【摘 要】 The article focuses on the operational impact of virtualized environment and infrastructure to its security operations. It discusses the application of virtualization technology across to its multiple information technology (IT) servers, applications... 更多 >> The article focuses on the operational impact of virtualized environment and infrastructure to its security operations. It discusses the application of virtualization technology across to its multiple information technology (IT) servers, applications, storage devices and network systems where encapsulated logical instances and abstraction layers are provided. Moreover, it notes about the approaches in dealing security operations in virtualization which involves piercing the veil, synchronizing timestamps globally and collecting logs and configuration changes centrally. << 收起