Hardware Virtualization

By Dreena Traplin
Updated: September 06, 2012

Hardware Virtualization

Hardware virtualization is becoming a dominant trend for IT departments in many organizations. The underlying concept of hardware virtualization is to allow multiple systems or users to share one host (or to have one very large user shared across multiple host systems). Though the concept of hardware virtualization is not new, the process has become much easier and more cost effective.

Hardware virtualization gets defined in several ways:

  • ‘Computer hardware virtualization (or hardware virtualization) is the virtualization of computers or operating systems. It hides the physical characteristics of a computing platform from users, instead showing another abstract computing platform.’ (Wikipedia)
    [http://en.wikipedia.org/wiki/Hardware_virtualization]
  • ‘Hardware virtualization is a system which uses one processor to act as if it were several different computers.’
    [http://www.wisegeek.com/what-is-hardware-virtualization.htm]

Hardware virtualization was developed as a concept in the early 1960s by IBM, where it was referenced as a muliprogramming system. IBM was instrumental in the development of hardware-assisted virtualization on their core business system, the IBM System 370. Before hardware virtualization was introduced it was difficult to run multiple applications on a computer. Companies ran applications in batches, saving up all the data and operations for a particular program then running them all at once before switching the whole system to something else. 

An effort to find an efficient method to share resources was the innovation behind hardware virtualization.  When desktop computers surfaced with Windows during the 1980s and 1990s, challenges were presented with respect to cost, security, storage space, and maintenance and hardware virtualization faded out of favor for a time until the rise of web-based computer systems.

Systems that incorporate hardware virtualization can virtualize applications into silos that will not interfere with the host system. Software can be duplicated and installed on more than one host.  Any damage that occurs to the operating system security can easily be detected, and the virtual machine will be discarded without causing harm to the host system. Also, the new system can run without making changings to the host system.

Hardware virtualization uses software to make multiple pieces of hardware act like they are a single system or to make one piece of hardware act like it is multiple systems. According to Natalie Lambert, principal analyst at Forrester Research, “Desktop virtualization  is a very different beast and should not be treated as simple enhancements to the server strategy.  "The drivers are entirely different and the environment will present new challenges to those experienced with server virtualization."

So what are the pros and cons of deploying hardware virtualization? There are three levels of hardware virtualization; full, assisted (or virtual machine), and paravirtualized.  Each level operates a bit differently. For example:

  • Full virtualization  completely virtualizes the system and provides the software running on it with an environment that looks and acts like a brand new hardware system.
  • Assisted virtualization relies on hardware performing some tricks in the background to create a virtual machine. They pretend to be separate hardware systems but rely on support from the operating system and underlying hardware to deliver the virtualization to the software running on it.
  • Paravirtualized environments are really just faking it. Software overlays the hardware and acts like it is providing different hardware but at every stage it is relying on changes to the operating system and usually means that software running in a paravirtualized environment knows about the software changes and co-operates with them.

Though virtualization has been around for years, as technology rapidly progress, so are the needs of businesses. The benefits of using hardware virtualization are:

  • Speed of delivery.
  • High rate of return.
  • Quality of information.
  • Ease of maintenance.

The pitfalls of using hardware virtualization are:

  • Not all processors are prepared to handle the support required to virtualize many processors.
  • Since all data is stored in one system there is a risk of damage, deletion or overwriting (due to overruns) which requires automatic backup storage to be put in place.
  • Cost of upfront fees.

“It’s also no secret that the movement toward virtualization has experienced what is sometimes referred to as “virtualization stall.” This refers to the fact that many organizations get around 25 percent of their total server population virtualized, and then progress stops,” says  Bernard Golden, CIO writer, in his article titled ‘3 Key Issues for Secure Virtualization.’

Although most companies use some form of virtualization, they are aware that there are pros and cons with every operating system. However, the pros of hardware virtualization outweigh the cons.

Implementing hardware virtualization into an organization requires developing a strategic plan to fit the work environment:

  • Assess the environment and characteristics of the current servers.  This will enable an understanding of the performance and current needs.
  • Note the applications to be virtualized to meet licensing guidelines.
  • In that other components will be affected by the deployment, purchase products that will support virtualization.

     

Related Categories
Featured Research
  • Vulnerability Management Evolution

    In this report from Securosis, learn how vulnerability scanners are evolving to provide real value beyond vulnerability reports for auditors - emerging as a strategic component helping organizations effectively lower risks. more

  • Web Application Security

    To help you understand how to minimize vulnerabilities in web applications, Qualys provides this guide as a primer to web application security. The guide surveys typical web application vulnerabilities, compares options for detection, and introduces the QualysGuard Web Application Scanning solution. more

  • SANS Survey on Application Security Programs and Practices

    With the growth of the Internet and the increasing reliance on web and mobile applications, it’s no surprise that data breaches associated with applications are also increasing. So how does your organization address application security today? more

  • Nine Steps to Smart Security for Small Businesses

    If you’re a small business, we salute you. Small enterprises are the engine of our economy, generating innovation, employment and wealth, so your security matters. This guide shows how you can reduce your risks at an affordable price. more

  • Justifying IT Security

    The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely lead to loss. This paper discusses the management of Risk and how Vulnerability Management is one of the few counter‐measures easily justified by its ability to optimize risk. more