Automotive Digital Response Management

ResponseLogix Journal

Subscribe to ResponseLogix Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get ResponseLogix Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

ResponseLogix Authors: Catherine Edwards, Maureen O'Gara, Todd Ignasiak, Jeremy Geelan, Nati Shalom

Related Topics: Virtualization Magazine, VMware Journal, Citrix Virtualization Journal, ResponseLogix Journal, Cisco Virtualization Journal, Enterprise IT: Moving CapEx to OpEx , IBM Journal, Microsoft Developer

News Feed Item

Research and Markets: The Virtualization Security (VirtSec) Vendor List Has Doubled Since 2008 - "Virtualization Security Key Trends"

Research and Markets ( has announced the addition of the "Virtualization Security Key Trends" report to their offering.

In theory, 2009 should be the year that virtualization security (VirtSec) takes off: Server virtualization has been widely deployed. VirtSec products are ready. The VirtSec vendor list has doubled since 2008. There's just one catch: Enterprises aren't currently planning to deploy the technology. Only 10% of the organizations that participate in our virtualization research have deployed VirtSec and almost 70% have no plans to do so. Why not? As Strother Martin said in the Movie Cool Hand Luke, "What we have here is a failure to communicate."

Vendors have been positioning their solutions by focusing on potential virtualization vulnerabilities. Yet that's not what enterprises care most about. In fact, the overwhelming response to the vendor vulnerability message is "so what's the big deal?" Instead, what's top of mind for enterprise IT practitioners is compliance, yet most VirtSec vendors aren't articulating the ways in which their products can help enterprises address compliance concerns. What's not top of mind - and should be - is that virtualization makes the strong perimeter defense obsolete.

Author(s): Ted Ritter, Senior Research Analyst

Companies Mentioned:

  • Altor
  • Apani
  • Brocade
  • Catbird
  • Centrify
  • Check Point
  • Cisco
  • Citrix
  • Configuesoft
  • HyTrust
  • Juniper
  • Lancope
  • LogLogic
  • McAfee
  • Microsoft
  • NetIQ
  • Red Cannon
  • Reflex Systems
  • Shavlik
  • Sourcefire
  • Stonesoft
  • Third Brigade
  • Tripwire
  • VMware Enterprise Networks (Enterysys)
  • Stonesoft
  • Vericept

For more information visit

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.