Shifting Roles for Security in the Virtualized Data Center: Who Owns What?
|
|
|
- Delilah Anis Warner
- 10 years ago
- Views:
Transcription
1 Shifting Roles for Security in the Virtualized Data Center: Who Owns What? SESSION ID: CSV-T07 Rob Randell, CISSP Director Systems Engineering Principal Security Architect VMware / NSBU Malcolm Rieke Director of Product Management Catbird
2 Agenda Current State of the Data Center and the SDDC Why Should I Care about the SDDC? Current State of Data Center Security The Software-Defined Data Center (SDDC) IT Organizational Structure Current Roles and Duties in Data Center Overlap of Roles and Duties in Data Center How the SDDC is Forcing a New Convergence of Roles and Functionality 2
3 Why Do I Care??? 60 Ports in Millions Virtual Server Access Ports 32% CAGR Physical Server Access Ports CREHAN RESEARCH Inc. Half of all Server Access Ports are already virtual and are on track to be ~67% in 2 years *40% of vadmins manage virtual switching
4 Traditional Network-Based Security Building Blocks
5 Scaling the Basic Blocks
6 Day in the Life of a Network/Security Admin Request: I want to deploy a new web application with two tiers. Internet Net/Sec Admin: How do I implement that topology? Web App
7 Challenge: Applying Security Policies is a Moving Target Tying security policies to physical constructs is ineffective. No single source of truth for where security policies are applied in the software-defined data center CISO: We need to make sure the Firewall is protecting the RED VMs appropriately. Can you confirm this?
8 8 Fundamental Security Problems in the Modern Data Center 1 Perimeter-Centric 2 Hyper Connected Computing Base 3 Shared Component Base 4 Highly Accessible Info on I/F and Topology 5 Control Choke Points 6 Managing Security in a Distributed State 7 Security Expressed Over Bad Identifier 8 Policy Abstraction and Management
9 Primary Use Case: Agility & Efficiency Fast is the new better, Fast is the new cheaper, Faster is the new faster! Chris Launey Director, Cloud Hosting The Walt Disney Company
10 Software-Defined Data Center SOFTWARE-DEFINED DATACENTER All infrastructure is virtualized and delivered as a service, and the control of this datacenter is entirely automated by software.
11 5 Key Security Advantages of SDDC Micro- Segmentation Virtualized Dist. Services Lean/Fast Sensor Fewer Shared Services App-Centric Policy Reduces number of addressable targets from any infection Greatly limits lateral movement and makes it much more detectable. More pervasive security services End to End visibility. Achieved more efficiently (less hair-pinning/tromboning). Simpler policy: Control points are protecting a more focused resource (closer to the app boundary) Virtualized sensor less loaded, and therefore more scalable. Embed security functionality into the virtual switch Enables policy to efficiently follow the workload as it moves and scale out Services are smaller, less vulnerable, easier to manage. Fewer single points of failure. Having the context of how services are composed (relevant components, linkages) and how they relate to the virtual and physical infrastructure. Simplify policy. Improve alignment of security controls. Greater context & transparency of gaps, etc.
12 Provisioning via the SDDC Programmatic provisioning Place any workload anywhere Move any workload anywhere Decoupled from hardware Operationally efficient True Cloud Application!!
13 Challenge: Manual Workflows Are Time Consuming & Error Prone Operator uses one security product to detect an event and then has to manually trigger another security product to remediate Services Vulnerability Mgmt AV Service Host Integrity Service Monitor Events Ask for VLAN Tag Identify Threat Report Correlate to IP (Attempt) File Ticket With NetBios ID Receive Ticket Notification Web Servers Determine VM -> Subnet -> Tag Realize NAT Issue? Create Rule Open Ticket To Patch Machine Close Ticket Verify Rule
14 Security Service Consumption in an SDDC Security services can now be consumed more efficiently in the software-defined data center. Provision. Provision and monitor uptime of different services, using one method. Apply. Apply and visualize security policies for workloads, in one place. Automate. Automate workflows across different services, without custom integration.
15 Automate Vulnerability Management Workflow Prerequisites: Security groups defined by tag membership and relevant policies 1. Desktop group scanned scanned for vulnerabilities Security Group = Desktops 2. Solution tags VMs to indicate vulnerabilities Security Group = Monitor Zone Members = {Tag = VULNERABILITY_MANAGEMENT.VulnerabilityFound 3. Vulnerable VM automatically gets added to Monitor Zone, based on tag 4. Patches are tested in staging environment before being applied; VM is re-scanned 5. Tag removed and VM moved out of Monitor Zone
16 Information Technology Organization Chief Information Officer Chief Information Security Officer Systems Administration Network Administration Information Security Technology skill silos are the basis for current organizational divisions.
17 Skill Diversity Who Is Doing What? Network Administration Define Network Platform» VLAN, IP Space, QoS Consult App Owners and Architects Deploy Switches, Routers, Load Balancers Operation & Maintenance of Network Platform System Administration Define Compute Platform Consult App Owners and Architects Deploy Compute Platform Operation and Maintenance of OS/App/Compute Platform Information Security Define & implement policy for FW, IDS, Vuln Mgmt, A/V, Access Collaborate with» App Owners & Architects» Network Admin» Systems Admin» GRC Deploy/Configure Security Controls Operation of Controls & Incident Response
18 Overlap Exists Server Admin <> Network Admin Virtual Switching Technology: Consolidates Network Access Layer Administration Homogenizes Network Technology Skill Requirement for Access Layer Automated Dual Provisioning of Compute and Network Resources
19 Overlap Exists Network Admin <> Security Admin Firewall and IDS are network devices and by necessity are managed by Network Groups Networking resources engage in and support incident response
20 Overlap Exists Security Admin <> Server Admin Virtualized Security Components: Leverage Perfect Inventory Provision in concert with Computer and Network Leverage commodity hardware Breaking existing skill and organizational silos
21 Skillset Convergence in SDDC and Cloud Software Defined Data Center Provisioning and Operations
22 Convergence Systems Administration In progress with the adoption of virtualization technologies Network Virtualization at switch layer approaching 50% of access layer Routing and Network topologies becoming virtual Software Defined Data Center
23 Convergence Network Administration Network technology vendors moving to virtual Cisco Nexus 1000v virtual switch extends physical network configuration paradigm into VI VXLAN and VXLAN Routing support Native virtualized switches typically managed by vadmin Software Defined Data Center
24 Convergence Security Administration Software Defined Data Center Virtualized and virtualization aware security components Endpoint security completely virtualized (no agents) Perfect inventory from VI enhances all security controls vswitch integration and control adds determinism and automation to network based security controls
25 Convergence of Security Controls Firewall Vulnerability Management IDS Anti-Virus Access Controls
26 Converged Software Defined Security Controls Firewall Vuln Mgmt IDS Virtualization and Cloud Software Defined Security Firewall IDS Vuln Mgmt Anti-Virus Access Control Anti-Virus Access Controls
27 Shifting Skills to Match Shifting Roles Systems Administration Network Administration (hardware only) Information Security (hardware only) Reskill and enable teams Cross-train Become virtualizationaware Virtualization Team Virtual System Admin Virtual Network Admin Virtual Security Admin
28 Key Takeaways Systems administration has been greatly enhanced through the adoption of virtualization technologies Networks are becoming virtualized at access layer and will support virtual network topologies independent of physical network (flattening physical network) Virtualized and Virtualization aware security technologies benefit from speed and automation of virtualization making security controls as easy to deploy and manage as virtual machines Organizational divisions based on Systems/Network/Security skill siloes struggle to realize benefits of all three skills sets Software Defined Data Center features ubiquitously secure applications providing higher levels of security if your organization can embrace and adapt to these technologies
29 Visit Catbird in booth 2505 to be entered in an exclusive raffle for session attendees! Q&A Rob Randell Malcolm Rieke VMware Catbird Booth 1621 Booth 2505
Security in the Software Defined Data Center
Security in the Software Defined Data Center Francesco Vigo Senior Systems Engineer, VMware [email protected] Ugo Piazzalunga Technical Manager, SafeNet [email protected] Agenda Software Defined
Itex VMware NSX Network Virtualization Presentation
Itex VMware NSX Network Virtualization Presentation Gabriel Maciel VCP3, VCP4/5-DCV, Security+, Project+ Sr. Systems Engineer Canadian Federal Government @gmaciel_ca 2014 VMware Inc. All rights reserved.
Business Values of Network and Security Virtualization
Business Values of Network and Security Virtualization VMware NSX in the context of the Software Defined Data Center Klaus Jansen Virtual Networks Sales Specialist VMware NSBU 2014 VMware Inc. All rights
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP Principal Systems Engineer Security Specialist Agenda What is the Cloud? Virtualization Basics
Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.
Securely Architecting the Internal Cloud Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Building the Internal Cloud Virtualization is the Key How Virtualization Affects
How Network Virtualization can improve your Data Center Security
How Network Virtualization can improve your Data Center Security Gilles Chekroun SDDC, NSX Team EMEA [email protected] 2014 VMware Inc. All rights reserved. Security IT spending Security spending is
Software Defined Data Centers Network Virtualization & Security. Jeremy van Doorn Director of Systems Engineering EMEA, Network & Security
Software Defined Data Centers Network Virtualization & Security Jeremy van Doorn Director of Systems Engineering EMEA, Network & Security 1 My business and its IT organization are being engulfed by a torrent
A Look at the New Converged Data Center
Organizations around the world are choosing to move from traditional physical data centers to virtual infrastructure, affecting every layer in the data center stack. This change will not only yield a scalable
Catbird 6.0: Private Cloud Security
WHITE PAPER Catbird 6.0: Private Cloud Security and agile infrastructure that is exposing weaknesses in legacy perimeter-based network controls and leaving applications vulnerable to advanced threats.
White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.
White Paper Juniper Networks Solutions for VMware NSX Enabling Businesses to Deploy Virtualized Data Center Environments Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3
Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.
Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security
Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. [email protected]
1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. [email protected] Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption
Software Defined Environments
November 2015 Software Defined Environments 2015 Cloud Lecture, University of Stuttgart Jochen Breh, Director Architecture & Consulting Cognizant Global Technology Office Agenda Introduction New Requirements
Securing the Virtualized Data Center With Next-Generation Firewalls
Securing the Virtualized Data Center With Next-Generation Firewalls Data Center Evolution Page 2 Security Hasn t Kept Up with Rate Of Change Configuration of security policies are manual and slow Weeks
Advancing Security with Software Defined Datacenter. Karen Law Senior Systems Consultant VMware Hong Kong Ltd
Advancing Security with Software Defined Datacenter Karen Law Senior Systems Consultant VMware Hong Kong Ltd AGENDA Why Micro-segmentation? Understanding SDDC Network Virtualization Why Network Hypervisor?
Analysis of Network Segmentation Techniques in Cloud Data Centers
64 Int'l Conf. Grid & Cloud Computing and Applications GCA'15 Analysis of Network Segmentation Techniques in Cloud Data Centers Ramaswamy Chandramouli Computer Security Division, Information Technology
Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera [email protected]. VERSION May, 2015
Simplify IT With Cisco Application Centric Infrastructure Roberto Barrera [email protected] VERSION May, 2015 Content Understanding Software Definded Network (SDN) Why SDN? What is SDN and Its Benefits?
Netzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
Virtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
Limiting the Spread of Threats: A Data Center for Every User
SESSION ID: SPO1-R03 Limiting the Spread of Threats: A Data Center for Every User Geoff Huang Director Product Marketing VMware Tony Paikeday Senior Product Marketing Manager VMware Why do breaches still
Data Center Networking Designing Today s Data Center
Data Center Networking Designing Today s Data Center There is nothing more important than our customers. Data Center Networking Designing Today s Data Center Executive Summary Demand for application availability
Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre
Unlock the full potential of data centre virtualisation with micro-segmentation Making software-defined security (SDS) work for your data centre Contents 1 Making software-defined security (SDS) work for
Data Center Micro-Segmentation
Data Center Micro-Segmentation A Software Defined Data Center Approach for a Zero Trust Security Strategy W H I T E P A P E R Table of Contents Executive Summary... 3 The Software Defined Data Center is
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
How To Build A Software Defined Data Center
Delivering the Software Defined Data Center Georgina Schäfer Sr. Product Marketing Manager VMware Calvin Rowland, VP, Business Development F5 Networks 2014 VMware Inc. All rights reserved. F5 & Vmware
STRATEGIC WHITE PAPER. The next step in server virtualization: How containers are changing the cloud and application landscape
STRATEGIC WHITE PAPER The next step in server virtualization: How containers are changing the cloud and application landscape Abstract Container-based server virtualization is gaining in popularity, due
(R)Evolution im Software Defined Datacenter Hyper-Converged Infrastructure
(R)Evolution im Software Defined Datacenter Hyper-Converged Infrastructure David Kernahan Senior Systems Engineer VMware Switzerland GmbH 2014 VMware Inc. All rights reserved. Agenda 1 VMware Strategy
VMware vcloud Networking and Security Overview
VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility
Simplify IT. With Cisco Application Centric Infrastructure. Barry Huang [email protected]. Nov 13, 2014
Simplify IT With Cisco Application Centric Infrastructure Barry Huang [email protected] Nov 13, 2014 There are two approaches to Control Systems IMPERATIVE CONTROL DECLARATIVE CONTROL Baggage handlers follow
Avaya Virtualization Provisioning Service
Avaya Virtualization Provisioning Service Delivering visibility, validation, automation and reporting across applications, servers and network devices for the next-generation Virtualized Data Center The
How To Protect A Data Center From A Hacker Attack
CHECK POINT & VMWARE NSX AUTOMATING ADVANCED SECURITY FOR THE SOFTWARE-DEFINED DATACENTER Micki Boland Virtual and Cloud Cyber Security Architect [email protected] 2015 Check Point Software Technologies
VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic
VMware Software Defined Network Dejan Grubić VMware Systems Engineer for Adriatic The Transformation of Infrastructure Infrastructure Servers Clouds Be more responsive to business, change economics of
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...
STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
Building the Virtual Information Infrastructure
Technology Concepts and Business Considerations Abstract A virtual information infrastructure allows organizations to make the most of their data center environment by sharing computing, network, and storage
VMware vcloud Networking and Security
VMware vcloud Networking and Security Efficient, Agile and Extensible Software-Defined Networks and Security BROCHURE Overview Organizations worldwide have gained significant efficiency and flexibility
SDDC: A New Architecture for a New Era of Ed IT
Welcome MEEC Members! SDDC: A New Architecture for a New Era of Ed IT PRESENTED BY Chuck Kiessling Data Networks Solutions Architect Dan Radke VMware Network and Security Specialist M E E C M E M B E R
Managing Cloud Infrastructure
Managing Cloud Infrastructure The Key to deliver IT as a Service Eitan Segal Technology Consultant 1 Managing Cloud Infrastructure The Key to Deliver IT as a Service Eitan Segal Technology Consultant 2
Enabling the vision of the Modern Datacenter. System Center 2012 SP2 Azure
Enabling the vision of the Modern Datacenter System Center 2012 SP2 Azure Outline Feedback Issues Trends System Center & Azure Roadmap Business Challenges Influence Your IT Solutions Server Sprawl Dedicating
White Paper. SDN 101: An Introduction to Software Defined Networking. citrix.com
SDN 101: An Introduction to Software Defined Networking citrix.com Over the last year, the hottest topics in networking have been software defined networking (SDN) and Network ization (NV). There is, however,
Mitigating Information Security Risks of Virtualization Technologies
Mitigating Information Security Risks of Virtualization Technologies Toon-Chwee, Wee VMWare (Hong Kong) 2009 VMware Inc. All rights reserved Agenda Virtualization Overview Key Components of Secure Virtualization
Advanced Security Services with Trend Micro Deep Security and VMware NSX Platforms
A Trend Micro Technical White Paper June 2015 Advanced Security Services with Trend Micro and VMware NSX Platforms >> This document is targeted at virtualization, security, and network architects interested
Unified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
Automating the Virtual Datacenter. Saša Hederić VMware Systems Engineer SE Europe
Automating the Virtual Datacenter Saša Hederić VMware Systems Engineer SE Europe Agenda The New Datacenter Automation Topology VMware IT Service Delivery Solutions VMware Business Continuity Solutions
Software Defined Network (SDN)
Georg Ochs, Smart Cloud Orchestrator ([email protected]) Software Defined Network (SDN) University of Stuttgart Cloud Course Fall 2013 Agenda Introduction SDN Components Openstack and SDN Example Scenario
What is SDN? And Why Should I Care? Jim Metzler Vice President Ashton Metzler & Associates
What is SDN? And Why Should I Care? Jim Metzler Vice President Ashton Metzler & Associates 1 Goals of the Presentation 1. Define/describe SDN 2. Identify the drivers and inhibitors of SDN 3. Identify what
Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure
White Paper Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure What You Will Learn The new Cisco Application Centric Infrastructure
Softverski definirani data centri - 2. dio
Softverski definirani data centri - 2. dio Vmware NSX To Deliver a Software Defined Data Center Implementation Automated Operational Model Programmatically Create, Snapshot, Store, Move, Delete, Restore
1518 Best Practices in Virtualization & Cloud Security with Symantec
1518 Best Practices in Virtualization & Cloud Security with Symantec Tues May 6, 11:00 Kevin Stultz Symantec Product Management Chip Epps Symantec Product Marketing 1 Agenda 1 2 Trends in Virtualization
Orchestrating Software Defined Networks (SDN) to Disrupt the APT Kill Chain
SESSION ID: ANF-T08 Orchestrating Software Defined Networks (SDN) to Disrupt the APT Kill Chain Sean Doherty VP Technology Partnerships and Alliances Symantec @SeandDInfo Deb Banerjee Chief Architect,
Atos Managed Services The Digital Data Center
Atos Managed Services The Digital Data Center Powering IT to move at the speed of business Agenda Agenda Overview Business needs Benefits Services Roadmap Architecture Pricing Why Atos Service details
Designing Virtual Network Security Architectures Dave Shackleford
SESSION ID: CSV R03 Designing Virtual Network Security Architectures Dave Shackleford Sr. Faculty and Analyst SANS @daveshackleford Introduction Much has been said about virtual networking and softwaredefined
Software defined networking. Your path to an agile hybrid cloud network
Software defined networking Your path to an agile hybrid cloud network Is your enterprise network ready for the latest business and consumer trends? Cloud How easily can your users connect to cloud resources?
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
Network Access Control in Virtual Environments. Technical Note
Contents Security Considerations in.... 3 Addressing Virtualization Security Challenges using NAC and Endpoint Compliance... 3 Visibility and Profiling of VMs.... 4 Identification of Rogue or Unapproved
7 Ways OpenStack Enables Automation & Agility for KVM Environments
7 Ways OpenStack Enables Automation & Agility for KVM Environments Table of Contents 1. Executive Summary 1 2. About Platform9 Managed OpenStack 2 3. 7 Benefits of Automating your KVM with OpenStack 1.
Group-Based Policy for OpenStack
Group-Based Policy for OpenStack Introduction Over the past four years, OpenStack has grown from a simple open source project to a major community-based initiative including thousands of contributors in
HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer
HAWAII TECH TALK SDN Paul Deakin Field Systems Engineer SDN What Is It? SDN stand for Software Defined Networking SDN is a fancy term for: Using a controller to tell switches where to send packets SDN
Optimally Manage the Data Center Using Systems Management Tools from Cisco and Microsoft
White Paper Optimally Manage the Data Center Using Systems Management Tools from Cisco and Microsoft What You Will Learn Cisco is continuously innovating to help businesses reinvent the enterprise data
Visibility into the Cloud and Virtualized Data Center // White Paper
Executive Summary IT organizations today face unprecedented challenges. Internal business customers continue to demand rapid delivery of innovative services to respond to outside threats and opportunities.
Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems
Cisco Prime Network Services Controller Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems Agenda Cloud Networking Challenges Prime Network Services Controller L4-7 Services Solutions
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
WHITE PAPER: Egenera Cloud Suite for EMC VSPEX. The Proven Solution For Building Cloud Services
WHITE PAPER: Egenera Cloud Suite for EMC VSPEX The Proven Solution For Building Cloud Services Build, Manage and Protect Your Cloud with the VSPEX Certified Egenera Cloud Suite Today, organizations are
VMware NSX A Perspective for Service Providers part 2
VMware NSX A Perspective for Service Providers part 2 Using Software Defined Networking to harden DC security controls Trevor Gerdes Strategic Architect Security and Networks NSX for SPs Part 2 - Agenda
W H I T E P A P E R E n a b l i n g D a t a c e n t e r A u t o mation with Virtualized Infrastructure
W H I T E P A P E R E n a b l i n g D a t a c e n t e r A u t o mation with Virtualized Infrastructure Sponsored by: VMware Tim Grieser August 2008 IDC OPINION Global Headquarters: 5 Speen Street Framingham,
Benefits of virtualizing your network
While server virtulization can improve your infrastructure as a whole, it can affect. Extending virtualization to can eliminate any unnecessary impacts and allow you to maximize your virtual investment.
IT Infrastructure Services. White Paper. Utilizing Software Defined Network to Ensure Agility in IT Service Delivery
IT Infrastructure Services White Paper Utilizing Software Defined Network to Ensure Agility in IT Service Delivery About the Author Siddhesh Rane Siddhesh Rane is a Technical Architect and part of the
Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc. [email protected]
Secure Multi Tenancy In the Cloud Boris Strongin VP Engineering and Co-founder, Hytrust Inc. [email protected] At-a-Glance Trends Do MORE with LESS Increased Insider Threat Increasing IT spend on cloud
Microsoft Private Cloud
Microsoft Private Cloud Lorenz Wolf, Solution Specialist Datacenter, Microsoft SoftwareOne @ Au Premier Zürich - 22.03.2011 What is PRIVATE CLOUD Private Public Public Cloud Private Cloud shared resources.
SINGLE-TOUCH ORCHESTRATION FOR PROVISIONING, END-TO-END VISIBILITY AND MORE CONTROL IN THE DATA CENTER
SINGLE-TOUCH ORCHESTRATION FOR PROVISIONING, END-TO-END VISIBILITY AND MORE CONTROL IN THE DATA CENTER JOINT SDN SOLUTION BY ALCATEL-LUCENT ENTERPRISE AND NEC APPLICATION NOTE EXECUTIVE SUMMARY Server
VMware's Cloud Management Platform Simplifies and Automates Operations of Heterogeneous Environments and Hybrid Clouds
VMware's Cloud Platform Simplifies and Automates Operations of Heterogeneous Environments and Hybrid Clouds Ekkarat Klinbubpa Senior Business Development Manager, VMware 2009 VMware Inc. All rights reserved
REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION
REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION The modern data centre has ever-increasing demands for throughput and performance, and the security infrastructure required to protect and segment the network
Use Case Brief CLOUD MANAGEMENT SOFTWARE AUTOMATION
Use Case Brief CLOUD MANAGEMENT SOFTWARE AUTOMATION Cloud Management Software can coordinate and automate server, network, and storage operations within the modern datacenter. This brief describes how
Virtualization Impact on Compliance and Audit
2009 Reflex Systems, LLC Virtualization Impact on Compliance and Audit Michael Wronski, CISSP VP Product Management Reflex Systems Agenda Introduction Virtualization? Cloud? Risks and Challenges? Compliance
SOFTWARE-DEFINED NETWORKING AND OPENFLOW
SOFTWARE-DEFINED NETWORKING AND OPENFLOW Freddie Örnebjär TREX Workshop 2012 2012 Brocade Communications Systems, Inc. 2012/09/14 Software-Defined Networking (SDN): Fundamental Control
The Importance of Information Delivery in IT Operations
The Importance of Information Delivery in IT Operations David Williams Notes accompany this presentation. Please select Notes Page view. These materials can be reproduced only with written approval from
Network Virtualization and Software-defined Networking. Chris Wright and Thomas Graf Red Hat June 14, 2013
Network Virtualization and Software-defined Networking Chris Wright and Thomas Graf Red Hat June 14, 2013 Agenda Problem Statement Definitions Solutions She can't take much more of this, captain! Challenges
Open Source Networking for Cloud Data Centers
Open Source Networking for Cloud Data Centers Gaetano Borgione Distinguished Engineer @ PLUMgrid April 2015 1 Agenda Open Source Clouds with OpenStack Building Blocks of Cloud Networking Tenant Networks
VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware
VM-Series for VMware The VM-Series for VMware supports VMware NSX, ESXI stand-alone and vcloud Air, allowing you to deploy next-generation firewall security and advanced threat prevention within your VMware-based
Driving Down the Cost and Complexity of Application Networking with Multi-tenancy
White Paper AX Series Driving Down the Cost and Complexity of Application Networking with Multi-tenancy February 2013 WP_ADC_ADP_012013.1 Table of Contents 1 Introduction... 3 2 Application Delivery Partition
Software-Defined Storage Extending the Power of Your Datacenter Eric Tsai Senior Technic Architect Presale Division Enterprise Group Taiwan
Software-Defined Storage Extending the Power of Your Datacenter Eric Tsai Senior Technic Architect Presale Division Enterprise Group Taiwan Software defined: executing at business speed Drive acceleration
Brocade One Data Center Cloud-Optimized Networks
POSITION PAPER Brocade One Data Center Cloud-Optimized Networks Brocade s vision, captured in the Brocade One strategy, is a smooth transition to a world where information and applications reside anywhere
Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager
Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager Contents INTRODUCTION: UNDERSTANDING HOW ALIGNING DESKTOP SECURITY AND
The Changing Role of Software in the New Era George L. Lotridge Senior Partner Technology Strategist VMware, Inc.
1 The Changing Role of Software in the New Era George L. Lotridge Senior Partner Technology Strategist VMware, Inc. The Three Eras of IT Mainframe Client-Server Mobile-Cloud Thousands of Users Hundreds
Outline. Why Neutron? What is Neutron? API Abstractions Plugin Architecture
OpenStack Neutron Outline Why Neutron? What is Neutron? API Abstractions Plugin Architecture Why Neutron? Networks for Enterprise Applications are Complex. Image from windowssecurity.com Why Neutron? Reason
VMware vshield App Design Guide TECHNICAL WHITE PAPER
ware vshield App Design Guide TECHNICAL WHITE PAPER ware vshield App Design Guide Overview ware vshield App is one of the security products in the ware vshield family that provides protection to applications
Cisco Unified Computing Remote Management Services
Cisco Unified Computing Remote Management Services Cisco Remote Management Services are an immediate, flexible management solution that can help you realize the full value of the Cisco Unified Computing
Service Orchestration: The Key to the Evolution of the Virtual Data Center
Service Orchestration: The Key to the Evolution of the Virtual Data Center By Jim Metzler, Cofounder, Webtorials Editorial/Analyst Division Introduction Data center managers are faced with an array of
Virtual Machine Manager Domains
This chapter contains the following sections: Cisco ACI VM Networking Supports Multiple Vendors' Virtual Machine Managers, page 1 VMM Domain Policy Model, page 2 Virtual Machine Manager Domain Main Components,
The ROI of Automated Agentless Endpoint Management
V The ROI of Automated Agentless Endpoint Management A Frost & Sullivan White Paper Prepared by Ariel Avitan, Industry Analyst 2 TABLE OF CONTENTS The Impact of Endpoint Monitoring and Control Solutions
Deliver the Next Generation Intelligent Datacenter Fabric with the Cisco Nexus 1000V, Citrix NetScaler Application Delivery Controller and Cisco vpath
Citrix NetScaler for Cisco Nexus 1000v White Paper Deliver the Next Generation Intelligent Datacenter Fabric with the Cisco Nexus 1000V, Citrix NetScaler Application Delivery Controller and Cisco vpath
Hitachi Unified Compute Platform (UCP) Pro for VMware vsphere
Test Validation Hitachi Unified Compute Platform (UCP) Pro for VMware vsphere Author:, Sr. Partner, Evaluator Group April 2013 Enabling you to make the best technology decisions 2013 Evaluator Group, Inc.
