IT Governance, Risk, and Compliance

Mar 8 2011   8:41PM GMT

Managing the Growth and Impact of Virtual Machines and Memory – Part VIII

Robert Davis Robert Davis Profile: Robert Davis

Given the proliferation of available hardware and software products that enable capitalizing on benefits associated with IT virtualization, when IT employees fail to perform effective configuration management; potential threats to the IT architecture are significantly increased. Besides managing the common risks associated with utilizing virtual memory and system virtual machines, additional procedures are necessary due to the inherent control weakness in program conversion to binary code for deployed process virtual machines. In particular, since process virtual machines are typically implemented using a program interpreter that relies on just-in-time source code compilation, programs are more susceptible to task modification. Thus, IT virtualization technology must be controlled to prevent service disruptions to end users and financial losses to the entity.

View Part I of the Managing the Growth and Impact of Virtual Machines and Memory series here

 Comment on this Post

There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

Share this item with your network: