{"id":14995,"date":"2014-08-20T15:30:05","date_gmt":"2014-08-20T15:30:05","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2400"},"modified":"2020-02-26T18:47:32","modified_gmt":"2020-02-26T16:47:32","slug":"virtual-security-yeah-weve-heard-something","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/virtual-security-yeah-weve-heard-something\/14995\/","title":{"rendered":"Virtual security: yeah, we&#8217;ve heard something"},"content":{"rendered":"<p>IT security professionals \u2013 i.e. people who claim to have expert-level knowledge of the matter \u2013 have very uneven knowledge about securing the virtual environments. As Kaspersky Lab\u2019s\u00a0<a href=\"http:\/\/media.kaspersky.com\/en\/IT_Security_Risks_Survey_2014_Virtualization_report.pdf\" target=\"_blank\" rel=\"noopener nofollow\">2014 IT Security Risks for Virtualization summary report<\/a> has shown, between one-quarter and one-third of these respondents expressed a \u201cclear understanding\u201d of agentless and light agent virtualization security models, respectively, but almost equal number of IT professionals reported weak or lacking understanding there.<\/p>\n<p style=\"text-align: center\">\n<\/p><p>The rest said they have \u201ca reasonable understanding\u201d of agentless, agent-based, and light agent virtualization security.<\/p>\n<p>All that means that a baseline awareness does exist, and it\u2019s rather good, but there\u2019s a Roman Colosseum of room for improvement. For many professionals virtualization is still a somewhat cryptic thing.<\/p><blockquote class=\"twitter-pullquote\"><p>Virtualization security: mostly agent-based #enterprisesec, #Kaspersky, #survey<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F7hfy&amp;text=Virtualization+security%3A+mostly+agent-based+%23enterprisesec%2C+%23Kaspersky%2C+%23survey\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>And that most likely means usage of \u201ctraditional\u201d approach for security of virtual environments, i.e. the very same agent-based one, used to protect the park of \u201creal\u201d, physical hardware. Install a separate copy of a security solution client to every physical device, than equip with the same agent every virtual PC. Get your <a href=\"https:\/\/business.kaspersky.com\/virtualization-security-what-is-light-agent\/\" target=\"_blank\" rel=\"noopener nofollow\">update and scanning storms<\/a> for free and as an extra bonus \u2013 instant-on gaps.<\/p>\n<p>In fact, there\u2019s little fun here. Even less of it shows the aforementioned report: according to its findings, the vast majority (58%) of fully implemented virtualization security solutions ARE \u201cconventional\u201d agent-based ones. However, when asking IT professionals who had only partially implemented a virtualization security solution, the rate of conventional agent-based usage was cut in half to 29%, and newer, more efficient technologies such as light agent and agentless security were used more frequently. So there is a slow drift in the right direction \u2013 actually, that\u2019s only the beginning.<\/p><blockquote class=\"twitter-pullquote\"><p>Businesses just began to implement the right #virtualization #security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F7hfy&amp;text=Businesses+just+began+to+implement+the+right+%23virtualization+%23security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Why that slow? When IT professionals were asked why they had not adopted a security solution designed specifically for their virtual environments, the two most common answers both pointed to the same conclusion: \u201cour existing anti-malware doesn\u2019t give us problems, and protects more effectively than specialized solutions.\u201d<\/p>\n<p>However, third-party testing indicates that these beliefs are misguided and may rely on outdated beliefs that create performance pitfalls for enterprise-level virtual environments. For example, there was a\u00a0<a href=\"https:\/\/www.kaspersky.com\/about\/news\/compare\/2014\/Kaspersky-Lab-Tops-Competitors-in-Testing-of-Security-Software-in-Virtual-Environments\" target=\"_blank\" rel=\"noopener nofollow\">study performed by independent security testers AV-Test<\/a>, in which performance testing compared the results of two \u201ctraditional\u201d security deployments \u2013 using a software agent on each virtual machine \u2013 against Kaspersky Lab\u2019s light agent approach, which shifts the burden of most security tasks away from the endpoint to a separate appliance.<\/p>\n<p>All three solutions detected threats similarly well when performing basic AV tasks, but the differences in performance were plain huge. The traditional security measures consumed between 40%-65% more system resources\u00a0than Kaspersky Lab\u2019s specialized virtual security solution when protecting multiple machines, and could take up to twice as long to boot up virtual machines in heavy load situations. The difference may be not too pronounced when the virtual environment is rather small, but on the large enterprise scale it becomes pure drama.<\/p>\n<p>IT managers and executives are encouraged to learn more about how agentless and light agent security options can significantly boost virtualization ROI by visiting Kaspersky Lab\u2019s\u00a0<a href=\"https:\/\/www.kaspersky.com\/business-security\/virtualization\" target=\"_blank\" rel=\"noopener nofollow\">virtualization security product page<\/a>. The full version of the report can be found <a href=\"http:\/\/media.kaspersky.com\/en\/IT_Security_Risks_Survey_2014_Virtualization_report.pdf\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A recent survey shows that IT professionals have a very uneven understanding of how to protect their virtualization environments. Baseline awareness exists, but there&#8217;s a Roman Colosseum of room for improvement.<\/p>\n","protected":false},"author":209,"featured_media":15850,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3021],"tags":[1091,2154,2155,2089],"class_list":{"0":"post-14995","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-it","10":"tag-it-security-risks","11":"tag-surveys","12":"tag-virtualization-security"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/virtual-security-yeah-weve-heard-something\/14995\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/virtual-security-yeah-weve-heard-something\/14995\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/virtual-security-yeah-weve-heard-something\/14995\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/it\/","name":"it"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/14995","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=14995"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/14995\/revisions"}],"predecessor-version":[{"id":26306,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/14995\/revisions\/26306"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/15850"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=14995"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=14995"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=14995"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}