Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Security Fears Slow Virtualization

A new study indicates that many enterprises fear the security dangers that virtualization technology may introduce

Concerns about security may be slowing the adoption of virtualization technology, according to a report issued yesterday by research firm emedia.

Half of IT organizations are either using virtualization today or planning to do so within the next 18 months, emedia found in an email survey. More than half (52 percent) say the technology introduces some new security challenges.

Some companies may be putting off their implementations of virtualization because of these concerns. "The advantages of virtualisation appear to be tantalising but it seems that IT managers approach it with caution," says David Clark, managing director at emedia.

"Interestingly, the later the implementation of the technology is scheduled for, the more apprehensive IT professionals seems to be," the research firm says. Some 51 percent of current users think that virtualization poses some new risks, but the figure rises to 57 percent among those planning to use the technology within the next six months -- and to 66 percent among those planning to adopt it within the next six to 18 months.

The study is not the first to suggest that virtualization introduces a new set of security problems. In April, Gartner issued a report that predicts virtual servers will be less secure than physical servers through 2009. (See Gartner: Virtualization Can Weaken Security.)

Among the respondents to the emedia survey, the chief security concerns were about virtualization patching and updates (32 percent), guest-to-guest attacks (27 percent), and the addition of new host software (22 percent).

IT professionals plan to attack these threats by taking various safety measures, including staff training/improving understanding (51 percent), patching/updating/hardening servers (38 percent), using firewalls (30 percent), and separating networks/subnetting/routing (25 percent).

The study also points out that security is only one of several hurdles that are slowing virtualization's adoption. Some of the other obstacles include the lack of a compelling business case for total cost of ownership and return on investment (20 percent), priority given to other network upgrade projects (19 percent), cost/budget constraints (18 percent), and insufficient staff expertise (15 percent).

— Tim Wilson, Site Editor, Dark Reading

  • emedia
  • Gartner Inc. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    44% of Security Threats Start in the Cloud
    Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
    Zero-Factor Authentication: Owning Our Data
    Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    6 Emerging Cyber Threats That Enterprises Face in 2020
    This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
    Flash Poll
    How Enterprises Are Developing and Maintaining Secure Applications
    How Enterprises Are Developing and Maintaining Secure Applications
    The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-9405
    PUBLISHED: 2020-02-26
    IBL Online Weather before 4.3.5a allows unauthenticated reflected XSS via the redirect page.
    CVE-2020-9406
    PUBLISHED: 2020-02-26
    IBL Online Weather before 4.3.5a allows unauthenticated eval injection via the queryBCP method of the Auxiliary Service.
    CVE-2020-9407
    PUBLISHED: 2020-02-26
    IBL Online Weather before 4.3.5a allows attackers to obtain sensitive information by reading the IWEBSERVICE_JSONRPC_COOKIE cookie.
    CVE-2020-9398
    PUBLISHED: 2020-02-25
    ISPConfig before 3.1.15p3, when the undocumented reverse_proxy_panel_allowed=sites option is manually enabled, allows SQL Injection.
    CVE-2015-5201
    PUBLISHED: 2020-02-25
    VDSM and libvirt in Red Hat Enterprise Virtualization Hypervisor (aka RHEV-H) 7-7.x before 7-7.2-20151119.0 and 6-6.x before 6-6.7-20151117.0 as packaged in Red Hat Enterprise Virtualization before 3.5.6 when VSDM is run with -spice disable-ticketing and a VM is suspended and then restored, allows r...