Friday, August 26, 2011

Virtual Machines - Rapid Security Tool Deployment



Virtual Machines - Plenty of you've probably got word of them,

and/or even used them. Particularly those who might possibly have not,

here may be a brief description.

Virtual Machines, or OS Virtualization, allows heterogeneous

operating systems to own simultaneously on the same physical

hardware. Inside of a basic form, imagine running Or windows 7,

Windows 2003 Enterprise Server, and Linux on the same

computer also. Each virtualized operating

system, or environment, has the ways to access disk drives, memory,

video, input devices, and communications devices, all along at the

same time, on the same system.

Before we conclude this content on what virtualization is

used to rapidly and securely deploy security toolsets, we

will give you links to Virtual Machine software you

can deal with over a trial bases (or purchase) and a minimum of

one that is certainly absolutely free.

How We Use Virtual Machines To target different Testing

------------

Although the vast majority of work we do is security

assessment, we routinely deploy security measures for instance

perimeter defense, or enterprise firewall solutions. Many

times, we're also replacing a current immune system and desire

to ensure that as we cut-over in to the new system,

everything will function properly. To illustrate, when

deploying a firewall, or firewall clusters, we could simulate

the cluster design by installed the system into virtual

machines, a single physical system, and try out the internal

firewall to firewall communications. Also, before

deploying the firewalls, we can easily produce a virtual machine to

represent each network protected through the firewalls and test

connectivity / communication on each network e. g. Internet,

private network, DMZ's, along with other protected nets, with

just one system (ordinarily a beefy laptop with a chunk of

memory). This strategy of testing earlier than cutting over has

proven invaluable and mitigates the danger of serious problems

that might prove.

How We Use Virtual Machines In Security Assessments

------------

Each time we participate in a security assessment in a customer,

we utilize specialized and proprietary software / tools.

However, after the assessment is fully gone, and that we begin studying

the next test or new customer, we have to start in a clean

platform. We never develop same OS install or demonstration of

tools to target different testing phases or different customers.

Using Virtualization, we certainly have pre-created many operating

environments along the lines of Windows, Linux, BSD, and Solaris to

name a couple of, with clean installs and hardened operating

systems. These pre-created, secure environments also contain

all hidden tools for your version of customer environment

and security assessment we'll be focusing on. With the help of

Virtual Machines, we will deploy our testing platforms within

minutes, not hours, and start feeling confident these are secure and

ready to work. The reality is, we could carry these types of

ready-to-go operating environments around weight training travel

using high capacity external disk systems. These

size associated with a regular paperback book.

How Else Can Virtual Machines Be Used

------------

The application, use, and selling point of Virtualization is definitely

broad. If anyone is in the house, or technical individuals that aspire to

learn new operating environments, Virtual Machines generally is a

great tool for learning. As opposed to purchasing multiple

physical machines to set up the computer itself and

applications you would like to become educated on, you may

purchase one performance based system, a laptop, and

use virtualization running all of these books immediately. They can be

configured without difficulty to speak in concert.

Another "big" benefit in utilizing Virtual Machines, is because they can

be configured to more efficiently and efficiently utilize

your hardware investment. Such as, in place of

purchasing two mid-range systems to do two different

applications, you possibly can if you buy one an use virtualization

to run them side-by-side. Usually, if you use

dedicated systems for only 1 or two applications, the

hardware is underutilized. Would it not be described as a wise investment if

the server you bought is merely being exercised at say, "25"

percent of their capacity / capability? Virtualization can

help you increase the investment you are in performance

based systems, possesses an added benefit to server

consolidation.

Conclusion

------------

Even if you're just interested in learning Virtual Machine

technology, it might b a fantastic way to learn many elements of

computing and network essentials. There are several major

players throughout the Virtualization industry, similar to VMware.

VMware provides commercial Virtualization products, for

workstation or desktop environments. You should also visit

Xensource, an ideal open-source (without charge ) Virtual Machine

solution. There is a demo you'll be able to download, burn to CD, and

boot from, depends upon can download the product and

install it over a dedicated system.

Regardless with the reason you've for exploring

Virtualization, We can tell you until this technology as going

to manifest as a big player before i write again. In truth, processor

manufacturers are even making plans to make processors

that are Virtual Machine aware.

You may reprint or publish this informative article totally free providing

the bylines are included.

Original URL (The online market place version as soon as i've )

------------

[http://www.defendingthenet.com/NewsLetters/Virtual-Machines]

-Rapid-Deployment-Of-Security-Tools. htm" target=_blank>

Virtual Machines

.