Virtual Machines - Plenty of you've probably got word of them,
and/or even used them. Particularly those who might possibly have not,
here may be a brief description.
Virtual Machines, or OS Virtualization, allows heterogeneous
operating systems to own simultaneously on the same physical
hardware. Inside of a basic form, imagine running Or windows 7,
Windows 2003 Enterprise Server, and Linux on the same
computer also. Each virtualized operating
system, or environment, has the ways to access disk drives, memory,
video, input devices, and communications devices, all along at the
same time, on the same system.
Before we conclude this content on what virtualization is
used to rapidly and securely deploy security toolsets, we
will give you links to Virtual Machine software you
can deal with over a trial bases (or purchase) and a minimum of
one that is certainly absolutely free.
How We Use Virtual Machines To target different Testing
------------
Although the vast majority of work we do is security
assessment, we routinely deploy security measures for instance
perimeter defense, or enterprise firewall solutions. Many
times, we're also replacing a current immune system and desire
to ensure that as we cut-over in to the new system,
everything will function properly. To illustrate, when
deploying a firewall, or firewall clusters, we could simulate
the cluster design by installed the system into virtual
machines, a single physical system, and try out the internal
firewall to firewall communications. Also, before
deploying the firewalls, we can easily produce a virtual machine to
represent each network protected through the firewalls and test
connectivity / communication on each network e. g. Internet,
private network, DMZ's, along with other protected nets, with
just one system (ordinarily a beefy laptop with a chunk of
memory). This strategy of testing earlier than cutting over has
proven invaluable and mitigates the danger of serious problems
that might prove.
How We Use Virtual Machines In Security Assessments
------------
Each time we participate in a security assessment in a customer,
we utilize specialized and proprietary software / tools.
However, after the assessment is fully gone, and that we begin studying
the next test or new customer, we have to start in a clean
platform. We never develop same OS install or demonstration of
tools to target different testing phases or different customers.
Using Virtualization, we certainly have pre-created many operating
environments along the lines of Windows, Linux, BSD, and Solaris to
name a couple of, with clean installs and hardened operating
systems. These pre-created, secure environments also contain
all hidden tools for your version of customer environment
and security assessment we'll be focusing on. With the help of
Virtual Machines, we will deploy our testing platforms within
minutes, not hours, and start feeling confident these are secure and
ready to work. The reality is, we could carry these types of
ready-to-go operating environments around weight training travel
using high capacity external disk systems. These
size associated with a regular paperback book.
How Else Can Virtual Machines Be Used
------------
The application, use, and selling point of Virtualization is definitely
broad. If anyone is in the house, or technical individuals that aspire to
learn new operating environments, Virtual Machines generally is a
great tool for learning. As opposed to purchasing multiple
physical machines to set up the computer itself and
applications you would like to become educated on, you may
purchase one performance based system, a laptop, and
use virtualization running all of these books immediately. They can be
configured without difficulty to speak in concert.
Another "big" benefit in utilizing Virtual Machines, is because they can
be configured to more efficiently and efficiently utilize
your hardware investment. Such as, in place of
purchasing two mid-range systems to do two different
applications, you possibly can if you buy one an use virtualization
to run them side-by-side. Usually, if you use
dedicated systems for only 1 or two applications, the
hardware is underutilized. Would it not be described as a wise investment if
the server you bought is merely being exercised at say, "25"
percent of their capacity / capability? Virtualization can
help you increase the investment you are in performance
based systems, possesses an added benefit to server
consolidation.
Conclusion
------------
Even if you're just interested in learning Virtual Machine
technology, it might b a fantastic way to learn many elements of
computing and network essentials. There are several major
players throughout the Virtualization industry, similar to VMware.
VMware provides commercial Virtualization products, for
workstation or desktop environments. You should also visit
Xensource, an ideal open-source (without charge ) Virtual Machine
solution. There is a demo you'll be able to download, burn to CD, and
boot from, depends upon can download the product and
install it over a dedicated system.
Regardless with the reason you've for exploring
Virtualization, We can tell you until this technology as going
to manifest as a big player before i write again. In truth, processor
manufacturers are even making plans to make processors
that are Virtual Machine aware.
You may reprint or publish this informative article totally free providing
the bylines are included.
Original URL (The online market place version as soon as i've )
------------
[http://www.defendingthenet.com/NewsLetters/Virtual-Machines]
-Rapid-Deployment-Of-Security-Tools. htm" target=_blank>
Virtual Machines