• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Industry News   »   Current News   »   Virtual IT environments requiring tougher data security measures

Virtual IT environments requiring tougher data security measures

  • Posted on:November 29, 2011
  • Posted in:Current News, Virtualization
  • Posted by:
    Trend Micro
0

Virtualization has been lauded as an important piece of the future of enterprise computing, as companies seek out innovative means for dealing with the data boom of recent years. With the technology, companies maximize their data storage space to ensure they retain all the information necessary for short- and long-term operations.

However, as a new report can attest, it’s imperative that IT departments keep data security considerations in mind when deploying virtual machines. Failing to do so may result in data loss, or leave the company vulnerable to an outside attack.

According the respondents of a recent poll from data management solutions provider Kroll Ontrack, data loss within virtual environments has spiked 140 percent this year compared to 2010. That was evidenced by the 65 percent of respondents who said they frequently suffer a data security incident within their virtual environment.

Among respondents, 53 percent said they have suffered five data loss incidents pertaining to virtualization in the past year. Another 12 percent have experienced more than five, the report found.

Given that virtualization as a technology remains in its infancy, these incidents could be the result of companies’ relative unfamiliarity with such environments. However, that may soon change as more companies move forward in their efforts to deploy virtualization.

According to a poll released recently by enterprise risk consultancy Protiviti, virtualization was found to be among the top priorities for chief information officers during the next 12 months. It joined data security, cloud computing and social media integration, among others, on the list of top technologies.

Furthermore, small- and medium-sized businesses are jumping on the technology’s bandwagon. Though adoption has been relatively slow to this point, that may soon change as the 2011 Small Business Virtualization Poll found that 70 percent of SMBs are interested in the technology, InformationWeek reported. Just 10 percent have already completed a deployment.

According to the Kroll Ontrack report, companies currently utilizing virtualization should implement data protection measures to prevent common occurrences of loss, which include file system corruption, deleted virtual machines and internal virtual disk corruption, among others.

Despite the findings of the Kroll study, experts have also said that virtualization can be utilized to promote data security for mobile devices. With the technology, according to a recent ZDNet blog post, companies can ensure that enterprise and personal data remain separate on employee-owned smartphones and tablets.

Virtualization Security News from SimplySecurity.com by Trend Micro

Related posts:

  1. Security needs follow widespread move to virtual IT
  2. Users must make time for mobile security measures
  3. Maintaining solid security in virtual environments
  4. Security guidance lacking for virtual data management, expert says

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.