Balancing VDI Security and Performance

By integrating security and monitoring technologies into the hypervisor, you really can have it all.

Bill Kleyman

February 19, 2016

3 Min Read
Balancing VDI Security and Performance

The modern IT infrastructure is going through a major shift to support more users, technologies and workloads. Already we’re seeing unprecedented amounts of data traversing the virtual infrastructure of a data center. The recent Cisco Global Cloud Index Report outlined the data center virtualization and cloud computing transition:

  • By 2019, more than four-fifths (86 percent) of workloads will be processed by cloud data centers.

  • Overall data center workloads will more than double (2.5-fold) from 2014 to 2019; however, cloud workloads will more than triple (3.3-fold) over the same period.

  • The workload density (that is, workloads per physical server) for cloud data centers was 5.1 in 2014 and will grow to 8.4 by 2019. Comparatively, for traditional data centers, workload density was 2.0 in 2014 and will grow to 3.2 by 2019.

Mobility, IT consumerization and software-defined technologies are contributing to this shift. IT organizations are working hard to deliver powerful, virtual workloads to the user. In some cases these are individual applications, while other scenarios require a full virtual desktop. But here’s the big question: how do you keep all of this secure and performing optimally?

Fortunately, there are some great ways to secure a multi-tenant virtualized environment and provide VM isolation:

 

  • Start with hypervisor security and VM isolation. Your hypervisor has become the critical junction for nearly all virtual technologies. Desktops, applications and a variety of servers sit directly on top of your hypervisor platform. With that in mind, why not start your security solution at the hypervisor level? Now you can directly integrate security technology into your hypervisor to stop malicious threats before they hit your virtual machines. Look for enterprise-ready solutions incorporating anti-virus and Intrusion Detection Systems (IDS) technologies, which protect the hypervisor and everything sitting on top. This allows you to better control security resources and how they’re delivered, enabling segmentation of VMs for different user populations which have different security needs. Therefore, you can deliver strong security to some workloads without negatively affecting the performance of other workloads or VDI sessions in the environment.

  • Introduce agentless technologies. New security platforms are allowing agentless antivirus and firewall technology to sit on the hypervisor. Agentless security allows you to run a security service as a virtual machine and monitor all VMs sitting on top of the hypervisor. This means you don’t need to install a security software client into the actual virtual machine; all security inspection takes place in the hypervisor. This saves CPU resources and increases VM density by up to 30 percent. These types of next-gen security products, such as Trend Micro Deep Security, allow for complete traffic control into the VM and isolation between VMs. Furthermore, with the agentless model, the security software performs incremental scans up to 50x faster and proactively detects malicious attacks.

  • Integrate with infrastructure management/monitoring tools. You have installed agentless security and have deployed advanced security on your hypervisor. How can you tell it’s all performing well? Now you can integrate ecosystem monitoring and management solutions. For example, plugging configuration and performance management technologies into your hypervisor’s management environment can give you far greater control over your virtual infrastructure. This includes the ability to:

    • Control virtual firewall settings

    • Isolate VMs on hosts and based on policy

    • Manage rules, filters, logs, and even auditing

    • Provision resources into silos as needed

    • Control content delivery

    • Reduce administration and maintenance time

    • Create resource automation and control

Your virtual infrastructure will continue to grow and expand. Through it all, it’s critical to monitor, manage and secure the entire environment. Never forget about user performance either. With VDI, a best practice is to always seek the proper balance between strong security and the best possible user experience.

Underwritten by HPE, NVIDIA, and VMware

 

About the Author(s)

Bill Kleyman

Bill Kleyman has more than 15 years of experience in enterprise technology. He also enjoys writing, blogging, and educating colleagues about tech. His published and referenced work can be found on Data Center Knowledge, AFCOM, ITPro Today, InformationWeek, NetworkComputing, TechTarget, DarkReading, Forbes, CBS Interactive, Slashdot, and more.

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like