Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
System Center 2016 Virtual Machine Manager Cookbook

You're reading from   System Center 2016 Virtual Machine Manager Cookbook Design, configure, and manage an efficient virtual infrastructure with VMM in System Center 2016

Arrow left icon
Product type Paperback
Published in Feb 2018
Publisher Packt
ISBN-13 9781785881480
Length 562 pages
Edition 3rd Edition
Arrow right icon
Authors (2):
Arrow left icon
EDVALDO ALESSANDRO CARDOSO EDVALDO ALESSANDRO CARDOSO
Author Profile Icon EDVALDO ALESSANDRO CARDOSO
EDVALDO ALESSANDRO CARDOSO
Roman Levchenko Roman Levchenko
Author Profile Icon Roman Levchenko
Roman Levchenko
Arrow right icon
View More author details
Toc

Table of Contents (12) Chapters Close

Preface 1. VMM 2016 Architecture FREE CHAPTER 2. Upgrading from Previous Versions 3. Installing VMM 2016 4. Installing a Highly Available VMM Server 5. Configuring Fabric Resources in VMM 6. Configuring Guarded Fabric in VMM 7. Deploying Virtual Machines and Services 8. Managing VMware ESXi hosts 9. Managing Clouds, Fabric Updates, Resources, Clusters, and New Features of VMM 2016 10. Integration with System Center Operations Manager 2016 11. Other Books You May Enjoy

Introduction


It must be difficult to find customers who have never thought about moving their enter-prise workloads to the cloud. Some of them decide to build hybrid clouds, while others migrate all of their resources in order to make an all-in-the-cloud model. However, almost everyone is concerned about security and it often becomes an obstacle on their road to cloud. How can you be sure that your data is kept securely and that only you have access to it? Since a VM is just a set of files that can be copied by bad guys from the cloud's provider and then simply used on other systems,  your competitors may be able to get access to that data and steal your client's database, personal data, administrator credentials, confidential data, and so on. More simply, compromised backup admins can restore your VM and do anything with your confidential data. Cloud providers, thus, are required to provide a solution to eliminate all these risks and also to protect themselves from unexpected data theft...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime