{"id":15005,"date":"2014-09-18T19:17:10","date_gmt":"2014-09-18T19:17:10","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2577"},"modified":"2020-02-26T10:55:47","modified_gmt":"2020-02-26T15:55:47","slug":"virtualization-security-technologies-no-need-to-fear","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/virtualization-security-technologies-no-need-to-fear\/15005\/","title":{"rendered":"Virtualization security technologies: No need to fear"},"content":{"rendered":"<p>While today\u2019s IT security problems are more or less the same everywhere, different industries approach them at different angles with uneven amounts of effort. There are some industries which have more difficulty than others with establishing their security, \u00a0mainly because they are reluctant to adopt newer technologies due to the effort it would take.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Virtualization security technologies: No need to fear #enterprisesec<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fxj67&amp;text=Virtualization+security+technologies%3A+No+need+to+fear+%23enterprisesec\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Let\u2019s take the healthcare industry for instance. It works with a lot of personal data and there has been much in the news recently about medical facilities becoming the victims of the breaches and being the source of massive data leaks. It would be safe to assume this industry would be interested in implementing new security means and associated technologies in order to decrease the amount of pressure from cybercriminals and other information threats.<\/p>\n<p style=\"text-align: center\">\n<\/p><p>However healthcare, just like financial services, is an industry bound by strict compliance laws. These laws are intended to protect the\u00a0personal data these industries are working with, but there\u2019s an extra encumbrance: The financial services and healthcare sectors are ranked the highest in being overwhelmed by compliance requirements. Their response rates are of 40% and 38% respectively, according to <a href=\"http:\/\/media.kaspersky.com\/en\/IT_Security_Risks_Survey_2014_Global_report.pdf\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Lab\u2019s 2014 IT Security Risks<\/a> summary report. The other segments have much lower response rates of this kind \u2013 25-33%.<\/p>\n<p>And this actually does hinder the implementation of new technologies: the less bureaucracy, the better \u2013 at least on the surface.<\/p>\n<p>On the other hand, 49% of healthcare respondents and 50% of financial services respondents reported that \u201csecurity concerns\u201d were hindering their adoption of virtualization technologies. That\u2019s the highest response rate, way above a global average. Security of virtual infrastructure is a newer trend, and its specifics are not always well understood. What is not understood sometimes looks scary.<\/p>\n<p>This data suggests that the perceived \u201csecurity concerns\u201d the survey found to be associated with new virtualization technology is, in part, fueled by concerns over potential extra compliance issues. Also, these industries don\u2019t seem overly concerned with securing the virtual machines they already have.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/05\/06020507\/wide1.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2579\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/05\/06020507\/wide1.jpg\" alt=\"wide\" width=\"1000\" height=\"700\"><\/a><\/p>\n<p>\u00a0<\/p>\n<p>In the financial services industry, \u201cSecurity of Virtualized Infrastructure\u201d was listed as a top IT security concern by only 16% of respondents, and only 12% in healthcare, compared to an overall average of 14%. Why the disparity? The answer could be attributed to the attitude of \u201cif it\u2019s not broken, don\u2019t fix it.\u201d That makes some sense. But in reality, as shown earlier, IT professionals don\u2019t do well when it comes to understanding their virtualization security options, and the vast majority of existing virtualized infrastructure was being protected by traditional \u201cagent-based\u201d security.<\/p>\n<p>Agent-based security is the same style of security used to protect physical endpoints, and this diminishes the primary advantages of virtualization, swallowing computational resources that could be used for the increased productivity \u2013 <a href=\"https:\/\/business.kaspersky.com\/battling-the-strain-kaspersky-security-for-virtualization-vs-instant-on-gaps\/1746\" target=\"_blank\" rel=\"noopener nofollow\">we actually wrote about it earlier this year<\/a>.<\/p>\n<p>We can theorize that IT providers in the compliance-heavy financial services and healthcare sectors are concerned that adding new virtual platforms to their networks may require virtualization-specific security measures which they don\u2019t fully understand.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Fears that virtualization technologies bring more compliance issues hinders a lot #enterprisesec<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fxj67&amp;text=Fears+that+virtualization+technologies+bring+more+compliance+issues+hinders+a+lot+%23enterprisesec\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>If this theory is correct, IT departments in the financial services and healthcare sectors aren\u2019t reaping the potential benefits that virtualized infrastructure can bring to their networks due to fear of an unfamiliar security technology creating compliance issues and other risk-factors.<\/p>\n<p>These fears can be well calmed by more awareness. Modern virtualization security platforms, based on agentless and light agent approaches, can actually reduce the complexity of managing virtual networks, boost overall network performance, and be customized to ensure that security requirements of compliance regulations are fully met. And don\u2019t need to be scary.<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The healthcare and financial services industries are among those especially reluctant to implement newer technologies, security included, and believe they have a good reason for that. <\/p>\n","protected":false},"author":209,"featured_media":15951,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2187,2188,298,2089],"class_list":{"0":"post-15005","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-financial-services","10":"tag-healthcare","11":"tag-it-security","12":"tag-virtualization-security"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/virtualization-security-technologies-no-need-to-fear\/15005\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/virtualization-security-technologies-no-need-to-fear\/15005\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/virtualization-security-technologies-no-need-to-fear\/15005\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/financial-services\/","name":"financial services"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15005","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15005"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15005\/revisions"}],"predecessor-version":[{"id":33322,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15005\/revisions\/33322"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15951"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15005"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15005"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15005"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}