content top

Time to patch your ESX/Virtualization tools

http://australianit.news.com.au/articles/0,7204,21408667%5E15306,00.html

WRITERS of malicious code are starting to exploit the virtualisation techniques being increasingly used by enterprises, in order to increase the impact of their bot networks, security software seller Symantec says.

Symantec Pacific region vice-president David Sykes says virtualisation offers writers of malicious code the same advantages that it offers legitimate users.
“If you can penetrate the virtualisation code and be part of that, you have harnessed the power of virtualisation for the purposes of that bot.”

Such techniques are in their early days, he says. “We are seeing some initial, exploratory work there.”

Discussing the latest edition of Symantec’s Internet Security Threat Report, Sykes says there are now more than six million bot-infected computers around the world, a 29 per cent increase on the first half of 2006.

The article highlights the importance of patching your ESX/Virtual Iron servers, to minimize vulnerability, and also the importance of those Blue Lane products?  The VirtualShield type solutions? There will be an associated cost, but put that cost against the chance that your ESX infrastructure is down, and the lights are out, and I’ll get the company credit card ready, in the grand scheme of things, typically it’s not that much money for the ability to avoid unnecessary debate.

468 ad

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.