10.08.2015 Views

Risico’s van een gevirtualiseerde IT-omgeving

Risico's van een gevirtualiseerde IT-omgeving - Vurore

Risico's van een gevirtualiseerde IT-omgeving - Vurore

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Possen & Ulrich<strong>Risico’s</strong> <strong>van</strong> <strong>een</strong> <strong>gevirtualiseerde</strong> <strong>IT</strong>-<strong>omgeving</strong>---------------------------------------------------------------------------------------------------------------------------Gartner, Gartner Says Virtualization Will Be the Highest-Impact Trend in Infrastructure andOperations Market Through 2012,Gartner, April 2008Gartner, Virtualization Will Drive Major Change in <strong>IT</strong> Infrastructure and Operations in the NextThree Years, Gartner, Mei 2007Geuze R., <strong>van</strong> teeffelen R., Consolidatie en Virtualisatie <strong>van</strong> Intel en UNIX platformen – de praktijk,IBM, maart 2009Golden B., Virtualization for dummies, Wiley Publishing, Hoboken, 2008Haight C. & Colville R.J., Virtualization Is Bringing Together Configuration and PerformanceManagement, Gartner, 2010Haight C., Data Center Conference Survey: Addressing the Operational Challenges of Virtual ServerManagement, Gartner, February 2008.Hau W. & Araujo R., Virtualization and Risk – Key Security Considerations for your EnterpriseArchitecture, Foundstone, November 2007Hietala J.D., Top Virtualization Security Mistakes (and How to Avoid Them), SANS Whitepaper ,August 2009Hoff, The Four Horsemen Of the Virtualization Apocalypse, Blackhat 2008HP, Managing a sustainable virtual environment, HP, Oktober 2009HP, Planning a Microsoft Virtual Server infrastructure with HP ProLiant servers, storage, andmanagement, Hewlett-Packard Development Company, April 2006Huet A., Staquet A., Business Risk Management, FEDICT, Augustus 2006IBM, Creating a Dynamic Infrastructure through Virtualization, IBM Corporation, April 2009InfoGard Laboratories, VMware ESX Server 2.5.0 and VirtualCenter1.2.0 Security Target, 2006ISACA, ISACA Overview and History, ISACA.nl , Maart 2010<strong>IT</strong> Governance Institute (<strong>IT</strong>GI), CobiT 4.1, <strong>IT</strong> Governance Institute (<strong>IT</strong>GI), December 2007Jolliffe G, VMware Virtual infrastructure Security risk assessment, Xtravirt, 2007Jong B. de, Gestandaardiseerd maatwerk in audits op <strong>IT</strong> Beheersing, .ego, juli 2006Klaver C., Challenges that virtualization bring to traditional <strong>IT</strong> security controls,Vurore.nl, April2008Kortchinsky K., CLOUDBURST A VMwareVMware Guest to Host Escape Story, BlackHat USA2009, Juni 2009Lowe S., How virtualization impacts <strong>IT</strong> staff, security and change management, Techtarget.com,maart 2008---------------------------------------------------------------------------------------------------------------------------Pagina 76

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!