Securing the Virtual Environment: How to Defend the Enterprise Against Attack