How to protect virtual machines (VMs)

These four products represent different approaches to VM security.