A Hypervisor (also called a Virtual Machine Monitor) is software, firmware, or hardware that creates and manages virtual machines by abstracting physical computing resources and allocating them to multiple isolated guest operating systems running simultaneously on a single host machine.
Context for Technology Leaders
For CIOs and enterprise architects, understanding hypervisor technology is fundamental to infrastructure strategy, as it determines the performance, security, and management characteristics of virtualized environments. Type 1 (bare-metal) hypervisors like VMware ESXi, Microsoft Hyper-V, and KVM run directly on hardware for production workloads, while Type 2 (hosted) hypervisors like VirtualBox run on top of an operating system for development environments. The hypervisor layer is the trust boundary that underlies all cloud computing security.
Key Principles
- 1Resource Mediation: The hypervisor controls access to physical CPU, memory, storage, and network resources, ensuring fair allocation and isolation between virtual machines.
- 2Hardware Emulation: Virtual machines are presented with standardized virtual hardware, enabling operating systems to run without modification regardless of the underlying physical hardware.
- 3Isolation Enforcement: The hypervisor enforces strict boundaries between virtual machines, preventing one VM from accessing another's memory, storage, or network traffic.
- 4Live Migration: Advanced hypervisors support moving running virtual machines between physical hosts without downtime, enabling maintenance, load balancing, and disaster recovery.
Strategic Implications for CIOs
Hypervisor choice has long-term implications for vendor lock-in, licensing costs, and operational capabilities. VMware's licensing changes under Broadcom have made this decision more consequential. CIOs should evaluate open-source alternatives like KVM and Proxmox alongside commercial offerings. Enterprise architects must consider hypervisor capabilities in security architecture, as hypervisor vulnerabilities (escape attacks) represent critical risks. The trend toward cloud-managed infrastructure reduces but does not eliminate the need for hypervisor expertise.
Common Misconception
A common misconception is that all hypervisors provide equivalent performance and security. Type 1 (bare-metal) hypervisors offer significantly better performance and stronger isolation than Type 2 (hosted) hypervisors, and different hypervisor implementations vary substantially in features, security certifications, and management capabilities.