Automotive Digital Response Management

ResponseLogix Journal

Subscribe to ResponseLogix Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get ResponseLogix Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

ResponseLogix Authors: Catherine Edwards, Maureen O'Gara, Todd Ignasiak, Jeremy Geelan, Nati Shalom

Related Topics: Virtualization Magazine, VMware Journal, Citrix Virtualization Journal, ResponseLogix Journal, Microsoft Developer, Sarbanes Oxley on Ulitzer

News Feed Item

Research and Markets: Virtualization Security Market Analysis - As Organizations Deploy Virtualization the Security Arms-Race is Moving From the Physical World to the Virtual World

Research and Markets ( has announced the addition of the "Virtualization Security Market Analysis" report to their offering.

As organizations deploy virtualization the security arms-race is moving from the physical world to the virtual world. Unfortunately, most enterprises are securing their virtualized systems just as they do their physical servers and desktops. This is a reasonable first step, especially if they rely heavily on host-based measures. However, to exploit virtualization to its fullest enabling IT agility enterprise security teams will have to embrace security tools that can fully cope with servers or desktops that talk to each other in a virtual network, and that may move from place to place, or appear or disappear in an instant.

Included in this market analysis is a detailed matrix describing offerings from vendors, including product features, scalability, architecture, and key competitive differentiators.

  • Size of markets targeted and verticals targeted (a matter of emphasis, not exclusivity)
  • Value proposition and ROI characteristics
  • Hypervisor awareness
  • Virtual environment protection

Primary differentiators include:

  • Scalability
  • Position in virtual architecture
  • Primary attack prevention
  • Compatibility with virtualization platforms
  • Typical implementation scenario
  • Training requirements
  • Compliance support
  • Support options for customer

Companies Mentioned:

  • Altor
  • Apani
  • Blue Lane
  • Catbird Security
  • Citrix
  • Hewlett-Packard
  • Microsoft
  • Montego Networks
  • NetIQ
  • Reflex
  • Shavlik
  • Solera Networks
  • StoneSoft
  • Third Bridage
  • Tripwire and VMWare

Source: The Nemertes Research Group

For more information visit

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.