Cost efficient, powerful and effective, virtualization has become a well-used tool in today’s tech-savvy world. As demand for computing increases, so has the need to make maximum use of physical servers by creating virtual machines within them.
Most servers are idle for a good amount of time, so it only makes sense to deploy virtualization to make the best use of what is already in play.
Of course, not every user has the same needs and expectations. And so it’s important to understand virtualization and its opportunities and limitations for a particular security scenario.
Think about your individual situation as it applies to virtualization and a key security need such as access control. Where do you fit in?
A small operator, such as a convenience store with a few doors to control is looking for virtualization on a whole different level than a government-run operation that requires a high-degree of reliability — to the level of 99.999 percent.
In the first scenario, the end user may be OK with some degree of downtime. Servers running virtual machines will fail and restart and in the process lose some, but far from all, data. That high availability may be good enough for some access control requirements.
But others, large corporations or governmental enterprises as an example, are looking for virtualization that is fault tolerant, meaning that in the event of a system failure, there are duplicate components in play that will keep processing on the same CPU clock so that no amount of data is lost. They can’t afford to have doors that won’t open — or close — or present opportunities for cardholder information to be compromised.
Also part of the decision-making process when it comes to virtualization is the level of expertise you have and the degree to which you want to own the oversight of the system.
The mom-and-pop store operator who wants to partake in a virtualized access control environment may not have the expertise to do this on his own. Fortunately, there are solutions involving access control products and virtualization providers that can be deployed as a “black box” for virtualization without the need of an expert.
In contrast, companies with highly skilled IT departments that require virtualization can customize the solution to fit their needs. Those firms have the flexibility to implement a range of solutions from black box simplicity to high complexity and high cost.
While the computing world has certainly seen its share of fads, virtualization isn’t one of them. In fact, it is the gateway to cloud computing and when used properly can be a critical factor in your access control solution.
To learn if a virtual environment is right for your security needs, watch my recorded webinar on Virtualization in Access Control, held in conjunction with Stratus Technologies.
(function(){
var s=’hubspotutk’,r,c=((r=new RegExp(‘(^|; )’+s+’=([^;]*)’).exec(document.cookie))?r[2]:”),w=window;w[s]=w[s]||c,
hsjs=document.createElement(“script”),el=document.getElementById(“hs-cta-44e0aa0c-3a92-41e2-881b-bd1356ec6bab”);
hsjs.type = “text/javascript”;hsjs.async = true;
hsjs.src = “//cta-service-cms2.hubspot.com/cs/loader.js?pg=44e0aa0c-3a92-41e2-881b-bd1356ec6bab&pid=153123&hsutk=” + encodeURIComponent(c);
(document.getElementsByTagName(“head”)[0]||document.getElementsByTagName(“body”)[0]).appendChild(hsjs);
try{el.style.visibility=”hidden”;}catch(err){}
setTimeout(function() {try{el.style.visibility=”visible”;}catch(err){}}, 2500);
})();
Source: Tyco Blog