Security

Busting 3 VMware security myths about migration to the cloud

Share this post:

VMware myths cloud migrationWhen discussing IBM Cloud for VMware Solutions with partners and customers, I repeatedly encounter three common misconceptions about the security of their workloads in the IBM Bluemix dedicated private cloud infrastructure. I’d like to take a moment to clear up the myths surrounding VMware security in the cloud.

Myth #1: “My workload could be compromised by other workloads running on the same hardware.”

Occasionally, security vulnerabilities are reported against various hypervisors. While public cloud providers are quick to patch these vulnerabilities, it is fair to be concerned about the security of shared servers. But with IBM Bluemix bare metal infrastructure, your VMware workload runs on dedicated servers that are not shared with other customers, and you have full control of the hypervisor installed on the bare metal machine. You can rest assured that no other workload is sharing your server.

Myth #2: “My communications could be compromised by other workloads sharing the same network.”

While public clouds do not provide segregation of network traffic, the IBM Bluemix infrastructure dedicated private cloud provides dedicated network VLANs to segregate your network traffic from all other customers. You can rest assured that your network traffic is not visible to other workloads. For access to your VMware workload, several public and private connectivity options are available for you to connect to your intranet or even the Internet at your discretion.

Myth #3: “My data resides on shared storage infrastructure.”

Regulatory and industry standards may require you to prove the location of your data or to audit all access to it. This can be difficult in public clouds that use a shared storage infrastructure. By contrast, IBM Cloud’s VMware Cloud Foundation offering uses VMware vSAN technology in combination with local storage on your IBM Bluemix bare metal instances to provide highly available fault-tolerant dedicated storage. VMware vSAN virtualizes and mirrors the disks on the bare metal servers themselves to provide a virtual shared data store spanning the systems. Your data remains on your physical servers at all times.

IBM Bluemix for your VMware workloads

If you’ve despaired of using public cloud infrastructure due to VMware security concerns, why not take a second look at IBM Cloud for VMware Solutions on IBM Bluemix’s dedicated private cloud? I also encourage you to explore IBM Cloud Secure Virtualization, which combines Intel and HyTrust technologies to add workload encryption, access control and auditing, and geofencing capabilities to your VMware cloud.

If you want to know more about the security of VMware in the cloud, get in touch and we’ll explain how we ensure security and compliance for your workloads.

A version of this article was originally published on the IBM Bluemix blog.

Add Comment
No Comments

Leave a Reply

Your email address will not be published.Required fields are marked *

More Security stories

Extending security and performance from the cloud to the network edge with IBM and Cloudflare

The rate and sophistication of cyber security threats are growing daily, but security should not be a barrier to entry for enterprises on their cloud journey. More importantly, enterprises shouldn’t have to sacrifice application performance to enhance security. IBM and Cloudflare are working together to launch IBM Cloud Internet Services, a set of edge network […]

Continue reading

Accelerating continuous security for apps on IBM Cloud

The rapid rise of cloud native applications is challenging convention up and down the stack. More importantly, it is forcing enterprises to take a hard look at how security is integrated into application development and delivery at every level. For example, 37 percent of IT decision makers cite surveyed security as a roadblock they face […]

Continue reading

Less than 100 days out: How to accelerate GDPR readiness with the cloud

With the European Union’s General Data Protection Regulation (GDPR) coming into effect in less than 100 days, chances are you know your business needs to rapidly transform how it manages the personal information and data of EU subjects. According to research conducted by Vanson Bourne and IBM, 47 percent of organizational leaders surveyed in the […]

Continue reading