There are several ways to implement security you should know about when integrating Red Hat Virtualization into your systems. - remove "you should know about" Together with other people in your organization,you should create a 'deployment plan' - could it be considered presumptuous to tell the customer "Together with other people in your organization" The less things running on dom0, the higher the level of security. - s/less/fewer/
Fixed and enhanced the security section