Get started Bring yourself up to speed with our introductory content.

Test your identity authentication and VMware virtual network chops

Do you have what it takes to protect your VMware virtual network using identity authentication techniques? Quiz yourself and find out.

Is your VMware infrastructure a sitting duck for network security and identity authentication attacks? Though virtualization technology continues to mature, risks and potential failures remain. With sensitive and important data flowing between servers and clients, the virtual network is often a particularly vulnerable spot, and security breaches could prove catastrophic.

Before you find yourself assessing damages, prevent virtual network security attacks by schooling yourself in VMware's identity authentication technologies.

This was last published in December 2012

Dig Deeper on Securing a VMware environment

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.