only allow access to this from a separate network, limiting the number of administrators who have access to the virtualisation administration tools to a minimum and evaluate and test the security level on a regular basis.