Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Virtualization: Deploy Efficiently or You’ll be Disappointed with Cost Savings

For most organizations utilizing virtualization, cost savings is the driving factor in deploying the technology. But the cost savings associated with virtualization may not be all they have been cracked up to be—if it’s not done right.

For most organizations utilizing virtualization, cost savings is the driving factor in deploying the technology. But the cost savings associated with virtualization may not be all they have been cracked up to be—if it’s not done right.

CA Technologies VirtualizationAccording to the results of a recent survey released by CA Technologies, a majority of respondents cited reducing costs (85 percent) and increasing server utilization (84 percent) as the primary reasons to deploy virtualization. Interestingly, 63 percent of those respondents said they have not experienced the level savings they expected through implementing virtualization, and five percent said the complexities of virtualization had actually introduced new costs.

“Virtualization is a bean counter’s dream, but it can be an operational nightmare,” stated respondent Ian Watts, senior technical manager of BT Americas, Inc. “Change management is a huge overhead, as any changes need to be accepted by all applications and users sharing the same virtualization kit. While many organizations are seeing benefits from virtualization, such as reduced hardware spending and improved server utilization, these benefits often get overshadowed by the lack of productivity improvements in data center staffing and operations.”

State of IT Automation CA Technologies SurveyThe survey on the state of IT automation surveyed 460 IT decision-makers from medium and large enterprises found that 95 percent of respondents have implemented, are piloting, or plan to implement virtualization in their organization.

CA Technologies cites a direct correlation between IT service automation in a virtualized environment and cost-savings. For example, 44 percent of respondents who said most of their server provisioning processes are automated report they have significantly reduced costs through virtualization. On the other hand, 48 percent of those who said the complexities of virtualization have introduced new costs also said most of their servers are provisioned through a manual process.

Cloud Security Reading: The Big Shift to Cloud-based Security

“This survey further demonstrates that the promised benefits of virtualization and cloud computing will be hard to realize without first standardizing and automating routine IT processes,” said Roger Pilc, general manager, Virtualization and Automation, CA Technologies. “Without automation, IT staff can be overwhelmed by the complexities and challenges of managing a highly distributed IT infrastructure consisting of virtual and physical servers, applications and dynamic cloud-based services. These complexities can negate any benefits organizations hope to realize as this data shows.”

For organizations to become more efficient and to realize the full benefits from virtualization and cloud computing, they need to automate and integrate the physical and virtual server configuration, provisioning, monitoring, security, software patching across the enterprise. CA Technologies says IT automation is needed to ease management across physical, virtual and cloud environments.

While I don’t question the results of the survey, it’s important to realize that for those who are “doing virtualization right”, are certainly attaining significant cost savings. Virtualization is arguably the most innovative, game changing technology of the decade and no organization should be discouraged from deploying virtualization technology where it makes sense. Just to it right and have the right tools in place to efficiently manage virtual deployments—especially larger ones. Any technology not deployed correctly and efficiently is likely to incur additional operating costs, or yield lower benefit than a polished and well executed deployment.

The survey was conducted by UBM TechWeb on behalf of CA Technologies. The full report is available here as a free PDF download with no registration required.

Advertisement. Scroll to continue reading.

Related Virtualization Reading:

Ten Criteria for Evaluating Virtualization Security Solutions

The Questions You Want Answered about Virtualization Security

Strategies for PCI Compliance in Virtualized Environments

Security Concerns Slow Move of Business-Critical Applications to Virtualized Servers

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.