Browse Wiki & Semantic Web

Jump to: navigation, search
Http://dbpedia.org/resource/Virtual security switch
  This page has no properties.
hide properties that link here 
  No properties link to this page.
 
http://dbpedia.org/resource/Virtual_security_switch
http://dbpedia.org/ontology/abstract A virtual security switch is a software EtA virtual security switch is a software Ethernet switch with embedded security controls within it that runs within virtual environments such as VMware vSphere, Citrix XenDesktop, Microsoft Hyper-V and Virtual Iron. The primary purpose of a virtual security switch is to provide security measures such as isolation, control and content inspection between virtual machines. Virtual machines within enterprise server environments began to gain popularity in 2005 and quickly started to become a standard in the way companies deploy servers and applications. In order to deploy these servers within a virtual environment, a virtual network needed to be formed. As a result, companies such as VMware created a resource called a virtual switch. The purpose of the virtual switch was to provide network connectivity within the virtual environment so that virtual machines and applications could communicate within the virtual network as well as with the physical network. This concept of a virtual network introduced a number of problems, as it related to security within virtual environment, due to only having virtual switching technology within the environment and not security technologies. Unlike physical networks that have switches with access control lists (ACLs), firewalls, antivirus gateways, or intrusion prevention devices, the virtual network was wide open. The virtual security switch concept is one where switching and security have joined forces, so that security controls could be placed within the virtual switch and provide per-port inspection and isolation within the virtual environment. This concept allowed security to get as close as possible to the end points that it intends to protect, without having to reside on the end points (host-based on virtual machines) themselves. By eliminating the need to deploy host-based security solutions on virtual machines, a significant performance improvement can be achieved when deploying security within the virtual environment. This is because virtual machines share computing resources (e.g. CPU time, memory or disk space) while physical servers that have dedicated resources. One way of understanding this, is to picture 20 virtual machines running on a dual-CPU server and each virtual server having its own host-based firewall running on them. This would make up 20 firewalls using the same resources that the 20 virtual machines are using. This defeats the purpose of virtualization, which is to apply those resources to virtual servers not security applications. Deploying security centrally within the virtual environment is in a sense one firewall versus 20 firewalls. a sense one firewall versus 20 firewalls.
http://dbpedia.org/ontology/thumbnail http://commons.wikimedia.org/wiki/Special:FilePath/VirtualSecuritySwitch.jpg?width=300 +
http://dbpedia.org/ontology/wikiPageExternalLink http://sdtimes.com/virtualization-not-just-for-machines-anymore/%7Ctitle=Virtualization: + , http://www.vmware.com/security%7Ctitle=Making + , http://www.networkworld.com/article/2282076/lan-wan/options-seen-lacking-in-firewall-virtual-server-protection.html%7Ctitle=Options +
http://dbpedia.org/ontology/wikiPageID 15221812
http://dbpedia.org/ontology/wikiPageLength 6852
http://dbpedia.org/ontology/wikiPageRevisionID 1079507402
http://dbpedia.org/ontology/wikiPageWikiLink http://dbpedia.org/resource/Virtualization + , http://dbpedia.org/resource/Juniper + , http://dbpedia.org/resource/Network_address_translation + , http://dbpedia.org/resource/Category:Virtualization + , http://dbpedia.org/resource/VMWare + , http://dbpedia.org/resource/Open_source + , http://dbpedia.org/resource/Trojan_horse_%28computing%29 + , http://dbpedia.org/resource/Peer-to-peer_networks + , http://dbpedia.org/resource/Antivirus_software + , http://dbpedia.org/resource/Cisco + , http://dbpedia.org/resource/Virtual_network + , http://dbpedia.org/resource/Virtual_switch + , http://dbpedia.org/resource/VMware_vSphere + , http://dbpedia.org/resource/Ethernet_switch + , http://dbpedia.org/resource/Firewall_%28computing%29 + , http://dbpedia.org/resource/VMware + , http://dbpedia.org/resource/Disk_space + , http://dbpedia.org/resource/Virtual_appliance + , http://dbpedia.org/resource/Linux + , http://dbpedia.org/resource/Router_%28computing%29 + , http://dbpedia.org/resource/Layer_2 + , http://dbpedia.org/resource/MP3 + , http://dbpedia.org/resource/CPU + , http://dbpedia.org/resource/IDG + , http://dbpedia.org/resource/System_administrator + , http://dbpedia.org/resource/Fedora_%28operating_system%29 + , http://dbpedia.org/resource/Business + , http://dbpedia.org/resource/Virtual_firewall + , http://dbpedia.org/resource/Microsoft_Hyper-V + , http://dbpedia.org/resource/Software + , http://dbpedia.org/resource/Hypervisors + , http://dbpedia.org/resource/Access_control_list + , http://dbpedia.org/resource/Virtual_machine + , http://dbpedia.org/resource/Random-access_memory + , http://dbpedia.org/resource/Network_operating_system + , http://dbpedia.org/resource/Intrusion_prevention + , http://dbpedia.org/resource/Virtual_Iron + , http://dbpedia.org/resource/Citrix_XenDesktop + , http://dbpedia.org/resource/Layer_3 + , http://dbpedia.org/resource/Virtual_private_network + , http://dbpedia.org/resource/File:VirtualSecuritySwitch.jpg + , http://dbpedia.org/resource/Operating_system + , http://dbpedia.org/resource/Dynamic_Host_Configuration_Protocol + , http://dbpedia.org/resource/Vyatta + , http://dbpedia.org/resource/Category:Ethernet + , http://dbpedia.org/resource/Disk_image + , http://dbpedia.org/resource/Network_World + , http://dbpedia.org/resource/Server_%28computing%29 +
http://dbpedia.org/property/wikiPageUsesTemplate http://dbpedia.org/resource/Template:Cite_web + , http://dbpedia.org/resource/Template:Virtualization_software + , http://dbpedia.org/resource/Template:More_citations_needed + , http://dbpedia.org/resource/Template:Which + , http://dbpedia.org/resource/Template:Reflist + , http://dbpedia.org/resource/Template:Short_description +
http://purl.org/dc/terms/subject http://dbpedia.org/resource/Category:Ethernet + , http://dbpedia.org/resource/Category:Virtualization +
http://purl.org/linguistics/gold/hypernym http://dbpedia.org/resource/Ethernet +
http://www.w3.org/ns/prov#wasDerivedFrom http://en.wikipedia.org/wiki/Virtual_security_switch?oldid=1079507402&ns=0 +
http://xmlns.com/foaf/0.1/depiction http://commons.wikimedia.org/wiki/Special:FilePath/VirtualSecuritySwitch.jpg +
http://xmlns.com/foaf/0.1/homepage http://vmware.com +
http://xmlns.com/foaf/0.1/isPrimaryTopicOf http://en.wikipedia.org/wiki/Virtual_security_switch +
owl:sameAs https://global.dbpedia.org/id/4xae5 + , http://www.wikidata.org/entity/Q7935167 + , http://dbpedia.org/resource/Virtual_security_switch + , http://rdf.freebase.com/ns/m.03hmcdr +
rdfs:comment A virtual security switch is a software EtA virtual security switch is a software Ethernet switch with embedded security controls within it that runs within virtual environments such as VMware vSphere, Citrix XenDesktop, Microsoft Hyper-V and Virtual Iron. The primary purpose of a virtual security switch is to provide security measures such as isolation, control and content inspection between virtual machines.ntent inspection between virtual machines.
rdfs:label Virtual security switch
hide properties that link here 
http://dbpedia.org/resource/Security_switch + , http://dbpedia.org/resource/Defense_strategy_%28computing%29 + http://dbpedia.org/ontology/wikiPageWikiLink
http://en.wikipedia.org/wiki/Virtual_security_switch + http://xmlns.com/foaf/0.1/primaryTopic
http://dbpedia.org/resource/Virtual_security_switch + owl:sameAs
 

 

Enter the name of the page to start semantic browsing from.