Up to 80% of threats live perfectly in a virtual environment, without needing any modifications. AT the same time a malicious code is much faster within the virtual infrastructure than in the physical environment. As a rule attackers use the fact that companies can’t protect expanding cloud configurations.