The ability to provide multi-tenant cloud services at the infrastructure, platform, or software level is often underpinned by the ability to provide some form of virtualization to create economic scale. However, use of these technologies brings additional security concerns.

While there are several forms of virtualization, by far the most common is the virtualized operating system. If Virtual Machine (VM) technology is being used in the infrastructure of the cloud services, then it is imperative to consider compartmentalization and hardening of those VM systems.

Multi-tenant cloud services infrastructure requires having rapid elasticity, on demand availability of services to end consumers all through the use of shared pooling of resources. With such an approach the requirement for providing comprehensive security services per tenant becomes of absolute importance. Data commingling, interference and leakage are all considered to be deterrents for enterprises to adopt to cloud computing.

DTS Solution has partnered with market leaders in Virtualized Security Appliances providing defense-in-depth security services at the hypervisor layer. With full support of VMWare and Xen hypervisors the virtual security appliance is not only able to protect VM-to-VM communication but also provide advanced security services between VM and external entities. DTS Professional Services team can also assist in developing a secure multi-tenant zoning and domain architecture that ensure s complete confidentiality across VM machines.

DTS Solution can work with you on developing a complete virtualized secure infrastructure that provides;

  • Increased visibility and control over communications within the virtualized infrastructure. The virtualized hypervisor-firewall provides in-depth visibility into all applications flowing between VMs, and how they are used. It carries a complete VM and VM group inventory, including virtual network settings, and has deep knowledge of each VM state, including installed applications, operating systems, and patch level. By integrating the virtual security appliance with a Security Information and Event Management tool you will be able to view physical, logical and virtual security flows in a holistic context.
  • Enhanced compliance status by handling enforcement of corporate and regulatory policies for the presence of required or banned applications. Compliance enforcement assures segregation of duties by use of VM and policy automation that ensures VMs are assigned to the right trust zones inside the virtual environment.
  • Rapid security deployment capability whilst providing complete end-to-end security services that includes; hypervisor-firewall, AntiVirus, AntiSpam, Web Filtering, Application Control, Identity Based Policing and Data Leak Prevention.
  • Each of administration and management by managing the virtual security appliances and physical security appliances from a single centralized management platform.