How Network Virtualization can improve your Data Center Security
|
|
- Iris Clarke
- 8 years ago
- Views:
Transcription
1 How Network Virtualization can improve your Data Center Security Gilles Chekroun SDDC, NSX Team EMEA 2014 VMware Inc. All rights reserved.
2 Security IT spending Security spending is number 1 on 2015 IT budget Going from $71 billion in 2014 to $155+ billion by 2019 BUT
3 Target Breach 40 million Credit Cards stolen 2 million Credit Cards sold by hackers for about $53.7 million 70 million records with name, address, address and phone number of Target shoppe 46% drop in profit for the company on that quarter Costs: $200 million for the banks to re-issue CC and $100 million to Target for updating Payment Terminals CEO Gregg Steinhafle lost his job Source:
4 SONY Pictures Data Breach Sony Pictures data breach may have been an inside job 25 gigabytes of sensitive data on tens of thousands of Sony employees including Social Security numbers, medical information and salary information Previous 2011 PlayStation Network hack: 77 million accounts affected cost the company upward of $171 million Source:
5 Breaches still occur because of perimeter-focused security Perimeter-centric network security has proven insufficient. Insufficient Little or no lateral controls inside perimeter Internet Redirect VLAN stiching Challenges Inefficient network design Server Fabric Server Fabric Physical firewalls are choke points in the network Data Center Perimeter Server Blade vswitch 6 wire hops VM-to-VM traffic must hairpin out to physical firewall Security policies tied to network topology: slows deployment
6 Other alternatives used today to try to reduce breaches... There are a few other available options today to improve internal data center security. Both have their own challenges and ultimately are not operationally feasible. Adding more internal security Requires placing more firewalls across workloads Internet Physical firewalls Cost prohibitive: thousands of firewalls needed (1 per VM) Complex configuration: security policies restricted by network topology Inefficient choke point firewalling Impractical to build lateral coverage Virtual firewalls Data Center Perimeter Similar to physical firewalls, only slower performance No micro-segmentation Limited central management Costly and complicated
7 Data Center Security with NSX Micro-Segmentation CONFIDENTIAL 7
8 The Explosion in East-West Traffic Internet North-South Client-Server traffic East-West Inter-Server traffic 70%
9 Infrastructure Provisioning today Minutes Days - Weeks VM Network Security App Environment Switch Router Firewall Load Balancer Connect Ethernet cables, configure switch port, VLANs, access control lists, assign IP addresses Configure router interface to connect to switch ports. Configure routing protocols. Connect networks to firewall appliances, configure firewall rules based on physical constructs e.g. IP address and VLANs Connect networks to load balancer appliances, create and populate load balancer pool, assign Virtual IP Address to external interface NETOPS SECOPS LOAD BALANCER ADMIN
10 Three Reasons Companies Virtualize Their Network 1 Speed On Demand Apps and Services 2 Economics Opex Efficiency & Capex Cost Savings 3 Security Re-Architect Datacenter Security
11 What is NSX? Provides A Faithful Reproduction of Network & Security Services in Software Switching Routing Firewalling Load Balancing VPN Connectivity to Physical 11
12 Compute Virtualization Internet
13 A Network Hypervisor Internet
14 The Operational Model of a VM for the Networking Internet
15 The next-generation networking model Software Network and Security Services Now in the Hypervisor Load Balancing L3 Routing L2 Switching Firewalling/ACLs Hardware
16 Services Distributed to the Virtual Switch VXLAN tunnel Tunnel End Points
17 Native Isolation Multi Tenant Identical IP addresses
18 NSX Zero Trust Model A new model for data center security STARTING ASSUMPTIONS DESIGN PRINCIPLES 1 Isolation and segmentation Assume everything is a threat 2 Unit-level trust / least privilege and act accordingly. 3 Ubiquity and centralized control
19 Simpler operations with scale-out performance Hypervisor-based, in kernel distributed firewalling High throughput rates on a per hypervisor basis Every hypervisor adds additional east-west firewalling capacity Platform-based automation Automated provisioning and workload adds/moves/changes Accurate firewall policies follow workloads as they move
20 Granularity to the VM with Distributed FireWall DVS Every Virtual Machine has it s own firewall If the Virtual Machine moves, the firewall moves with it If the Virtual Machine goes away, so does the firewall
21 The Operational Model of a VM Hypervisor-based, in kernel distributed firewalling Platform-based automated provisioning and workload adds/moves/changes Security Policy Cloud Management Platform Internet Perimeter Firewalls 21
22 Micro-segmentation Options Isolation Segmentation Advanced services No communication path between unrelated networks No cross-talk between networks Overlay technology assures networks are separated by default Controlled communication path within a single network Fine-grained enforcement of security Security policies based on logical groupings of VMs Advanced services: addition of 3 rd party security, as needed by policy Platform for including leading security solutions Dynamic addition of advanced security to adapt to changing security conditions
23 Advanced Services Insertion Example: Palo Alto Networks NGFW Security Admin Security Policy Traffic Steering Internet
24 Security Extensibility in the Guest Vulnerability Management Gain previously impossible vulnerability intelligence based on application purpose, data class and user roles to drive rich, policy-driven response, including in-place quarantine. Malware/AV Protection Real-time, dynamic threat response that follows applications as they migrate between hosts, data centers and cloud environments. 24
25 Automated Security in a Software Defined Data Center Quarantine Vulnerable Systems until Remediated Policy Definition Standard VM Policy Anti-Virus Scan Quarantined VM Policy Firewall Block all except security tools Anti-Virus Scan and remediate Security Group = Web Tier Security Group = Quarantine Zone Members = {Tag = ANTI_VIRUS.VirusFound, L2 Isolated Network} 25
26 Cross-vCenter with NSX
27 NSX Logical Networking and Security (6.1 and earlier) NSX Controller Cluster NSX Controller Cluster NSX Controller Cluster vc with NSX Manager vc with NSX Manager vc with NSX Manager vcenter A vcenter B vcenter C Local VC Inventory Local VC Inventory Local VC Inventory Distributed Logical Router Distributed Logical Router Distributed Logical Router Logical Switch Logical Switch Logical Switch Single NSX Domain can span more than one site CONFIDENTIAL 27
28 Cross-VC Logical Networks (NSX 6.2) Universal Object Configuration (NSX UI & API) Universal Configuration Synchronization Universal Controller Cluster vcenter & NSX Manager A Primary vcenter & NSX Manager B Secondary vcenter & NSX Manager H Secondary Local VC Inventory Local VC Inventory Local VC Inventory Universal Distributed Logical Router Universal Logical Switches Universal DFW CONFIDENTIAL 28
29 Cross-VC NSX Use Cases Increase the span of NSX logical networks to enable: Capacity Pooling across multiple vcenter Servers Non disruptive migrations Cloud and VDI deployments vcenter Server A vcenter Server B vcenter Server C DB App Web App Web DB Web App DB CONFIDENTIAL 29
30 NSX as a Service Insertion Platform: Service Categories and Partners NSX Partner Extensions Physical-to-Virtual Services Operations and Visibility Application Delivery Services Security Services
31 Cross-VC NSX Use Cases Centralized security policy management One place to Manage FW rules Rules enforced regardless of VM location and VC Universal Firewall Policy CONFIDENTIAL 31
32 Cross-VC NSX Use Cases NSX 6.2 supports new mobility boundaries in vsphere 6 Enable Cross VC and Long Distance vmotion On existing networks, with no new hardware required vcenter-a vcenter-b <= 150ms RTT VDS-A VDS-B VXLAN Transport (L3) & vmotion Network (L3) CONFIDENTIAL 32
33 VMware NSX Summary and Takeaways Network provisioning time is reduced from days to minutes Operational efficiency is achieved through automation Place and move workloads independently of physical topology Integrate third-party network and security solutions through standard APIs Non-disruptive deployment over existing physical networks or next generation topologies Faithful reproduction of L2 L7 network & security services Logical Switching Logical Routing Logical Firewall Logical Load Balancer Logical VPN NSX Edge P-V Gateway Services are designed for scale-out All NSX components are designed with resiliency Multi-Data Center spanning with
34 Thank You
Advancing Security with Software Defined Datacenter. Karen Law Senior Systems Consultant VMware Hong Kong Ltd
Advancing Security with Software Defined Datacenter Karen Law Senior Systems Consultant VMware Hong Kong Ltd AGENDA Why Micro-segmentation? Understanding SDDC Network Virtualization Why Network Hypervisor?
More informationSoftware Defined Data Centers Network Virtualization & Security. Jeremy van Doorn Director of Systems Engineering EMEA, Network & Security
Software Defined Data Centers Network Virtualization & Security Jeremy van Doorn Director of Systems Engineering EMEA, Network & Security 1 My business and its IT organization are being engulfed by a torrent
More informationVMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic
VMware Software Defined Network Dejan Grubić VMware Systems Engineer for Adriatic The Transformation of Infrastructure Infrastructure Servers Clouds Be more responsive to business, change economics of
More informationIntro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.
Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security
More informationLimiting the Spread of Threats: A Data Center for Every User
SESSION ID: SPO1-R03 Limiting the Spread of Threats: A Data Center for Every User Geoff Huang Director Product Marketing VMware Tony Paikeday Senior Product Marketing Manager VMware Why do breaches still
More informationVMware NSX A Perspective for Service Providers part 2
VMware NSX A Perspective for Service Providers part 2 Using Software Defined Networking to harden DC security controls Trevor Gerdes Strategic Architect Security and Networks NSX for SPs Part 2 - Agenda
More informationNetzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
More informationHow To Build A Software Defined Data Center
Delivering the Software Defined Data Center Georgina Schäfer Sr. Product Marketing Manager VMware Calvin Rowland, VP, Business Development F5 Networks 2014 VMware Inc. All rights reserved. F5 & Vmware
More informationBusiness Values of Network and Security Virtualization
Business Values of Network and Security Virtualization VMware NSX in the context of the Software Defined Data Center Klaus Jansen Virtual Networks Sales Specialist VMware NSBU 2014 VMware Inc. All rights
More informationItex VMware NSX Network Virtualization Presentation
Itex VMware NSX Network Virtualization Presentation Gabriel Maciel VCP3, VCP4/5-DCV, Security+, Project+ Sr. Systems Engineer Canadian Federal Government @gmaciel_ca 2014 VMware Inc. All rights reserved.
More informationData Center Micro-Segmentation
Data Center Micro-Segmentation A Software Defined Data Center Approach for a Zero Trust Security Strategy W H I T E P A P E R Table of Contents Executive Summary... 3 The Software Defined Data Center is
More informationVM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware
VM-Series for VMware The VM-Series for VMware supports VMware NSX, ESXI stand-alone and vcloud Air, allowing you to deploy next-generation firewall security and advanced threat prevention within your VMware-based
More informationSoftverski definirani data centri - 2. dio
Softverski definirani data centri - 2. dio Vmware NSX To Deliver a Software Defined Data Center Implementation Automated Operational Model Programmatically Create, Snapshot, Store, Move, Delete, Restore
More informationHow To Protect A Data Center From A Hacker Attack
CHECK POINT & VMWARE NSX AUTOMATING ADVANCED SECURITY FOR THE SOFTWARE-DEFINED DATACENTER Micki Boland Virtual and Cloud Cyber Security Architect mboland@checkpoint.com 2015 Check Point Software Technologies
More informationSTRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
More informationWhite Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.
White Paper Juniper Networks Solutions for VMware NSX Enabling Businesses to Deploy Virtualized Data Center Environments Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3
More informationMicrosegmentation Using NSX Distributed Firewall: Getting Started
Microsegmentation Using NSX Distributed Firewall: VMware NSX for vsphere, release 6.0x REFERENCE PAPER Table of Contents Microsegmentation using NSX Distributed Firewall:...1 Introduction... 3 Use Case
More informationAdvanced Security Services with Trend Micro Deep Security and VMware NSX Platforms
A Trend Micro Technical White Paper June 2015 Advanced Security Services with Trend Micro and VMware NSX Platforms >> This document is targeted at virtualization, security, and network architects interested
More informationVMware vcloud Networking and Security Overview
VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility
More informationUnlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre
Unlock the full potential of data centre virtualisation with micro-segmentation Making software-defined security (SDS) work for your data centre Contents 1 Making software-defined security (SDS) work for
More informationPalo Alto Networks. Security Models in the Software Defined Data Center
Palo Alto Networks Security Models in the Software Defined Data Center Christer Swartz Palo Alto Networks CCIE #2894 Network Overlay Boundaries & Security Traditionally, all Network Overlay or Tunneling
More informationCross-vCenter NSX Installation Guide
NSX 6.2 for vsphere This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
More informationHAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer
HAWAII TECH TALK SDN Paul Deakin Field Systems Engineer SDN What Is It? SDN stand for Software Defined Networking SDN is a fancy term for: Using a controller to tell switches where to send packets SDN
More informationVMware vcloud Networking and Security
VMware vcloud Networking and Security Efficient, Agile and Extensible Software-Defined Networks and Security BROCHURE Overview Organizations worldwide have gained significant efficiency and flexibility
More informationVMware. NSX Network Virtualization Design Guide
VMware NSX Network Virtualization Design Guide Table of Contents Intended Audience... 3 Overview... 3 Components of the VMware Network Virtualization Solution... 4 Data Plane... 4 Control Plane... 5 Management
More informationSecuring the Virtualized Data Center With Next-Generation Firewalls
Securing the Virtualized Data Center With Next-Generation Firewalls Data Center Evolution Page 2 Security Hasn t Kept Up with Rate Of Change Configuration of security policies are manual and slow Weeks
More informationShifting Roles for Security in the Virtualized Data Center: Who Owns What?
Shifting Roles for Security in the Virtualized Data Center: Who Owns What? SESSION ID: CSV-T07 Rob Randell, CISSP Director Systems Engineering Principal Security Architect VMware / NSBU Malcolm Rieke Director
More informationNext-Generation Datacenter Security Implementation Guidelines
Next-Generation Datacenter Security Implementation Guidelines March 2015 INTRODUCTION 3 DEPLOYMENT OVERVIEW 4 IMPLEMENTATION GUIDELINES 4 PA-7050 Boundary Firewalls to protect north-south traffic 5 Virtual
More informationArchitecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP Principal Systems Engineer Security Specialist Agenda What is the Cloud? Virtualization Basics
More informationVirtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
More informationSoftware Defined Network (SDN)
Georg Ochs, Smart Cloud Orchestrator (gochs@de.ibm.com) Software Defined Network (SDN) University of Stuttgart Cloud Course Fall 2013 Agenda Introduction SDN Components Openstack and SDN Example Scenario
More informationSecurity in the Software Defined Data Center
Security in the Software Defined Data Center Francesco Vigo Senior Systems Engineer, VMware fvigo@vmware.com Ugo Piazzalunga Technical Manager, SafeNet ugo.piazzalunga@safenet-inc.com Agenda Software Defined
More informationIntroduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre
Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre Wilfried van Haeren CTO Edgeworx Solutions Inc. www.edgeworx.solutions Topics Intro Edgeworx Past-Present-Future
More informationSoftware Defined Environments
November 2015 Software Defined Environments 2015 Cloud Lecture, University of Stuttgart Jochen Breh, Director Architecture & Consulting Cognizant Global Technology Office Agenda Introduction New Requirements
More informationNext Generation Security with VMware NSX and Palo Alto Networks VM-Series TECHNICAL WHITE PAPER
Next Generation Security with VMware NSX and Palo Alto Networks VM-Series TECHNICAL WHITE PAPER Summary of Contents Introduction... 3 Intended Audience and purpose of document.... 3 Solution Overview....
More informationNext Generation Security with VMware NSX and Palo Alto Networks VM-Series TECHNICAL WHITE PAPER
Next Generation Security with VMware NSX and Palo Alto Networks VM-Series TECHNICAL WHITE PAPER Summary of Contents Introduction... 3 Intended Audience and purpose of document.... 3 Solution Overview....
More informationCisco ASA 1000V Cloud Firewall
Data Sheet Cisco ASA 1000V Cloud Firewall Product Overview The Cisco ASA 1000V Cloud Firewall extends the proven Adaptive Security Appliance security platform to consistently secure the tenant edge in
More informationVXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
More informationSOFTWARE DEFINED NETWORKING: INDUSTRY INVOLVEMENT
BROCADE SOFTWARE DEFINED NETWORKING: INDUSTRY INVOLVEMENT Rajesh Dhople Brocade Communications Systems, Inc. rdhople@brocade.com 2012 Brocade Communications Systems, Inc. 1 Why can t you do these things
More information(R)Evolution im Software Defined Datacenter Hyper-Converged Infrastructure
(R)Evolution im Software Defined Datacenter Hyper-Converged Infrastructure David Kernahan Senior Systems Engineer VMware Switzerland GmbH 2014 VMware Inc. All rights reserved. Agenda 1 VMware Strategy
More informationVMware vshield App Design Guide TECHNICAL WHITE PAPER
ware vshield App Design Guide TECHNICAL WHITE PAPER ware vshield App Design Guide Overview ware vshield App is one of the security products in the ware vshield family that provides protection to applications
More informationSecuring Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
More informationKeith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com
1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption
More informationCisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems
Cisco Prime Network Services Controller Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems Agenda Cloud Networking Challenges Prime Network Services Controller L4-7 Services Solutions
More informationREMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION
REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION The modern data centre has ever-increasing demands for throughput and performance, and the security infrastructure required to protect and segment the network
More informationWhat s New in VMware Site Recovery Manager 6.1
What s New in VMware Site Recovery Manager 6.1 Technical Overview AUGUST 2015 Table of Contents Introduction... 2 Storage profile based protection... 2 Stretched Storage and Orchestrated vmotion... 5 Enhanced
More informationSet Up a VM-Series NSX Edition Firewall
Set Up a VM-Series NSX Edition Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA
More informationUse Case Brief NETWORK SECURITY
Use Case Brief NETWORK SECURITY As Datacenter architectures have incorporated virtualization, new application topologies, and new programming constructs such as Docker Containers, new security gaps have
More informationIT Security at the Speed of Business: Security Provisioning with Symantec Data Center Security
IT Security at the Speed of Business: Security Provisioning with Symantec Data Center Security Today s data centers are transitioning into software-defined data centers (SDDC). In the SDDC, the core elements
More informationVMware NSX @SoftLayer!!
A VMware@SoftLayer CookBook v1.1 April 30, 2014 VMware NSX @SoftLayer Author(s) & Contributor(s) (IBM) Shane B. Mcelligott Dani Roisman (VMware) Merlin Glynn, mglynn@vmware.com Chris Wall Geoff Wing Marcos
More informationSecure Cloud-Ready Data Centers Juniper Networks
Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security
More informationData Center Manager (DCM)
DATA SHEET Data Center Manager (DCM) Unified Virtual/Physical Data Center Fabric Management Benefits LOWER OPERATIONAL COSTS High degree of automation within physical and virtual environments to streamline
More informationAbout the VM-Series Firewall
About the VM-Series Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/
More informationVMware and Brocade Network Virtualization Reference Whitepaper
VMware and Brocade Network Virtualization Reference Whitepaper Table of Contents EXECUTIVE SUMMARY VMWARE NSX WITH BROCADE VCS: SEAMLESS TRANSITION TO SDDC VMWARE'S NSX NETWORK VIRTUALIZATION PLATFORM
More informationOrchestrating Software Defined Networks (SDN) to Disrupt the APT Kill Chain
SESSION ID: ANF-T08 Orchestrating Software Defined Networks (SDN) to Disrupt the APT Kill Chain Sean Doherty VP Technology Partnerships and Alliances Symantec @SeandDInfo Deb Banerjee Chief Architect,
More informationVMware NSX Network Virtualization Design Guide. Deploying VMware NSX with Cisco UCS and Nexus 7000
VMware NSX Network Virtualization Design Guide Deploying VMware NSX with Cisco UCS and Nexus 7000 Table of Contents Intended Audience... 3 Executive Summary... 3 Why deploy VMware NSX on Cisco UCS and
More informationPalo Alto Networks Cyber Security Platform for the Software Defined Data center. Zekeriya Eskiocak Security Consultant Palo Alto Networks
Palo Alto Networks Cyber Security Platform for the Software Defined Data center Zekeriya Eskiocak Security Consultant Palo Alto Networks Evolution towards a software defined data center Server Virtualiza-on
More informationSet Up a VM-Series NSX Edition Firewall
Set Up a VM-Series NSX Edition Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA
More informationSimplify IT. With Cisco Application Centric Infrastructure. Barry Huang bhuang@cisco.com. Nov 13, 2014
Simplify IT With Cisco Application Centric Infrastructure Barry Huang bhuang@cisco.com Nov 13, 2014 There are two approaches to Control Systems IMPERATIVE CONTROL DECLARATIVE CONTROL Baggage handlers follow
More informationThe Impact of Virtualization on Cloud Networking Arista Networks Whitepaper
Virtualization takes IT by storm The Impact of Virtualization on Cloud Networking The adoption of virtualization in data centers creates the need for a new class of networking designed to support elastic
More informationSet Up a VM-Series NSX Edition Firewall
Set Up a VM-Series NSX Edition Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA
More informationVMware EVO SDDC Overview WHITE PAPER
VMware EVO SDDC Overview WHITE PAPER Introduction Fueled by trends such as business analytics and mobility, the public cloud continues to expand year after year. Lines of business enjoy the agility and
More informationJourney to the Private Cloud. Key Enabling Technologies
Journey to the Private Cloud Key Enabling Technologies Jeffrey Nick Chief Technology Officer Senior Vice President EMC Corporation June 2010 1 The current I/T state: Infrastructure sprawl Information explosion
More informationSDDC: A New Architecture for a New Era of Ed IT
Welcome MEEC Members! SDDC: A New Architecture for a New Era of Ed IT PRESENTED BY Chuck Kiessling Data Networks Solutions Architect Dan Radke VMware Network and Security Specialist M E E C M E M B E R
More informationJUNIPER. One network for all demands MICHAEL FRITZ CEE PARTNER MANAGER. 1 Copyright 2010 Juniper Networks, Inc. www.juniper.net
JUNIPER One network for all demands MICHAEL FRITZ CEE PARTNER MANAGER 1 Copyright 2010 Juniper Networks, Inc. www.juniper.net 2-3-7: JUNIPER S BUSINESS STRATEGY 2 Customer Segments 3 Businesses Service
More informationVMware vcloud Director for Service Providers
Architecture Overview TECHNICAL WHITE PAPER Table of Contents Scope of Document....3 About VMware vcloud Director....3 Platform for Infrastructure Cloud...3 Architecture Overview....3 Constructs of vcloud
More informationUse Case Brief BUILDING A PRIVATE CLOUD PROVIDING PUBLIC CLOUD FUNCTIONALITY WITHIN THE SAFETY OF YOUR ORGANIZATION
Use Case Brief BUILDING A PRIVATE CLOUD PROVIDING PUBLIC CLOUD FUNCTIONALITY WITHIN THE SAFETY OF YOUR ORGANIZATION At many enterprises today, end users are demanding a powerful yet easy-to-use Private
More informationHow the Software-Defined Data Center Is Transforming End User Computing
How the Software-Defined Data Center Is Transforming End User Computing The Essentials Series sponsored by David Davis SDDC Powered Virtual Desktops and Applications... 1 Three Pillars of SDDC and Desktop/Application
More informationNetwork Virtualization
Network Virtualization Petr Grygárek 1 Network Virtualization Implementation of separate logical network environments (Virtual Networks, VNs) for multiple groups on shared physical infrastructure Total
More informationVIRTUALIZED SERVICES PLATFORM Software Defined Networking for enterprises and service providers
VIRTUALIZED SERVICES PLATFORM Software Defined Networking for enterprises and service providers Why it s unique The Nuage Networks VSP is the only enterprise and service provider-grade SDN platform that:
More informationDeliver the Next Generation Intelligent Datacenter Fabric with the Cisco Nexus 1000V, Citrix NetScaler Application Delivery Controller and Cisco vpath
Citrix NetScaler for Cisco Nexus 1000v White Paper Deliver the Next Generation Intelligent Datacenter Fabric with the Cisco Nexus 1000V, Citrix NetScaler Application Delivery Controller and Cisco vpath
More informationNSX Installation Guide
NSX 6.2 for vsphere This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
More informationVMware NSX for vsphere (NSX-V) Network Virtualization Design Guide
VMware NSX for vsphere (NSX-V) Network Virtualization Design Guide DESIGN GUIDE / 1 Intended Audience... 4 Overview... 4 Introduction to Network Virtualization... 5 Overview of NSX-v Network Virtualization
More informationTesting Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...
More information1518 Best Practices in Virtualization & Cloud Security with Symantec
1518 Best Practices in Virtualization & Cloud Security with Symantec Tues May 6, 11:00 Kevin Stultz Symantec Product Management Chip Epps Symantec Product Marketing 1 Agenda 1 2 Trends in Virtualization
More informationMultitenancy Options in Brocade VCS Fabrics
WHITE PAPER DATA CENTER Multitenancy Options in Brocade VCS Fabrics As cloud environments reach mainstream adoption, achieving scalable network segmentation takes on new urgency to support multitenancy.
More informationData Center Infrastructure of the future. Alexei Agueev, Systems Engineer
Data Center Infrastructure of the future Alexei Agueev, Systems Engineer Traditional DC Architecture Limitations Legacy 3 Tier DC Model Layer 2 Layer 2 Domain Layer 2 Layer 2 Domain Oversubscription Ports
More informationNetwork Virtualization for the Enterprise Data Center. Guido Appenzeller Open Networking Summit October 2011
Network Virtualization for the Enterprise Data Center Guido Appenzeller Open Networking Summit October 2011 THE ENTERPRISE DATA CENTER! Major Trends change Enterprise Data Center Networking Trends in the
More informationvcloud Suite Architecture Overview and Use Cases
vcloud Suite Architecture Overview and Use Cases vcloud Suite 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationAnalysis of Network Segmentation Techniques in Cloud Data Centers
64 Int'l Conf. Grid & Cloud Computing and Applications GCA'15 Analysis of Network Segmentation Techniques in Cloud Data Centers Ramaswamy Chandramouli Computer Security Division, Information Technology
More informationData Center Networking Designing Today s Data Center
Data Center Networking Designing Today s Data Center There is nothing more important than our customers. Data Center Networking Designing Today s Data Center Executive Summary Demand for application availability
More informationScalable Approaches for Multitenant Cloud Data Centers
WHITE PAPER www.brocade.com DATA CENTER Scalable Approaches for Multitenant Cloud Data Centers Brocade VCS Fabric technology is the ideal Ethernet infrastructure for cloud computing. It is manageable,
More informationExpert Reference Series of White Papers. vcloud Director 5.1 Networking Concepts
Expert Reference Series of White Papers vcloud Director 5.1 Networking Concepts 1-800-COURSES www.globalknowledge.com vcloud Director 5.1 Networking Concepts Rebecca Fitzhugh, VMware Certified Instructor
More informationSet Up a VM-Series Firewall on an ESXi Server
Set Up a VM-Series Firewall on an ESXi Server Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara,
More informationData Center Use Cases and Trends
Data Center Use Cases and Trends Amod Dani Managing Director, India Engineering & Operations http://www.arista.com Open 2014 Open Networking Networking Foundation India Symposium, January 31 February 1,
More informationEnabling Solutions in Cloud Infrastructure and for Network Functions Virtualization
Enabling Solutions in Cloud Infrastructure and for Network Functions Virtualization Gateway Use Cases for Virtual Networks with MX Series Routers 1 Table of Contents Executive Summary... 3 Introduction...4
More informationPotecting your business assets in The Cloud, with. Secure Multitency Environment from CloudHPT.
Potecting your business assets in The Cloud, with Secure Multitency Environment from CloudHPT. Whitepaper 1 Introduction Goal of This Document To provide a guide to the security features of CloudHPT. CloudHPT
More informationOVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (meclavea@brocade.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (jallen@llnw.com) Senior Architect, Limelight
More informationSimplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera rbarrera@grupo-dice.com. VERSION May, 2015
Simplify IT With Cisco Application Centric Infrastructure Roberto Barrera rbarrera@grupo-dice.com VERSION May, 2015 Content Understanding Software Definded Network (SDN) Why SDN? What is SDN and Its Benefits?
More informationvcloud Air - Virtual Private Cloud OnDemand Networking Guide
vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
More informationBuilding Scalable Multi-Tenant Cloud Networks with OpenFlow and OpenStack
Building Scalable Multi-Tenant Cloud Networks with OpenFlow and OpenStack Dave Tucker Hewlett-Packard April 2013 1 About Me Dave Tucker WW Technical Marketing HP Networking dave.j.tucker@hp.com Twitter:
More informationNetworking in the Era of Virtualization
SOLUTIONS WHITEPAPER Networking in the Era of Virtualization Compute virtualization has changed IT s expectations regarding the efficiency, cost, and provisioning speeds of new applications and services.
More informationCisco Intercloud Fabric Security Features: Technical Overview
White Paper Cisco Intercloud Fabric Security Features: Technical Overview White Paper May 2015 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of
More informationHow To Make A Virtual Machine Aware Of A Network On A Physical Server
VMready Virtual Machine-Aware Networking White Paper Table of Contents Executive Summary... 2 Current Server Virtualization Environments... 3 Hypervisors... 3 Virtual Switches... 3 Leading Server Virtualization
More informationBrocade VCS Fabrics: The Foundation for Software-Defined Networks
WHITE PAPER DATA CENTER Brocade VCS Fabrics: The Foundation for Software-Defined Networks Software-Defined Networking (SDN) offers significant new opportunities to centralize management and implement network
More informationBUILDING A NEXT-GENERATION DATA CENTER
BUILDING A NEXT-GENERATION DATA CENTER Data center networking has changed significantly during the last few years with the introduction of 10 Gigabit Ethernet (10GE), unified fabrics, highspeed non-blocking
More informationOpen Source Networking for Cloud Data Centers
Open Source Networking for Cloud Data Centers Gaetano Borgione Distinguished Engineer @ PLUMgrid April 2015 1 Agenda Open Source Clouds with OpenStack Building Blocks of Cloud Networking Tenant Networks
More informationNSX Administration Guide
NSX 6.2 for vsphere This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
More informationNetwork Access Control in Virtual Environments. Technical Note
Contents Security Considerations in.... 3 Addressing Virtualization Security Challenges using NAC and Endpoint Compliance... 3 Visibility and Profiling of VMs.... 4 Identification of Rogue or Unapproved
More informationSOFTWARE DEFINED NETWORKING
SOFTWARE DEFINED NETWORKING Bringing Networks to the Cloud Brendan Hayes DIRECTOR, SDN MARKETING AGENDA Market trends and Juniper s SDN strategy Network virtualization evolution Juniper s SDN technology
More information