This document discusses best practices for securing working environments in virtualized and cloud computing settings. It argues that traditional network-based security solutions are no longer sufficient, as more applications and databases are deployed within virtual machines and across dynamic cloud infrastructures. The document advocates for next-generation, distributed host-based security solutions that can provide visibility and protection at the application and database layer without compromising performance or system stability.