How to Protect Virtual Machines

These four products represent different approaches to VM security.