STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
|
|
|
- Mervyn Long
- 10 years ago
- Views:
Transcription
1 STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
2 Abstract Cloud architectures rely on Software-Defined Networking to deliver on-demand services and overcome many networking and security challenges imposed by cloud requirements. Nuage Networks Virtualized Services Platform (VSP) delivers policy-based automation for network and security infrastructures to accelerate cloud deployments and provide on-demand service delivery. This white paper provides an in-depth overview of the policy-based security features in Nuage Networks VSP, and examples of the primary use cases, such as microsegmentation and secure multi-tenancy.
3 CONTENTS 1 Cloud security challenges 2 Limitations and evolution of traditional datacenter (non-sdn) security approaches 2 Introducing the Nuage Networks Virtualized Services Platform 3 Microsegmentation 5 Microsegmentation use cases 5 Nuage Networks security policy model 6 Nuage Networks partner ecosystem integrates best of breed security solutions 7 Nuage Networks VSP: A hardened and secure platform 8 Summary
4 Cloud security challenges As organizations rapidly build out their cloud environments, security concerns and requirements are frequently cited as the most challenging obstacle to overcome. In addition, to achieve many of the benefits of cloud architectures, organizations must make fundamental changes in virtualization and networking, which in turn necessitate new approaches to security in the modern datacenter. Cloud requirements that affect network and security policies include: Secure multi-tenancy: Cloud architectures assume there are multiple tenants sharing the same datacenter infrastructure, but it cannot be assumed these tenants are always trusted. Additional layers of security within the cloud are required to ensure security between tenants and applications if they are sharing the same server and network. This has led to a proliferation of security devices and policy enforcement points that increase the complexity of new application deployments. On-demand service delivery: Clouds are designed with the promise of on-demand service delivery and nearly instantaneous user-driven spin-up of applications in the private datacenter or public cloud. With each tenant and application potentially having specific security requirements, managing and deploying security policies can hinder the ability to deploy new services in a timely fashion. Application-specific policies: Traditional approaches to network security have been very network-centric, that is, dependent on network attributes and the network topology. In multi-tenant cloud environments, each tenant or application is likely to have its own security policies and requirements. A single security appliance may have to support different policies on different traffic flows, a challenge that few legacy security devices were designed to address. Location independence: To take advantage of cloud benefits and server virtualization, in general, application workloads must be location-independent, able to run on any server, in any rack, in any site, and potentially in both the private cloud and a public cloud location. Traditional security solutions have relied on security devices being in a fixed network location, potentially in-line with traffic flow between source and destination. Or they imposed a network topology that restricted where applications could be placed, requiring that they be either isolated or connected to other services. This type of security is completely incompatible with cloud architecture: a new virtualized security approach is required. Elastic scale-out: Similar to the need for location-independence, the cloud allows for elastic scale-out of new capacity in various locations. This may require the immediate, on-demand scale out and provisioning of additional security services. This type of scalability cannot be supported with traditional approaches and physical security appliances. Untrusted cloud providers: In addition to tenants not trusting each other in a cloud environment, many organizations have been unable to trust their most sensitive applications to public cloud providers. This lack of trust hinders their ability to take advantage of solutions that could potentially be more cost-effective. A security approach that protected sensitive data and traffic from compromise by the hosting facility is required. 1
5 Limitations and evolution of traditional datacenter (non-sdn) security approaches Traditional (non-software-defined Networking (SDN)) datacenter security approaches have been unable to adapt to cloud requirements and have needed to evolve in much the same way that traditional networking has evolved to virtual networking and SDN. Perimeter-centric evolving to zero-trust models: Traditional datacenter security focuses on the perimeter of the datacenter, ensuring that malicious traffic cannot enter from the outside. All traffic inside the datacenter is assumed to be trusted. This limited approach does not address multi-tenancy or the proliferation of eastwest traffic (between servers in the datacenter) in highly virtualized environments. Cloud networks have had to evolve to zero-trust models, where, by default, applications and workloads trust no other workload (connectivity is dropped) unless explicitly authorized. Physical security appliances becoming virtualized: Cloud architectures rely more on virtual security appliances rather than physical appliances to address virtual applications and virtual networking. They need to support workloads at any location and to be able to add security services on demand. Software-only security nodes can be added and scaled on-demand to address cloud requirements. Automated service insertion and service chaining: Frequently the most tedious and error-prone step in deploying new virtual applications is connecting the security nodes or appliances into the virtual application network. The process of adding firewall and application delivery controllers to the application network with the right policy configurations is referred to as service insertion or service chaining (when more than one service is connected between application tiers). The ability for an SDN platform to automate service chaining of security devices is a key feature in enabling cloud deployments and accelerating the rollout of multi-tier applications on-demand. Security policies mapped to applications, not the network: With the advent of cloud networking and multi-tenancy, security policies have evolved to be much more application-centric (for example, specific to application requirements, such as type of application, who the tenant is, which tier of the application is being protected) than network-centric (for example, network addresses and VLAN attributes). This emphasis on application-centric security policies has led to new features in security devices themselves, as well as the underlying SDN platforms that provision them into the application networks. Introducing the Nuage Networks Virtualized Services Platform Nuage Networks Virtualized Services Platform (VSP) is an SDN overlay networking solution that delivers policy-based automation of both network and security operations (provisioning, management and monitoring). SDN policies are managed in the Virtualized Services Directory (VSD), while the Virtualized Services Controller (VSC) automates changes to the cloud network and supporting devices, both physical and virtual. (See Figure 1.) Together the VSD and VSC comprise what is typically thought of as an SDN controller. 2
6 FIGURE 1. Nuage Networks VSP is an SDN cloud networking platform that includes the SDN controller and virtual networking infrastructure. Nuage Networks Virtualized Services Platform (VSP) Virtualized Services Directory (VSD) Network Policy Engine abstracts complexity Service templates and analytics Virtualized Services Controller (VSC) SDN Controller, programs the network Rich routing feature set Virtual Routing & Switching (VRS) Distributed switch/router L2-4 rules, L4 reflexive ACLs Integration of bare-metal assets The Virtual Routing and Switching (VRS) component of the Nuage Networks VSP architecture forms the virtual network and provides VXLAN overlay encapsulation to virtual workloads. VRS is typically a hypervisor-resident virtual switch that provides full Layer 2 and Layer 3 networking capabilities, including enforcement of network security policies through traditional switching capabilities such as access control lists (ACLs). Microsegmentation Nuage Networks VSP delivers and manages logical overlay application networks on shared datacenter infrastructures, managing connectivity between both physical and virtual workloads. By including virtual and physical security devices in these application networks, Nuage Networks VSP is able to enforce a zero-trust model, where security policies are potentially enforced between every tenant, application network and individual workload. This ability to provide fine-grained security policies to the individual workload level is called microsegmentation. (See Figure 2.) Microsegmentation and a zero-trust model can halt the lateral spread of malware within a datacenter in contrast to traditional perimeter security approaches. Security policies can be enforced directly within the VRS component of Nuage Networks VSP, which includes a Layer 4 distributed firewall. Alternatively, more advanced security policies can be enforced with best-of-breed security solutions from a rapidly growing ecosystem of security partners that includes Palo Alto Networks, varmour and Guardicore. In this SDN-based design, security policies are application- and workload-specific, and not dependent on the placement of the workload. The hypervisor-resident virtual switch can enforce ACL policies specific to each virtual machine (VM), while policies are managed and distributed from the centralized SDN controller. As VMs migrate between racks or between datacenters, the appropriate policies are always enforced in the new location. Physical security appliances can be included in the traffic flow to/from any application through automated service chaining. 3
7 FIGURE 2a. Traditional datacenter security policies focused on perimeter firewalls, but had few controls within the datacenter for east-west traffic. FIGURE 2b. Looking closer, microsegmentation provides security controls between individual workloads, as well as between applications, tenants and virtual networks. This level of granularity and sophistication can only be implemented within a large cloud environment with the help of SDN policy-based automation. VM VM VM VM VM VM VM Nuage Networks VSP automatically creates and deploys reflexive Layer 4 ACLs to enable responses back through the firewall. This approach simplifies policy management and reduces the number of explicit rules. To implement reflexive ACLs, the network keeps track of valid network flows or connections and allows packets that match a known or active connection to travel back to the host. This also enables the organization to establish different security requirements to initiate a connection and maintain one. ACL policies are not limited to traditional network-specific addresses such as source IP address, destination IP address, or port number. Policies can be constructed in the Nuage Networks SDN policy model based on mapping to the tenant, the application, application-type, and so on. This provides greater flexibility to security architects and aligns security rules with business-level requirements. Through a rapidly growing ecosystem of best-of-breed security partnerships and certification program, customers can include a wide range of security solutions in the Nuage Networks SDN policy model with automated service insertion. The ecosystem includes leading vendors of next-generation firewalls, application delivery controllers, and intrusion prevention systems. 4
8 Microsegmentation use cases A primary use case for microsegmentation is between application tiers in a multi-tier application network, such as between the application tier and the database tier in a web-based service. Each application tier can have its own access rules and security policies, and multiple instances of the same application network can be assigned to the same policy group to easily inherit the right security policy automatically. Microsegmentation can also ensure secure access to shared services, such as a backup service. Each endpoint can be connected to a common server or service, while individual endpoints, perhaps represented by different tenants, cannot access each other. When malware affects one virtual host, microsegmentation can be used to quickly restrict connectivity to other parts of the trusted network, by reassigning the affected workload to a quarantine group. Rather than needing to physically remove the compromised application, reassigning it to a new policy group for quarantine would allow blanket policies to restrict access to only remediation services automatically. One particular multi-tenant use case is secure Virtual Desktop Infrastructure (VDI) environments. Individual desktop environments sharing the same server and hypervisor can be easily isolated, while restricting access to specific individual desktop owners. TABLE 1. Microsegmentation use cases with allowed and blocked traffic policies MULTI-TIER APPLICATIONS SHARED SERVICES QUARANTINE WORKLOADS DESKTOP VIRTUALIZATION Allow Between application tiers Access to shared service Remediation service to infected app From owner to individual desktop Deny All other non-whitelist traffic Access between endpoints Traffic from infected endpoints Between VDI desktops Nuage Networks security policy model The capabilities of any SDN platform to implement and enforce security policies are determined by what can be represented in the SDN policy model, or the policy management language of the SDN platform. The Nuage Networks VSP policy model mirrors the organizational and application-based relationships that determine IT security policies. In the Nuage Networks policy model, security policies are grouped by application and workload types, or by trust zones. For example, all workloads of a particular application, like a developer tool, can be placed in a named policy group and inherit a common baseline of security restrictions. Or policies could be assigned to workloads based on a named security attribute or requirement, such as a PCIcompliance zone, or a quarantine zone for malware-infected applications as described earlier. These application policy zones can be grouped into larger groups by tenant or organization, or specific virtual networks. (See Figure 3.) 5
9 The individual application and zone security policies are template-based, meaning that existing policies can be easily modified and re-used as new applications and requirements are generated. Security policies can be updated centrally in a domain template and updates are propagated across all applicable endpoints, as well as across all applications and subnets that inherit from that template. For example, organizations can block a specific port used by newly found malware by simply updating the policy centrally in the template. Any virtual network or application domain that is based on the template will inherit the new security policy automatically. Global compliance and security updates can also be rolled out easily and individual application workloads ensured of consistent configurations. FIGURE 3. The Nuage Networks security policy model includes zone or group definitions that inherit policies from templates or higher level groups, and can be organized by tenants, applications and logical networks, for example. Virtual Network 1 (Tenant 1) PCI Zone/ Policy Group Non-PCI Zone/ Policy Group Physical Network Web Zone/ Policy Group Virtual Network 2 (Tenant 2) App Zone/ Policy Group DB Zone/ Policy Group Unlike traditional firewalls, the Nuage Networks security model is not limited to networking attributes when determining access privileges or allowing network traffic to pass. Business-level security policies can be built based on the application type, tenant name, logical zone, and so on. This provides greater flexibility and better representation of actual security policy requirements. Nuage Networks partner ecosystem integrates best of breed security solutions SDN has always been about open systems and interoperability. Initially this was focused on networking, but over time has extended to the integration and control of a wide range of security solutions and platforms as well. While Nuage Networks VSP manages and distributes many of the network security policies across the cloud infrastructure, it makes sense that enforcement of some of the security policies be handled by best-of-breed security solutions in categories such as firewalls, intrusion preventions systems, security analytics, access control, and more. (See Figure 4.) 6
10 FIGURE 4. Nuage Networks VSP enforces security policies between application tiers in a virtual network with firewall features in the VRS, or by service chaining third-party security devices such as a next-generation firewall or intrusion prevention system (either physical or virtual). Web Policy Group Web1 Web2 Embedded L4 Firewall in VRS Application Policy Group App1 App2 Firewall Database Policy Group DB1 Nuage Networks has developed a Solution Certification program that ensures the interoperability of third-party appliances and virtual solutions with the Nuage Networks VSP. By validating that the solutions work alongside those of its partners, Nuage Networks provides peace of mind for customers as they move their business applications to the cloud. Nuage Networks VSP: A hardened and secure platform In addition to the security policy enforcement capabilities in the Nuage Networks VSP policy model and with third-party security solutions, the Platform itself is hardened and secure, and resistant to compromise and hacker attacks. It underwent a detailed security audit by a third-party security firm to ensure the platform and the communications between components are secured. The audit included a detailed architecture and design review, as well as a code review, including analysis of overflows, key management features and cryptographic design. Penetration testing was conducted to identify security vulnerabilities and determine possible impacts of a successful attack. Communications within the Nuage Networks VSP system are end-to-end encrypted and based on certificate-based authentication between components to eliminate man-in-the-middle attacks and access to sensitive information. Administrative privileges within the system are enforced with role-based access control in conjunction with a Lightweight Directory Access Protocol server. All administrative access and security policy changes are logged to detect any unauthorized events. 7
11 Summary Nuage Networks VSP extends the benefits of SDN from networking to security policy management and orchestration. With cloud requirements including secure multi-tenancy, and fine-grained, application-specific security policies, automation of security devices and policies is the only way to achieve cloud-level scale and on-demand deployments. Nuage Networks VSP provides this SDN automation of the security infrastructure across network devices, its own virtual networks, and a broad ecosystem of security solutions. This automation of security and networking policies greatly reduces IT overhead, and provides a verifiable path to compliance across large multi-tenant environments. The microsegmentation capabilities deliver application-specific security policies to each tenant and workload, while preventing the spread of lateral attacks and malware. The automated approach to security remediation, including automated quarantine through Nuage Networks VSP group policies, provides faster incident response in the event of attack or data breach. Nuage Networks and the Nuage Networks logo are trademarks of Alcatel-Lucent. All other trademarks are the property of their respective owners. The information presented is subject to change without notice. Alcatel-Lucent assumes no responsibility for inaccuracies contained herein. Copyright 2015 Alcatel-Lucent. All rights reserved. PR EN (December)
Use Case Brief NETWORK SECURITY
Use Case Brief NETWORK SECURITY As Datacenter architectures have incorporated virtualization, new application topologies, and new programming constructs such as Docker Containers, new security gaps have
VIRTUALIZED SERVICES PLATFORM Software Defined Networking for enterprises and service providers
VIRTUALIZED SERVICES PLATFORM Software Defined Networking for enterprises and service providers Why it s unique The Nuage Networks VSP is the only enterprise and service provider-grade SDN platform that:
STRATEGIC WHITE PAPER. The next step in server virtualization: How containers are changing the cloud and application landscape
STRATEGIC WHITE PAPER The next step in server virtualization: How containers are changing the cloud and application landscape Abstract Container-based server virtualization is gaining in popularity, due
Use Case Brief CLOUD MANAGEMENT SOFTWARE AUTOMATION
Use Case Brief CLOUD MANAGEMENT SOFTWARE AUTOMATION Cloud Management Software can coordinate and automate server, network, and storage operations within the modern datacenter. This brief describes how
Use Case Brief BORDERLESS DATACENTERS
Use Case Brief BORDERLESS DATACENTERS Today s cloud service providers must maintain consistent levels of service for each end user or customer, independent of physical location and hardware. This brief
Use Case Brief BUILDING A PRIVATE CLOUD PROVIDING PUBLIC CLOUD FUNCTIONALITY WITHIN THE SAFETY OF YOUR ORGANIZATION
Use Case Brief BUILDING A PRIVATE CLOUD PROVIDING PUBLIC CLOUD FUNCTIONALITY WITHIN THE SAFETY OF YOUR ORGANIZATION At many enterprises today, end users are demanding a powerful yet easy-to-use Private
VMware vcloud Networking and Security
VMware vcloud Networking and Security Efficient, Agile and Extensible Software-Defined Networks and Security BROCHURE Overview Organizations worldwide have gained significant efficiency and flexibility
Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.
Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security
A Look at the New Converged Data Center
Organizations around the world are choosing to move from traditional physical data centers to virtual infrastructure, affecting every layer in the data center stack. This change will not only yield a scalable
Virtualized Network Services SDN solution for enterprises
Virtualized Network Services SDN solution for enterprises Nuage Networks Virtualized Network Services (VNS) is a fresh approach to business networking that seamlessly links your enterprise s locations
Securing Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
2015 DevOps SECURITY GUIDE For continuous application delivery
2015 DevOps SECURITY GUIDE Presented by: THE NEED FOR ADAPTIVE SECURITY Information security is not keeping up with the speed of business and IT. The network- and perimeter-centric security model being
VMware vcloud Networking and Security Overview
VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility
Virtualized Network Services SDN solution for service providers
Virtualized Network Services SDN solution for service providers Nuage Networks Virtualized Network Services (VNS) is a fresh approach to business networking that seamlessly links your enterprise customers
How Network Virtualization can improve your Data Center Security
How Network Virtualization can improve your Data Center Security Gilles Chekroun SDDC, NSX Team EMEA [email protected] 2014 VMware Inc. All rights reserved. Security IT spending Security spending is
Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure
White Paper Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure What You Will Learn The new Cisco Application Centric Infrastructure
Data Center Micro-Segmentation
Data Center Micro-Segmentation A Software Defined Data Center Approach for a Zero Trust Security Strategy W H I T E P A P E R Table of Contents Executive Summary... 3 The Software Defined Data Center is
Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments
Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments What You Will Learn Deploying network services in virtual data centers is extremely challenging. Traditionally, such Layer
Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre
Unlock the full potential of data centre virtualisation with micro-segmentation Making software-defined security (SDS) work for your data centre Contents 1 Making software-defined security (SDS) work for
Unconstrained Datacenter Networks for the Cloud Era
Unconstrained Datacenter Networks for the Cloud Era Abstract The value of cloud services lies in the rapid and cost-effective instantiation of applications that can be consumed by users anywhere. Enterprises
Virtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
Business Values of Network and Security Virtualization
Business Values of Network and Security Virtualization VMware NSX in the context of the Software Defined Data Center Klaus Jansen Virtual Networks Sales Specialist VMware NSBU 2014 VMware Inc. All rights
A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks
A Coordinated Virtual Infrastructure for SDN in Enterprise Networks Software Defined Networking (SDN), OpenFlow and Application Fluent Programmable Networks Strategic White Paper Increasing agility and
VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic
VMware Software Defined Network Dejan Grubić VMware Systems Engineer for Adriatic The Transformation of Infrastructure Infrastructure Servers Clouds Be more responsive to business, change economics of
Cisco and Citrix Solution
Cisco and Citrix Solution Build Application-Centric Data Centers with Application Delivery Controllers 2014 Cisco Citrix. All rights reserved. Page 1 What You Will Learn Cisco Application Centric Infrastructure
Advancing Security with Software Defined Datacenter. Karen Law Senior Systems Consultant VMware Hong Kong Ltd
Advancing Security with Software Defined Datacenter Karen Law Senior Systems Consultant VMware Hong Kong Ltd AGENDA Why Micro-segmentation? Understanding SDDC Network Virtualization Why Network Hypervisor?
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...
Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera [email protected]. VERSION May, 2015
Simplify IT With Cisco Application Centric Infrastructure Roberto Barrera [email protected] VERSION May, 2015 Content Understanding Software Definded Network (SDN) Why SDN? What is SDN and Its Benefits?
H Y T RUST: S OLUTION B RIEF. Solve the Nosy Neighbor Problem in Multi-Tenant Environments
H Y T RUST: S OLUTION B RIEF Solve the Nosy Neighbor Problem in Multi-Tenant Environments Summary A private cloud with multiple tenants such as business units of an enterprise or customers of a cloud service
SINGLE-TOUCH ORCHESTRATION FOR PROVISIONING, END-TO-END VISIBILITY AND MORE CONTROL IN THE DATA CENTER
SINGLE-TOUCH ORCHESTRATION FOR PROVISIONING, END-TO-END VISIBILITY AND MORE CONTROL IN THE DATA CENTER JOINT SDN SOLUTION BY ALCATEL-LUCENT ENTERPRISE AND NEC APPLICATION NOTE EXECUTIVE SUMMARY Server
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
How To Build A Software Defined Data Center
Delivering the Software Defined Data Center Georgina Schäfer Sr. Product Marketing Manager VMware Calvin Rowland, VP, Business Development F5 Networks 2014 VMware Inc. All rights reserved. F5 & Vmware
Analysis of Network Segmentation Techniques in Cloud Data Centers
64 Int'l Conf. Grid & Cloud Computing and Applications GCA'15 Analysis of Network Segmentation Techniques in Cloud Data Centers Ramaswamy Chandramouli Computer Security Division, Information Technology
Limiting the Spread of Threats: A Data Center for Every User
SESSION ID: SPO1-R03 Limiting the Spread of Threats: A Data Center for Every User Geoff Huang Director Product Marketing VMware Tony Paikeday Senior Product Marketing Manager VMware Why do breaches still
How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat
VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Security and Compliance VMware vcloud Networking and Security is the leading networking and security
TECHNOLOGY WHITE PAPER. Correlating SDN overlays and the physical network with Nuage Networks Virtualized Services Assurance Platform
TECHNOLOGY WHITE PAPER Correlating SDN overlays and the physical network with Nuage Networks Virtualized Services Assurance Platform Abstract Enterprises are expanding their private clouds and extending
Deliver the Next Generation Intelligent Datacenter Fabric with the Cisco Nexus 1000V, Citrix NetScaler Application Delivery Controller and Cisco vpath
Citrix NetScaler for Cisco Nexus 1000v White Paper Deliver the Next Generation Intelligent Datacenter Fabric with the Cisco Nexus 1000V, Citrix NetScaler Application Delivery Controller and Cisco vpath
Netzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
Scalable Approaches for Multitenant Cloud Data Centers
WHITE PAPER www.brocade.com DATA CENTER Scalable Approaches for Multitenant Cloud Data Centers Brocade VCS Fabric technology is the ideal Ethernet infrastructure for cloud computing. It is manageable,
Five Steps For Securing The Data Center: Why Traditional Security May Not Work
White Paper Five Steps For Securing The Data Center: Why Traditional Security May Not Work What You Will Learn Data center administrators face a significant challenge: They need to secure the data center
VMware NSX A Perspective for Service Providers part 2
VMware NSX A Perspective for Service Providers part 2 Using Software Defined Networking to harden DC security controls Trevor Gerdes Strategic Architect Security and Networks NSX for SPs Part 2 - Agenda
EXTENSIBLE WIDE AREA NETWORKING
EXTENSIBLE WIDE AREA NETWORKING Leverage Software Defined Networking to deliver flexible network services to branch offices @nuagenetworks Your clients and end users want instant access to their chosen
IT Security at the Speed of Business: Security Provisioning with Symantec Data Center Security
IT Security at the Speed of Business: Security Provisioning with Symantec Data Center Security Today s data centers are transitioning into software-defined data centers (SDDC). In the SDDC, the core elements
WildFire. Preparing for Modern Network Attacks
WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends
VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware
VM-Series for VMware The VM-Series for VMware supports VMware NSX, ESXI stand-alone and vcloud Air, allowing you to deploy next-generation firewall security and advanced threat prevention within your VMware-based
Network Virtualization Solutions - A Practical Solution
SOLUTION GUIDE Deploying Advanced Firewalls in Dynamic Virtual Networks Enterprise-Ready Security for Network Virtualization 1 This solution guide describes how to simplify deploying virtualization security
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility
PLUMgrid Open Networking Suite Service Insertion Architecture
White Paper PLUMgrid Open Networking Suite Service Insertion Architecture Introduction A rapid increase in the use of cloud services across the globe require networks to be adaptable and flexible. PLUMgrid
SDN Security Considerations in the Data Center. ONF Solution Brief October 8, 2013
SDN Security Considerations in the Data Center ONF Solution Brief October 8, 2013 Table of Contents 2 Executive Summary 3 SDN Overview 4 Network Security Challenges 6 The Implications of SDN on Network
Itex VMware NSX Network Virtualization Presentation
Itex VMware NSX Network Virtualization Presentation Gabriel Maciel VCP3, VCP4/5-DCV, Security+, Project+ Sr. Systems Engineer Canadian Federal Government @gmaciel_ca 2014 VMware Inc. All rights reserved.
Virtualization Essentials
Virtualization Essentials Table of Contents Introduction What is Virtualization?.... 3 How Does Virtualization Work?... 4 Chapter 1 Delivering Real Business Benefits.... 5 Reduced Complexity....5 Dramatically
Software Defined Data Centers Network Virtualization & Security. Jeremy van Doorn Director of Systems Engineering EMEA, Network & Security
Software Defined Data Centers Network Virtualization & Security Jeremy van Doorn Director of Systems Engineering EMEA, Network & Security 1 My business and its IT organization are being engulfed by a torrent
HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer
HAWAII TECH TALK SDN Paul Deakin Field Systems Engineer SDN What Is It? SDN stand for Software Defined Networking SDN is a fancy term for: Using a controller to tell switches where to send packets SDN
Overcoming Security Challenges to Virtualize Internet-facing Applications
Intel IT IT Best Practices Cloud Security and Secure ization November 2011 Overcoming Security Challenges to ize Internet-facing Applications Executive Overview To enable virtualization of Internet-facing
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)
Software defined networking. Your path to an agile hybrid cloud network
Software defined networking Your path to an agile hybrid cloud network Is your enterprise network ready for the latest business and consumer trends? Cloud How easily can your users connect to cloud resources?
TOP 5 REASONS WHY FINANCIAL SERVICES FIRMS SHOULD CONSIDER SDN NOW
TOP 5 REASONS WHY FINANCIAL SERVICES FIRMS SHOULD CONSIDER SDN NOW Abstract Software-defined networking, or SDN, is a relatively new technology that is already having a major impact on companies in the
Software-Defined Networks Powered by VellOS
WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible
The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements:
Compliance Brief The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements: Using Server Isolation and Encryption as a Regulatory Compliance Solution and IT Best Practice Introduction
ILLUMIO ADAPTIVE SECURITY PLATFORM TM
ILLUMIO ADAPTIVE SECURITY PLATFORM TM HIGHLIGHTS Security with Intelligence Illumio ASP is powered by the breakthrough PCE. The PCE contextualizes all traffic flows, services, and processes on application
Securing the Virtualized Data Center With Next-Generation Firewalls
Securing the Virtualized Data Center With Next-Generation Firewalls Data Center Evolution Page 2 Security Hasn t Kept Up with Rate Of Change Configuration of security policies are manual and slow Weeks
ALTERNATIVES FOR SECURING VIRTUAL NETWORKS
White Paper ALTERNATIVES FOR SECURING VIRTUAL NETWORKS A Different Network Requires a Different Approach Extending Security to the Virtual World Copyright 2013, Juniper Networks, Inc. 1 Table of Contents
VMware vcloud Air Networking Guide
vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
VMware vshield App Design Guide TECHNICAL WHITE PAPER
ware vshield App Design Guide TECHNICAL WHITE PAPER ware vshield App Design Guide Overview ware vshield App is one of the security products in the ware vshield family that provides protection to applications
vcloud Air - Virtual Private Cloud OnDemand Networking Guide
vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Outline. Why Neutron? What is Neutron? API Abstractions Plugin Architecture
OpenStack Neutron Outline Why Neutron? What is Neutron? API Abstractions Plugin Architecture Why Neutron? Networks for Enterprise Applications are Complex. Image from windowssecurity.com Why Neutron? Reason
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre
Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre Wilfried van Haeren CTO Edgeworx Solutions Inc. www.edgeworx.solutions Topics Intro Edgeworx Past-Present-Future
How To Protect A Data Center From A Hacker Attack
CHECK POINT & VMWARE NSX AUTOMATING ADVANCED SECURITY FOR THE SOFTWARE-DEFINED DATACENTER Micki Boland Virtual and Cloud Cyber Security Architect [email protected] 2015 Check Point Software Technologies
FLEXIBLE NETWORK SERVICES TO DRIVE YOUR ENTERPRISE AT CLOUD SPEED. Solution Primer
FLEXIBLE NETWORK SERVICES TO DRIVE YOUR ENTERPRISE AT CLOUD SPEED Solution Primer ABSTRACT Software Defined Networking (SDN) has delivered significant benefits to datacenter networks, making it possible
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. [email protected]
1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. [email protected] Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption
Group-Based Policy for OpenStack
Group-Based Policy for OpenStack Introduction Over the past four years, OpenStack has grown from a simple open source project to a major community-based initiative including thousands of contributors in
Sygate Secure Enterprise and Alcatel
Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and
SECURING DATA IN TRANSIT
SECURING DATA IN TRANSIT illumio.com WP20150729 CONTENTS OVERVIEW 3 Business drivers 3 Current challenges with securing data in transit 3 The Illumio solution 3 CURRENT APPROACHES TO SECURING DATA IN TRANSIT
ILLUMIO ADAPTIVE SECURITY PLATFORM TM
ILLUMIO ADAPTIVE SECURITY PLATFORM TM HIGHLIGHTS Security with Intelligence Illumio ASP is powered by the breakthrough PCE. The PCE contextualizes all traffic flows, services, and processes on application
Alcatel-Lucent Services
SOLUTION DESCRIPTION Alcatel-Lucent Services Security Introduction Security is a sophisticated business and technical challenge, and it plays an important role in the success of any network, service or
ARCHITECT S GUIDE: Comply to Connect Using TNC Technology
ARCHITECT S GUIDE: Comply to Connect Using TNC Technology August 2012 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006 Tel (503) 619-0562 Fax (503) 644-6708 [email protected]
Open SDN for Network Visibility
SOLUTION GUIDE Open SDN for Network Visibility Simplifying large scale network monitoring systems with Big Tap 1 This solution guide describes how Big Tap, a network monitoring application from Big Switch
Why Service Providers Need an NFV Platform Strategic White Paper
Why Service Providers Need an NFV Platform Strategic White Paper Network Functions Virtualization (NFV) brings proven cloud computing and IT technologies into the networking domain to help service providers
Policy Management: The Avenda Approach To An Essential Network Service
End-to-End Trust and Identity Platform White Paper Policy Management: The Avenda Approach To An Essential Network Service http://www.avendasys.com email: [email protected] email: [email protected] Avenda
Achieving PCI Compliance Using F5 Products
Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Vyatta Network OS for Network Virtualization
Complete Security and Compliance for Virtual Environments Vyatta takes the concept of virtualization beyond just applications and operating systems and allows enterprise IT to also virtualize network components
Preparing an RFI for. This RFI has been updated to reflect the new requirements in Version 3.0 of the PCI DSS, which took effect January 2015.
Preparing an RFI for Protecting cardholder data is a critical and mandatory requirement for all organizations that process, store or transmit information on credit or debit cards. Requirements and guidelines
Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES
Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 SDN - An Overview... 2 SDN: Solution Layers and its Key Requirements to be validated...
Does your Citrix or Terminal Server environment have an Achilles heel?
CRYPTZONE WHITE PAPER Does your Citrix or Terminal Server environment have an Achilles heel? Moving away from IP-centric to role-based access controls to secure Citrix and Terminal Server user access cryptzone.com
Accelerating Micro-segmentation
WHITE PAPER Accelerating Micro-segmentation THE INITIAL CHALLENGE WAS THAT TRADITIONAL SECURITY INFRASTRUCTURES WERE CONCERNED WITH SECURING THE NETWORK BORDER, OR EDGE, WITHOUT BUILDING IN EFFECTIVE SECURITY
Technical Note. ForeScout CounterACT: Virtual Firewall
ForeScout CounterACT: Contents Introduction... 3 What is the vfw?.... 3 Technically, How Does vfw Work?.... 4 How Does vfw Compare to a Real Firewall?.... 4 How Does vfw Compare to other Blocking Methods?...
Cisco and Citrix: Building Application Centric, ADC-enabled Data Centers
: Building Application Centric, ADC-enabled Data Centers Cisco Application Centric Infrastructure (ACI) integrates Citrix NetScaler Application Delivery Controller (ADC) appliances to reduce deployment
The Technical Differential: Why Service Providers Choose VMware for Cloud-Hosted Desktops as a Service
The Technical Differential: Technical WHITE PAPER Table of Contents Executive Summary...3 Partnering With VMware Makes Business Sense...3 The VMware DaaS Blueprint...3 The VMware Technology Advantage...4
