{"id":357,"date":"2017-09-01T15:31:28","date_gmt":"2017-09-01T10:01:28","guid":{"rendered":"https:\/\/moditech.ca\/?page_id=357"},"modified":"2017-10-12T08:28:39","modified_gmt":"2017-10-12T12:28:39","slug":"physical-virtual-security","status":"publish","type":"page","link":"https:\/\/moditech.ca\/?page_id=357","title":{"rendered":"Physical &#038; virtual security"},"content":{"rendered":"<p><section data-kc-fullwidth=\"row\" class=\"kc-elm kc-css-526555 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-923844 kc_col-sm-7 kc_column kc_col-sm-7\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-670777 kc-animated kc-animate-eff-fadeInLeft kc_text_block\"><\/p>\n<p><b>Physical security<\/b>\u00a0is the protection of personnel, hardware, software, networks and data from\u00a0<b>physical<\/b>\u00a0actions and events that could cause serious loss or damage to an enterprise, agency or institution. This includes protection from fire, flood, natural disasters, burglary, theft, vandalism and terrorism.<\/p>\n<p>A\u00a0<b>virtual security<\/b>\u00a0appliance is a computer appliance that runs inside\u00a0<b>virtual<\/b>\u00a0environments. It is called an appliance because it is pre-packaged with a hardened operating system and a\u00a0<b>security<\/b>\u00a0application and runs on a virtualized hardware.<\/p>\n<p>\n<\/div>\n<div class=\"kc-elm kc-css-268016 kc-animated kc-animate-eff-fadeInLeft kc-call-to-action kc-cta-2 kc-is-button\">\n\n\t<div class=\"kc-cta-button\"><a href=\"https:\/\/moditech.ca\/contact\/\">Request a Callback <span class=\"kc-cta-icon\"><i class=\"fa-phone\"><\/i><\/span><\/a><\/div>\n<\/div>\n<\/div><\/div><div class=\"kc-elm kc-css-373163 kc_col-sm-5 kc_column kc_col-sm-5\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-704616 kc-animated kc-animate-eff-fadeInRight kc_shortcode kc_single_image\">\n\n        <img decoding=\"async\" src=\"https:\/\/moditech.ca\/wp-content\/uploads\/2017\/09\/virtualization.jpg\" class=\"\" alt=\"\" \/>    <\/div>\n<\/div><\/div><\/div><\/div><\/section><section data-kc-fullwidth=\"row\" class=\"kc-elm kc-css-713270 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-933233 kc_col-sm-12 kc_column kc_col-sm-12\"><div class=\"kc-col-container\">\n<div class=\"kc-elm kc-css-800128 kc-animated kc-animate-eff-fadeInUp kc-title-wrap \">\n\n\t<h2 class=\"kc_title\">VIRTUALIZATION HAS MANY DISTINGUISHED ADVANTAGES<\/h2>\n<\/div>\n<div class=\"kc-elm kc-css-7018 kc_row kc_row_inner\"><div class=\"kc-elm kc-css-224108 kc_col-sm-6 kc_column_inner kc_col-sm-6\"><div class=\"kc_wrapper kc-col-inner-container\">\n<div class=\"kc-elm kc-css-410220 kc-animated kc-animate-eff-fadeInLeft kc-title-wrap \">\n\n\t<h3 class=\"kc_title\">WHY IS PHYSICAL SECURITY SO IMPORTANT?<\/h3>\n<\/div>\n<div class=\"kc-elm kc-css-453461 kc-animated kc-animate-eff-fadeInLeft kc_text_block\"><\/p>\n<p>Physical security is important because a physical attack is perhaps the most fundamental kind of attack. The types of actions we&#8217;re referring to when we speak of physical attacks can include things such as the following: Simply hitting the reset switch or power button.<\/p>\n<p>\n<\/div><\/div><\/div><div class=\"kc-elm kc-css-756895 kc_col-sm-6 kc_column_inner kc_col-sm-6\"><div class=\"kc_wrapper kc-col-inner-container\">\n<div class=\"kc-elm kc-css-602286 kc-animated kc-animate-eff-fadeInRight kc-title-wrap \">\n\n\t<h3 class=\"kc_title\">WHY IS VIRTUAL SECURITY SO IMPORTANT?<\/h3>\n<\/div>\n<div class=\"kc-elm kc-css-484707 kc-animated kc-animate-eff-fadeInRight kc_text_block\"><\/p>\n<p>In cases where hyper visor management console is placed in live production\u00a0<b>virtual\u00a0<\/b>environment due to lack of segmentation within\u00a0<b>virtual\u00a0<\/b>environments,\u00a0<b>virtual\u00a0<\/b>networks are prone to attacks.<\/p>\n<p>\n<\/div><\/div><\/div><\/div><div class=\"kc-elm kc-css-596902 kc_row kc_row_inner\"><div class=\"kc-elm kc-css-894669 kc_col-sm-6 kc_column_inner kc_col-sm-6\"><div class=\"kc_wrapper kc-col-inner-container\">\n<div class=\"kc-elm kc-css-243204 kc-animated kc-animate-eff-fadeInLeft kc-title-wrap \">\n\n\t<h3 class=\"kc_title\">COST SAVINGS<\/h3>\n<\/div>\n<div class=\"kc-elm kc-css-294048 kc-animated kc-animate-eff-fadeInLeft kc_text_block\"><\/p>\n<p>Organizations save a great deal with virtualization. They not only save on the physical server hardware but also on the time required for installing the same.<\/p>\n<p>\n<\/div><\/div><\/div><div class=\"kc-elm kc-css-140808 kc_col-sm-6 kc_column_inner kc_col-sm-6\"><div class=\"kc_wrapper kc-col-inner-container\">\n<div class=\"kc-elm kc-css-976716 kc-animated kc-animate-eff-fadeInRight kc-title-wrap \">\n\n\t<h3 class=\"kc_title\">COLLABORATION<\/h3>\n<\/div>\n<div class=\"kc-elm kc-css-784246 kc-animated kc-animate-eff-fadeInRight kc_text_block\"><\/p>\n<p>The cloud computing enables employees to sync up and work on documents and share apps simultaneously from wherever they are.<\/p>\n<p>\n<\/div><\/div><\/div><\/div><div class=\"kc-elm kc-css-817976 kc_row kc_row_inner\"><div class=\"kc-elm kc-css-771912 kc_col-sm-6 kc_column_inner kc_col-sm-6\"><div class=\"kc_wrapper kc-col-inner-container\">\n<div class=\"kc-elm kc-css-739123 kc-animated kc-animate-eff-fadeInLeft kc-title-wrap \">\n\n\t<h3 class=\"kc_title\">COMPETITIVENESS<\/h3>\n<\/div>\n<div class=\"kc-elm kc-css-492668 kc-animated kc-animate-eff-fadeInLeft kc_text_block\"><\/p>\n<p>With the help of cloud, the small and medium enterprises get access to enterprise class technology that enable them to compete with big established competitors.<\/p>\n<p>\n<\/div><\/div><\/div><div class=\"kc-elm kc-css-75172 kc_col-sm-6 kc_column_inner kc_col-sm-6\"><div class=\"kc_wrapper kc-col-inner-container\">\n<div class=\"kc-elm kc-css-384261 kc-animated kc-animate-eff-fadeInRight kc-title-wrap \">\n\n\t<h3 class=\"kc_title\">NO CAPITAL EXPENDITURE<\/h3>\n<\/div>\n<div class=\"kc-elm kc-css-658911 kc-animated kc-animate-eff-fadeInRight kc_text_block\"><\/p>\n<p>Cloud computing services don\u2019t require any capital expenditure and is faster to deploy. The services come to you in pay-as-you-go model.<\/p>\n<p>\n<\/div><\/div><\/div><\/div><div class=\"kc-elm kc-css-387132 kc_row kc_row_inner\"><div class=\"kc-elm kc-css-910901 kc_col-sm-6 kc_column_inner kc_col-sm-6\"><div class=\"kc_wrapper kc-col-inner-container\">\n<div class=\"kc-elm kc-css-165946 kc-animated kc-animate-eff-fadeInLeft kc-title-wrap \">\n\n\t<h3 class=\"kc_title\">FLEXIBILITY<\/h3>\n<\/div>\n<div class=\"kc-elm kc-css-18018 kc-animated kc-animate-eff-fadeInLeft kc_text_block\"><\/p>\n<p>Cloud computing is an ideal option when there is scarcity of resources. It offers a great deal of flexibility in capacity requirements. If you run out of capacity, resources can be easily scaled up. There is no need to redesign the network with new server purchase, deployment and maintenance.<\/p>\n<p>\n<\/div><\/div><\/div><div class=\"kc-elm kc-css-43523 kc_col-sm-6 kc_column_inner kc_col-sm-6\"><div class=\"kc_wrapper kc-col-inner-container\">\n<div class=\"kc-elm kc-css-22706 kc-animated kc-animate-eff-fadeInRight kc-title-wrap \">\n\n\t<h3 class=\"kc_title\">AUTOMATIC SERVER UPDATES<\/h3>\n<\/div>\n<div class=\"kc-elm kc-css-741671 kc-animated kc-animate-eff-fadeInRight kc_text_block\"><\/p>\n<p>Cloud computing providers perform server maintenance and server updates on a regular basis. This frees up the customer time and resources which they can use to perform other tasks.<\/p>\n<p>\n<\/div><\/div><\/div><\/div><div class=\"kc-elm kc-css-325496 kc_row kc_row_inner\"><div class=\"kc-elm kc-css-674974 kc_col-sm-6 kc_column_inner kc_col-sm-6\"><div class=\"kc_wrapper kc-col-inner-container\">\n<div class=\"kc-elm kc-css-539642 kc-animated kc-animate-eff-fadeInLeft kc-title-wrap \">\n\n\t<h3 class=\"kc_title\">DATA SECURITY<\/h3>\n<\/div>\n<div class=\"kc-elm kc-css-623976 kc-animated kc-animate-eff-fadeInLeft kc_text_block\"><\/p>\n<p>Cloud computing ensures that your data stays safe, even in instances of fire or theft. There is no loss of data as it is stored in cloud, accessible in a secure way through internet.<\/p>\n<p>\n<\/div><\/div><\/div><div class=\"kc-elm kc-css-920234 kc_col-sm-6 kc_column_inner kc_col-sm-6\"><div class=\"kc_wrapper kc-col-inner-container\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p><!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-357","page","type-page","status-publish","hentry"],"aioseo_notices":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/moditech.ca\/index.php?rest_route=\/wp\/v2\/pages\/357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/moditech.ca\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/moditech.ca\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/moditech.ca\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/moditech.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=357"}],"version-history":[{"count":2,"href":"https:\/\/moditech.ca\/index.php?rest_route=\/wp\/v2\/pages\/357\/revisions"}],"predecessor-version":[{"id":1057,"href":"https:\/\/moditech.ca\/index.php?rest_route=\/wp\/v2\/pages\/357\/revisions\/1057"}],"wp:attachment":[{"href":"https:\/\/moditech.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}