Scanning InterVM traffic
- Cannot scan Inter-VM traffic with externally based security hardware
- A single compromised virtual machine can infect the entire data center
Risk of attacks on
- Hypervisor management console
- Hypervisor & GuestOS
Exploitation of virtualized web-facing application vulnerabilities by hackers
Protecting virtualized servers from intrusion attacks
User-based access control
- Tying service access and network usage to user Identity
Security hardware cannot offer inline protection
- Traffic flows are invisible; creating blindspots in network
- Cannot conduct forensic analysis and display compliance