<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security &#8211; Virtualization.net &#8211; Cloud Computing SDN SDDC Virtualization News</title>
	<atom:link href="https://www.virtualization.net/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.virtualization.net</link>
	<description></description>
	<lastBuildDate>Tue, 26 Apr 2016 17:48:43 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.4</generator>
	<item>
		<title>Automated Security Hardening with OpenStack-Ansible</title>
		<link>https://www.virtualization.net/automated-security-hardening-with-openstack-ansible-10838/</link>
		
		<dc:creator><![CDATA[Virtualization.net Staff]]></dc:creator>
		<pubDate>Tue, 26 Apr 2016 17:48:43 +0000</pubDate>
				<category><![CDATA[Videos]]></category>
		<category><![CDATA[ansible]]></category>
		<category><![CDATA[Automation]]></category>
		<category><![CDATA[hardening]]></category>
		<category><![CDATA[OpenStack]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[security hardening]]></category>
		<category><![CDATA[threat]]></category>
		<guid isPermaLink="false">http://www.virtualization.net/?p=10838</guid>

					<description><![CDATA[<p><img width="480" height="360" src="https://www.virtualization.net/wp-content/uploads/2016/04/Automated-Security-Hardening-with-OpenStack-Ansible.jpg" class="attachment-large size-large wp-post-image" alt="" style="width:100%;height:75%;max-width:480px;float:left; margin:0 15px 15px 0;" decoding="async" fetchpriority="high" srcset="https://www.virtualization.net/wp-content/uploads/2016/04/Automated-Security-Hardening-with-OpenStack-Ansible.jpg 480w, https://www.virtualization.net/wp-content/uploads/2016/04/Automated-Security-Hardening-with-OpenStack-Ansible-336x252.jpg 336w, https://www.virtualization.net/wp-content/uploads/2016/04/Automated-Security-Hardening-with-OpenStack-Ansible-80x60.jpg 80w, https://www.virtualization.net/wp-content/uploads/2016/04/Automated-Security-Hardening-with-OpenStack-Ansible-100x75.jpg 100w, https://www.virtualization.net/wp-content/uploads/2016/04/Automated-Security-Hardening-with-OpenStack-Ansible-180x135.jpg 180w, https://www.virtualization.net/wp-content/uploads/2016/04/Automated-Security-Hardening-with-OpenStack-Ansible-238x178.jpg 238w" sizes="(max-width: 480px) 100vw, 480px" />Deploying clouds involves plenty of moving pieces. A threat, actual OpenStack code, the dependencies, the operating system, and hardware. it is no surprise that functionality often takes priority over security, but OpenStack-Ansible security role is trying to make that process easier. The openstack-ansible-security role delivers strong security enhancements (based on the Security Technical Implementation Guide&#8230; <a class="more-link" href="https://www.virtualization.net/automated-security-hardening-with-openstack-ansible-10838/">Continue reading <span class="screen-reader-text">Automated Security Hardening with OpenStack-Ansible</span></a></p>
<p>The post <a rel="nofollow" href="https://www.virtualization.net/automated-security-hardening-with-openstack-ansible-10838/">Automated Security Hardening with OpenStack-Ansible</a> appeared first on <a rel="nofollow" href="https://www.virtualization.net">Virtualization.net - Cloud Computing SDN SDDC Virtualization News</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Webinar &#8211; Garland &#038; Big Switch: Enabling Low-cost 100G Monitoring for Visibility and Security</title>
		<link>https://www.virtualization.net/webinar-garland-big-switch-enabling-low-cost-100g-monitoring-for-visibility-and-security-10793/</link>
		
		<dc:creator><![CDATA[Virtualization.net Staff]]></dc:creator>
		<pubDate>Wed, 27 Jan 2016 17:13:50 +0000</pubDate>
				<category><![CDATA[Videos]]></category>
		<category><![CDATA[100g]]></category>
		<category><![CDATA[big switch]]></category>
		<category><![CDATA[garland]]></category>
		<category><![CDATA[Monitoring]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[webinar]]></category>
		<guid isPermaLink="false">http://www.virtualization.net/?p=10793</guid>

					<description><![CDATA[<p><img width="480" height="360" src="https://www.virtualization.net/wp-content/uploads/2016/01/Webinar-Garland-Big-Switch-Enabling-Low-cost-100G-Monitoring-for-Visibility-and-Security.jpg" class="attachment-large size-large wp-post-image" alt="" style="width:100%;height:75%;max-width:480px;float:left; margin:0 15px 15px 0;" decoding="async" srcset="https://www.virtualization.net/wp-content/uploads/2016/01/Webinar-Garland-Big-Switch-Enabling-Low-cost-100G-Monitoring-for-Visibility-and-Security.jpg 480w, https://www.virtualization.net/wp-content/uploads/2016/01/Webinar-Garland-Big-Switch-Enabling-Low-cost-100G-Monitoring-for-Visibility-and-Security-336x252.jpg 336w, https://www.virtualization.net/wp-content/uploads/2016/01/Webinar-Garland-Big-Switch-Enabling-Low-cost-100G-Monitoring-for-Visibility-and-Security-80x60.jpg 80w, https://www.virtualization.net/wp-content/uploads/2016/01/Webinar-Garland-Big-Switch-Enabling-Low-cost-100G-Monitoring-for-Visibility-and-Security-100x75.jpg 100w, https://www.virtualization.net/wp-content/uploads/2016/01/Webinar-Garland-Big-Switch-Enabling-Low-cost-100G-Monitoring-for-Visibility-and-Security-180x135.jpg 180w, https://www.virtualization.net/wp-content/uploads/2016/01/Webinar-Garland-Big-Switch-Enabling-Low-cost-100G-Monitoring-for-Visibility-and-Security-238x178.jpg 238w" sizes="(max-width: 480px) 100vw, 480px" />Learn how Big Switch SDN fabric and Garland TAPs enable low-cost 10G/40G/100G pervasive monitoring. In this recorded webinar, discover how Garland Technology’s network TAPs are deployed with Big Switch’s Big Monitoring Fabric to provide a 10G/40G/100G monitoring solution that is operationally simple, highly scalable, and cost-effective for enterprise, service provider and web-scale/SaaS data centers. The&#8230; <a class="more-link" href="https://www.virtualization.net/webinar-garland-big-switch-enabling-low-cost-100g-monitoring-for-visibility-and-security-10793/">Continue reading <span class="screen-reader-text">Webinar &#8211; Garland &#038; Big Switch: Enabling Low-cost 100G Monitoring for Visibility and Security</span></a></p>
<p>The post <a rel="nofollow" href="https://www.virtualization.net/webinar-garland-big-switch-enabling-low-cost-100g-monitoring-for-visibility-and-security-10793/">Webinar &#8211; Garland &#038; Big Switch: Enabling Low-cost 100G Monitoring for Visibility and Security</a> appeared first on <a rel="nofollow" href="https://www.virtualization.net">Virtualization.net - Cloud Computing SDN SDDC Virtualization News</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Security enforcement, from OS to image to VM for Production OpenStack Cloud</title>
		<link>https://www.virtualization.net/security-enforcement-from-os-to-image-to-vm-for-production-openstack-cloud-9832/</link>
		
		<dc:creator><![CDATA[Videos]]></dc:creator>
		<pubDate>Fri, 10 Jul 2015 12:16:12 +0000</pubDate>
				<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[OpenStack]]></category>
		<category><![CDATA[openstack summit 2015]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Summit]]></category>
		<guid isPermaLink="false">http://www.virtualization.net/?p=9832</guid>

					<description><![CDATA[<p><img width="750" height="422" src="https://www.virtualization.net/wp-content/uploads/2015/05/Security-enforcement-from-OS-to-image-to-VM-for-Production-OpenStack-Cloud.jpg" class="attachment-large size-large wp-post-image" alt="" style="width:100%;height:56.25%;max-width:1920px;float:left; margin:0 15px 15px 0;" decoding="async" srcset="https://www.virtualization.net/wp-content/uploads/2015/05/Security-enforcement-from-OS-to-image-to-VM-for-Production-OpenStack-Cloud.jpg 1920w, https://www.virtualization.net/wp-content/uploads/2015/05/Security-enforcement-from-OS-to-image-to-VM-for-Production-OpenStack-Cloud-336x189.jpg 336w, https://www.virtualization.net/wp-content/uploads/2015/05/Security-enforcement-from-OS-to-image-to-VM-for-Production-OpenStack-Cloud-640x360.jpg 640w" sizes="(max-width: 750px) 100vw, 750px" />Suning Cloud Commerceis one of the largest privately owned retailers in China. Suning has more than 1600 stores covering over 700 cities of Mainland China, Hong Kong and Japan, and its e-commerce platform, Suning.com ranks among top three Chinese B2C companies. There are more than 180,000 employees, thousands of mixed power, x86, storage servers and&#8230; <a class="more-link" href="https://www.virtualization.net/security-enforcement-from-os-to-image-to-vm-for-production-openstack-cloud-9832/">Continue reading <span class="screen-reader-text">Security enforcement, from OS to image to VM for Production OpenStack Cloud</span></a></p>
<p>The post <a rel="nofollow" href="https://www.virtualization.net/security-enforcement-from-os-to-image-to-vm-for-production-openstack-cloud-9832/">Security enforcement, from OS to image to VM for Production OpenStack Cloud</a> appeared first on <a rel="nofollow" href="https://www.virtualization.net">Virtualization.net - Cloud Computing SDN SDDC Virtualization News</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Security through community: How the security group is building security into each OpenStack release</title>
		<link>https://www.virtualization.net/how-the-security-group-is-building-security-into-each-openstack-release-9709/</link>
		
		<dc:creator><![CDATA[Videos]]></dc:creator>
		<pubDate>Mon, 01 Jun 2015 13:10:40 +0000</pubDate>
				<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[OpenStack]]></category>
		<category><![CDATA[openstack summit 2015]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Summit]]></category>
		<guid isPermaLink="false">http://www.virtualization.net/?p=9709</guid>

					<description><![CDATA[<p><img width="750" height="422" src="https://www.virtualization.net/wp-content/uploads/2015/05/Security-through-community-How-the-security-group-is-building-security-into-each-OpenStack-release.jpg" class="attachment-large size-large wp-post-image" alt="" style="width:100%;height:56.25%;max-width:1920px;float:left; margin:0 15px 15px 0;" decoding="async" srcset="https://www.virtualization.net/wp-content/uploads/2015/05/Security-through-community-How-the-security-group-is-building-security-into-each-OpenStack-release.jpg 1920w, https://www.virtualization.net/wp-content/uploads/2015/05/Security-through-community-How-the-security-group-is-building-security-into-each-OpenStack-release-336x189.jpg 336w, https://www.virtualization.net/wp-content/uploads/2015/05/Security-through-community-How-the-security-group-is-building-security-into-each-OpenStack-release-640x360.jpg 640w" sizes="(max-width: 750px) 100vw, 750px" />The OpenStack Security Group exists to actively drive security features, best practice and guidance into OpenStack services. In the last year a number of projects have taken off and are now ready for wider adoption in OpenStack. In this talk we review the various projects that are currently running as part of the OSSG and&#8230; <a class="more-link" href="https://www.virtualization.net/how-the-security-group-is-building-security-into-each-openstack-release-9709/">Continue reading <span class="screen-reader-text">Security through community: How the security group is building security into each OpenStack release</span></a></p>
<p>The post <a rel="nofollow" href="https://www.virtualization.net/how-the-security-group-is-building-security-into-each-openstack-release-9709/">Security through community: How the security group is building security into each OpenStack release</a> appeared first on <a rel="nofollow" href="https://www.virtualization.net">Virtualization.net - Cloud Computing SDN SDDC Virtualization News</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Detecting targeted cyber attacks in the cloud</title>
		<link>https://www.virtualization.net/detecting-targeted-cyber-attacks-in-the-cloud-9675/</link>
		
		<dc:creator><![CDATA[Videos]]></dc:creator>
		<pubDate>Wed, 27 May 2015 22:41:39 +0000</pubDate>
				<category><![CDATA[Videos]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[OpenStack]]></category>
		<category><![CDATA[openstack summit 2015]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.virtualization.net/?p=9675</guid>

					<description><![CDATA[<p><img width="750" height="422" src="https://www.virtualization.net/wp-content/uploads/2015/05/Detecting-targeted-cyber-attacks-in-the-cloud.jpg" class="attachment-large size-large wp-post-image" alt="" style="width:100%;height:56.25%;max-width:1920px;float:left; margin:0 15px 15px 0;" decoding="async" srcset="https://www.virtualization.net/wp-content/uploads/2015/05/Detecting-targeted-cyber-attacks-in-the-cloud.jpg 1920w, https://www.virtualization.net/wp-content/uploads/2015/05/Detecting-targeted-cyber-attacks-in-the-cloud-336x189.jpg 336w, https://www.virtualization.net/wp-content/uploads/2015/05/Detecting-targeted-cyber-attacks-in-the-cloud-640x360.jpg 640w" sizes="(max-width: 750px) 100vw, 750px" />These days, we see an increasing number of cyber-attacks affecting both public and private clouds. According to reports by antivirus companies, clouds can be used by botnets as well as by special services or cyber criminals to run targeted attacks with the purpose of collecting sensitive information in enterprise networks or government institutions. Current detection&#8230; <a class="more-link" href="https://www.virtualization.net/detecting-targeted-cyber-attacks-in-the-cloud-9675/">Continue reading <span class="screen-reader-text">Detecting targeted cyber attacks in the cloud</span></a></p>
<p>The post <a rel="nofollow" href="https://www.virtualization.net/detecting-targeted-cyber-attacks-in-the-cloud-9675/">Detecting targeted cyber attacks in the cloud</a> appeared first on <a rel="nofollow" href="https://www.virtualization.net">Virtualization.net - Cloud Computing SDN SDDC Virtualization News</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Ixia Leverages Virtualization to Help Enterprises Ensure Security Resilience</title>
		<link>https://www.virtualization.net/ixia-leverages-virtualization-help-enterprises-ensure-security-resilience-9459/</link>
		
		<dc:creator><![CDATA[Ixia]]></dc:creator>
		<pubDate>Wed, 11 Feb 2015 12:10:05 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[BreakingPoint]]></category>
		<category><![CDATA[Ixia]]></category>
		<category><![CDATA[Release]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[virtualization]]></category>
		<category><![CDATA[virtualization security]]></category>
		<guid isPermaLink="false">http://www.virtualization.net/?p=9459</guid>

					<description><![CDATA[<p><img width="750" height="450" src="https://www.virtualization.net/wp-content/uploads/2015/02/virtualization-security.jpg" class="attachment-large size-large wp-post-image" alt="virtualization security" style="width:100%;height:60%;max-width:800px;float:left; margin:0 15px 15px 0;" decoding="async" srcset="https://www.virtualization.net/wp-content/uploads/2015/02/virtualization-security.jpg 800w, https://www.virtualization.net/wp-content/uploads/2015/02/virtualization-security-336x202.jpg 336w, https://www.virtualization.net/wp-content/uploads/2015/02/virtualization-security-640x384.jpg 640w" sizes="(max-width: 750px) 100vw, 750px" />Ixia (Nasdaq: XXIA), a leading provider of application performance and security resilience solutions, announced that its BreakingPoint solution, an industry-leading security resilience solution, is now offered as virtualized software. The new BreakingPoint Virtual Edition (VE) solution provides enterprise IT departments with the same high-fidelity, real-world validation that security vendors and leading service providers use to&#8230; <a class="more-link" href="https://www.virtualization.net/ixia-leverages-virtualization-help-enterprises-ensure-security-resilience-9459/">Continue reading <span class="screen-reader-text">Ixia Leverages Virtualization to Help Enterprises Ensure Security Resilience</span></a></p>
<p>The post <a rel="nofollow" href="https://www.virtualization.net/ixia-leverages-virtualization-help-enterprises-ensure-security-resilience-9459/">Ixia Leverages Virtualization to Help Enterprises Ensure Security Resilience</a> appeared first on <a rel="nofollow" href="https://www.virtualization.net">Virtualization.net - Cloud Computing SDN SDDC Virtualization News</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Lancope Enhances Network Visibility and Security Analytics in StealthWatch System 6.6</title>
		<link>https://www.virtualization.net/lancope-enhances-network-visibility-security-analytics-stealthwatch-system-6-6-9453/</link>
		
		<dc:creator><![CDATA[Virtualization.net Staff]]></dc:creator>
		<pubDate>Mon, 09 Feb 2015 13:28:09 +0000</pubDate>
				<category><![CDATA[Network Virtualization]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[network analytics]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[Release]]></category>
		<category><![CDATA[security analytics]]></category>
		<category><![CDATA[StealthWatch System]]></category>
		<guid isPermaLink="false">http://www.virtualization.net/?p=9453</guid>

					<description><![CDATA[<p><img width="750" height="519" src="https://www.virtualization.net/wp-content/uploads/2015/02/network-security-analytics-cloud.jpg" class="attachment-large size-large wp-post-image" alt="Security Analytics" style="width:100%;height:69.14%;max-width:1024px;float:left; margin:0 15px 15px 0;" decoding="async" srcset="https://www.virtualization.net/wp-content/uploads/2015/02/network-security-analytics-cloud.jpg 1024w, https://www.virtualization.net/wp-content/uploads/2015/02/network-security-analytics-cloud-336x232.jpg 336w, https://www.virtualization.net/wp-content/uploads/2015/02/network-security-analytics-cloud-640x443.jpg 640w" sizes="(max-width: 750px) 100vw, 750px" />Lancope, Inc., a leader in network visibility and security intelligence, has unveiled the latest version of its context-aware security analytics platform, StealthWatch® System 6.6. With new security algorithms, enhanced network visualization, and more operationalized threat intelligence, the new platform enables enterprises to more quickly and effectively detect and respond to advanced threats. &#8220;Many enterprises have&#8230; <a class="more-link" href="https://www.virtualization.net/lancope-enhances-network-visibility-security-analytics-stealthwatch-system-6-6-9453/">Continue reading <span class="screen-reader-text">Lancope Enhances Network Visibility and Security Analytics in StealthWatch System 6.6</span></a></p>
<p>The post <a rel="nofollow" href="https://www.virtualization.net/lancope-enhances-network-visibility-security-analytics-stealthwatch-system-6-6-9453/">Lancope Enhances Network Visibility and Security Analytics in StealthWatch System 6.6</a> appeared first on <a rel="nofollow" href="https://www.virtualization.net">Virtualization.net - Cloud Computing SDN SDDC Virtualization News</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Trend Micro Alerts U.S. Market of New Adobe Flash Zero-Day Exploit</title>
		<link>https://www.virtualization.net/trend-micro-alerts-us-market-of-new-adobe-flash-zero-day-exploit-9274/</link>
		
		<dc:creator><![CDATA[Trend Micro]]></dc:creator>
		<pubDate>Mon, 02 Feb 2015 20:36:39 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[Flash]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[Trend Micro]]></category>
		<category><![CDATA[zero-day]]></category>
		<guid isPermaLink="false">http://www.virtualization.net/?p=9274</guid>

					<description><![CDATA[<p><img width="750" height="422" src="https://www.virtualization.net/wp-content/uploads/2015/02/Flash_Update.jpg" class="attachment-large size-large wp-post-image" alt="" style="width:100%;height:56.21%;max-width:950px;float:left; margin:0 15px 15px 0;" decoding="async" srcset="https://www.virtualization.net/wp-content/uploads/2015/02/Flash_Update.jpg 950w, https://www.virtualization.net/wp-content/uploads/2015/02/Flash_Update-336x189.jpg 336w, https://www.virtualization.net/wp-content/uploads/2015/02/Flash_Update-640x360.jpg 640w" sizes="(max-width: 750px) 100vw, 750px" />Trend Micro Incorporated (TYO: 4704) (TSE: 4704) researchers have discovered a new zero-day critical vulnerability (CVE-2015-0313) affecting all versions of Adobe Flash Player on Microsoft Windows and Apple Mac OSX. Researchers have identified active attacks using malicious advertisements or “malvertisements” against Microsoft Windows systems. This vulnerability has been confirmed by Adobe and the two companies&#8230; <a class="more-link" href="https://www.virtualization.net/trend-micro-alerts-us-market-of-new-adobe-flash-zero-day-exploit-9274/">Continue reading <span class="screen-reader-text">Trend Micro Alerts U.S. Market of New Adobe Flash Zero-Day Exploit</span></a></p>
<p>The post <a rel="nofollow" href="https://www.virtualization.net/trend-micro-alerts-us-market-of-new-adobe-flash-zero-day-exploit-9274/">Trend Micro Alerts U.S. Market of New Adobe Flash Zero-Day Exploit</a> appeared first on <a rel="nofollow" href="https://www.virtualization.net">Virtualization.net - Cloud Computing SDN SDDC Virtualization News</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Magnus Cloud Introduces Breakthrough Approach in Defending Against Bot-based Cyber Attacks</title>
		<link>https://www.virtualization.net/magnus-cloud-defending-bot-cyber-attacks-9270/</link>
					<comments>https://www.virtualization.net/magnus-cloud-defending-bot-cyber-attacks-9270/#comments</comments>
		
		<dc:creator><![CDATA[Magnus Cloud]]></dc:creator>
		<pubDate>Mon, 02 Feb 2015 19:32:24 +0000</pubDate>
				<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[Magnus Cloud]]></category>
		<category><![CDATA[network security]]></category>
		<guid isPermaLink="false">http://www.virtualization.net/?p=9270</guid>

					<description><![CDATA[<p><img width="620" height="465" src="https://www.virtualization.net/wp-content/uploads/2015/02/cloud-security.jpg" class="attachment-large size-large wp-post-image" alt="" style="width:100%;height:75%;max-width:620px;float:left; margin:0 15px 15px 0;" decoding="async" srcset="https://www.virtualization.net/wp-content/uploads/2015/02/cloud-security.jpg 620w, https://www.virtualization.net/wp-content/uploads/2015/02/cloud-security-336x252.jpg 336w, https://www.virtualization.net/wp-content/uploads/2015/02/cloud-security-80x60.jpg 80w, https://www.virtualization.net/wp-content/uploads/2015/02/cloud-security-100x75.jpg 100w, https://www.virtualization.net/wp-content/uploads/2015/02/cloud-security-180x135.jpg 180w, https://www.virtualization.net/wp-content/uploads/2015/02/cloud-security-238x178.jpg 238w" sizes="(max-width: 620px) 100vw, 620px" />Magnus Cloud announced today general availability of its cloud-based service that represents a significant breakthrough in defending against the most dangerous Cyber-attacks, including sophisticated bot-based attacks at Layer 7/application layer. Using a deterministic protocol that can always identify whether a bot is hostile or benign, the service eliminates the intrinsic weakness of signature-based approaches used&#8230; <a class="more-link" href="https://www.virtualization.net/magnus-cloud-defending-bot-cyber-attacks-9270/">Continue reading <span class="screen-reader-text">Magnus Cloud Introduces Breakthrough Approach in Defending Against Bot-based Cyber Attacks</span></a></p>
<p>The post <a rel="nofollow" href="https://www.virtualization.net/magnus-cloud-defending-bot-cyber-attacks-9270/">Magnus Cloud Introduces Breakthrough Approach in Defending Against Bot-based Cyber Attacks</a> appeared first on <a rel="nofollow" href="https://www.virtualization.net">Virtualization.net - Cloud Computing SDN SDDC Virtualization News</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.virtualization.net/magnus-cloud-defending-bot-cyber-attacks-9270/feed/</wfw:commentRss>
			<slash:comments>8</slash:comments>
		
		
			</item>
		<item>
		<title>New McAfee Server Security Suites Offer Comprehensive Protection for the Hybrid Data Center</title>
		<link>https://www.virtualization.net/new-mcafee-server-security-suites-offer-comprehensive-protection-hybrid-data-center-7462/</link>
		
		<dc:creator><![CDATA[McAfee, Inc.]]></dc:creator>
		<pubDate>Wed, 27 Aug 2014 10:41:12 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[datacenter security]]></category>
		<category><![CDATA[hybrid]]></category>
		<category><![CDATA[McAfee]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[server security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[vmware]]></category>
		<category><![CDATA[vmworld]]></category>
		<category><![CDATA[VMworld 2014]]></category>
		<guid isPermaLink="false">http://www.virtualization.net/?p=7462</guid>

					<description><![CDATA[<p><img width="640" height="365" src="https://www.virtualization.net/wp-content/uploads/2014/08/Datacenter.jpg" class="attachment-large size-large wp-post-image" alt="" style="width:100%;height:57.03%;max-width:640px;float:left; margin:0 15px 15px 0;" decoding="async" srcset="https://www.virtualization.net/wp-content/uploads/2014/08/Datacenter.jpg 640w, https://www.virtualization.net/wp-content/uploads/2014/08/Datacenter-336x191.jpg 336w" sizes="(max-width: 640px) 100vw, 640px" />Mworld US 2014 Today McAfee, part of Intel Security, announced key advancements to its Server Security Suites portfolio, which includes performance optimization and additional management efficiency to enhance security posture for servers deployed in physical, virtualized and cloud environments. These improvements strengthen an organization’s ability to discover workloads, achieve greater visibility, apply comprehensive protection with&#8230; <a class="more-link" href="https://www.virtualization.net/new-mcafee-server-security-suites-offer-comprehensive-protection-hybrid-data-center-7462/">Continue reading <span class="screen-reader-text">New McAfee Server Security Suites Offer Comprehensive Protection for the Hybrid Data Center</span></a></p>
<p>The post <a rel="nofollow" href="https://www.virtualization.net/new-mcafee-server-security-suites-offer-comprehensive-protection-hybrid-data-center-7462/">New McAfee Server Security Suites Offer Comprehensive Protection for the Hybrid Data Center</a> appeared first on <a rel="nofollow" href="https://www.virtualization.net">Virtualization.net - Cloud Computing SDN SDDC Virtualization News</a>.</p>
]]></description>
		
		
		
			</item>
	</channel>
</rss>
