Security

Busting 3 VMware security myths about migration to the cloud

Share this post:

VMware myths cloud migrationWhen discussing IBM Cloud for VMware Solutions with partners and customers, I repeatedly encounter three common misconceptions about the security of their workloads in the IBM Bluemix dedicated private cloud infrastructure. I’d like to take a moment to clear up the myths surrounding VMware security in the cloud.

Myth #1: “My workload could be compromised by other workloads running on the same hardware.”

Occasionally, security vulnerabilities are reported against various hypervisors. While public cloud providers are quick to patch these vulnerabilities, it is fair to be concerned about the security of shared servers. But with IBM Bluemix bare metal infrastructure, your VMware workload runs on dedicated servers that are not shared with other customers, and you have full control of the hypervisor installed on the bare metal machine. You can rest assured that no other workload is sharing your server.

Myth #2: “My communications could be compromised by other workloads sharing the same network.”

While public clouds do not provide segregation of network traffic, the IBM Bluemix infrastructure dedicated private cloud provides dedicated network VLANs to segregate your network traffic from all other customers. You can rest assured that your network traffic is not visible to other workloads. For access to your VMware workload, several public and private connectivity options are available for you to connect to your intranet or even the Internet at your discretion.

Myth #3: “My data resides on shared storage infrastructure.”

Regulatory and industry standards may require you to prove the location of your data or to audit all access to it. This can be difficult in public clouds that use a shared storage infrastructure. By contrast, IBM Cloud’s VMware Cloud Foundation offering uses VMware vSAN technology in combination with local storage on your IBM Bluemix bare metal instances to provide highly available fault-tolerant dedicated storage. VMware vSAN virtualizes and mirrors the disks on the bare metal servers themselves to provide a virtual shared data store spanning the systems. Your data remains on your physical servers at all times.

IBM Bluemix for your VMware workloads

If you’ve despaired of using public cloud infrastructure due to VMware security concerns, why not take a second look at IBM Cloud for VMware Solutions on IBM Bluemix’s dedicated private cloud? I also encourage you to explore IBM Cloud Secure Virtualization, which combines Intel and HyTrust technologies to add workload encryption, access control and auditing, and geofencing capabilities to your VMware cloud.

If you want to know more about the security of VMware in the cloud, get in touch and we’ll explain how we ensure security and compliance for your workloads.

A version of this article was originally published on the IBM Bluemix blog.

More Security stories

French insurer teams with IBM Services to develop fraud detection solution

Auto insurance fraud costs companies billions of dollars every year. Those losses trickle down to policyholders who absorb some of that risk in policy rate increases. Thélem assurances, a French property and casualty insurer whose motto is “Thélem innovates for you”, has launched an artificial intelligence program, prioritizing a fraud detection use case as its […]

Continue reading

Cloud innovation in real estate: Apleona and IBM rely on new technologies

Digitization does not stop at the proverbial concrete gold — real estate. In fact, the real estate industry is on the move. Companies are realizing the benefits of digital transformation and are capitalizing on the power of new technologies such as cloud, AI and blockchain. Take, for example, Apleona GmbH, one of Europe’s largest real […]

Continue reading

Innovate with Enterprise Design Thinking in the IBM Garage

We’ve all been there. You have an amazing idea that’s really exciting. Maybe it’s a home improvement project, or perhaps it’s a new business idea. You think about all the details required to make it real. But, once you get to the seventh action item, you’re not so excited anymore. Sometimes when we realize the […]

Continue reading