SECURED LOGICAL COMPONENT FOR SECURITY IN A VIRTUAL ENVIRONMENT
First Claim
1. A system for providing security in a virtual environment, the system comprising:
- a link module that links a secured logical component to a logical entity including a set of virtual machines;
a security module that identifies a set of security policies for one or more communications to the logical entity or one or more communications from the logical entity; and
a control module that controls, based on the set of security policies, the one or more communications to the logical entity or the one or more communications from the logical entity.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for providing security in a virtual environment are provided. An example system includes a link module that links a secured logical component to a logical entity including a set of virtual machines. The example system also includes a security module that identifies a set of security policies for one or more communications to the logical entity or one or more communications from the logical entity. The example system further includes a control module that controls, based on the set of security policies, the one or more communications to the logical entity or the one or more communications from the logical entity.
33 Citations
20 Claims
-
1. A system for providing security in a virtual environment, the system comprising:
-
a link module that links a secured logical component to a logical entity including a set of virtual machines; a security module that identifies a set of security policies for one or more communications to the logical entity or one or more communications from the logical entity; and a control module that controls, based on the set of security policies, the one or more communications to the logical entity or the one or more communications from the logical entity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of providing security in a virtual environment, the method comprising:
-
linking, by one or more processors, a secured logical component to a logical entity including a set of virtual machines; identifying a set of security policies for one or more communications to the logical entity or one or more communications from the logical entity; and controlling, based on the set of security policies, the one or more communications to the logical entity or the one or more communications from the logical entity. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory machine-readable medium comprising a plurality of machine-readable instructions that when executed by one or more processors is adapted to cause the one or more processors to perform a method comprising:
-
linking a secured logical component to a logical entity including a set of virtual machines; identifying a set of security policies for one or more communications to the logical entity or one or more communications from the logical entity; and controlling, based on the set of security policies, the one or more communications to the logical entity or the one or more communications from the logical entity.
-
Specification