Syrinx Technologies
FOLLOW US
  • Home
  • Company
  • Services
    • Services List
    • Testimonials
  • Blog
  • Publications
    • Podcasts
    • Articles
    • Presentations
  • FAQ
    • FAQ Blog
  • Contact

Q: Are there any additional considerations?

12/20/2012

0 Comments

 
A:
  • Hypervisor security configuration.
  • Virtual network security.
  • Security of server images.
  • Denial of Service (DoS) attacks on underlying hardware.
  • Loss of separation of duties among server administrators.
  • Disaster recovery scenarios.
  • Access control to host & guest servers.
  • Building configuration, security and corporate standards into common virtual server images.
  • Remote access/configuration issues on headless servers.
0 Comments



Leave a Reply.

    Categories

    All
    Applications
    Dial-In
    General Topics
    Pci
    Policies And Procedures
    Social Engineering
    Syrinx Technologies
    Virtualization
    Wireless

    RSS Feed

Powered by Create your own unique website with customizable templates.