vSphere VMs encryption: KMS Server installation – pt.1

vSphere VMs encryption: KMS Server installation - pt.1

To improve security in a virtual environment, VMware vSphere 6.5 provides the virtual machines encryption capability securing VMDK virtual disks, .vmx and swap files making stored data unreadable. Only the virtual machine that manages the VMDK disks owns the key used to encrypt. If you try to access the encrypted VMDK from an unauthorized VM, you only get unreadable data. No additional hardware is required to encrypt and decrypt a virtual machine and the used processor should support AES-NI instructions set, enabled in the BIOS, to improve performance since encryption is a CPU intensive process.   Blog series vSphere VMs encryption:

Copyright Nolabnoparty. All Rights Reserved.



via Latest imported feed items on VMware Blogs https://ift.tt/2MhNdoQ
RSS Feed

If New feed item from https://blogs.vmware.com/feed, then send me an email at kr


Unsubscribe from these notifications or sign in to manage your Email Applets.

IFTTT

Comments

Popular posts from this blog

Evernote cuts staff as user growth stalls

The best air conditioner

We won't see a 'universal' vape oil cartridge anytime soon