ADVANCING SECURITY IN STORAGE AREA NETWORKS
|
|
|
- Bethanie Payne
- 10 years ago
- Views:
Transcription
1 WHITE PAPER ADVANCING SECURITY IN STORAGE AREA NETWORKS Brocade Secure Fabric OS provides a reliable framework for enhancing security in mission-critical SAN environments
2 As organizations continue to broaden their reach to business partners and customers around the globe, they expose their IT systems to a wider range of potential security threats. Today, data theft, eavesdropping, fraud, and hacker attempts increasingly threaten secure electronic information exchange within the enterprise and across public networks, such as the Internet. Because an organization s IT systems are only as secure as the weakest link in the network, Brocade has developed a comprehensive security framework that helps ensure safe, reliable data processing throughout a Storage Area Network (SAN). An integrated solution that addresses a wide variety of potential security threats, Brocade Secure Fabric OS provides a new level of SAN security enabling a robust, mission-critical SAN infrastructure. Today, organizations can implement Secure Fabric OS in all their SAN environments to safeguard data and alleviate a wide variety of security risks. 1
3 The Growing Security Concern The recent explosion in e-business activity and Internet commerce has provided organizations with unlimited opportunities for developing new information delivery channels. At a minimum, online expansion opens up a whole new world of possibilities such as increased efficiency, reduced costs, improved enterprise-wide communications, shorter time-to-market, and wider market reach. Although the benefits of e-business can be far-reaching, today s organizations must be careful to balance their need to expand with their ability to protect enterprise data. WHITE PAPER As the popularity of distributed client/server networks steadily rose throughout the 1990s, organizations found it much more difficult to effectively secure their critical business networks, applications, and data.the emergence and growth of public networks such as the Internet has only increased the potential frequency and severity of computer security incidents.as a result, information security is perhaps the greatest concern for organizations participating in the e-business arena. As new information delivery channels transcend traditional borders, locked doors are no longer sufficient to protect vital information. More than ever, organizations need to leverage advanced security solutions that minimize risk while enabling flexibility and growth to provide the proper balance for the corporate security strategy and policy. Today, Brocade is helping to safeguard one of the most strategic parts of many IT infrastructures: the SAN. Brocade has recently developed Secure Fabric OS, a flexible and scalable solution that meets a wide variety of SAN security requirements. Secure Fabric OS is the first product in the industry to provide such comprehensive security controls for networked storage environments. 2
4 Brocade Security Framework When designing high security for today s SANs, organizations must be aware of all the potential points where a security breach might occur. Identifying the points of vulnerability and implementing a reliable security solution are the keys to securing a SAN fabric infrastructure (see Figure 1).To help organizations identify and address their security exposures, the comprehensive Brocade SAN security framework provides the kind of security tools and controls commonly used in most other types of data networks. Figure 1. A typical SAN fabric infrastructure with potential points of vulnerability Hosts Storage Switches JBOD WAN (or Internet) Network Manager Potential Security Control Points 3
5 This security framework is based on Secure Fabric OS, which manages the Brocade SilkWorm family of Fibre Channel fabric devices in both new and existing SAN islands and heterogeneous SAN fabrics. Based on open industry standards, Secure Fabric OS is highly scalable, manageable, and extremely resilient.as a result, this integrated solution helps eliminate a variety of potential SAN security risks (see Table 1). SAN Security Risk Unauthorized and/or unauthenticated SAN access Secure Fabric OS Solution Multilevel password controls to prevent unauthorized and unauthenticated SAN access Table 1. SAN security risks and solutions at a glance WHITE PAPER Insecure management access World Wide Name (WWN) spoofing Management controls allowed from different access points Management Access Control Lists (ACLs) and encryption of passwords in certain interfaces Port-level ACLs Enhanced configuration architecture with trusted switches and secure management, as well as Public Key Infrastructure (PKI)-based authentication and security (digital certificates) Secure Fabric OS is especially useful for shared storage environments where security is critical. Secure Fabric OS is accessible through an open API that enables members of the Brocade Fabric Threads program to develop applications that optimize the wide variety of security features. In addition, organizations can develop their own internal security applications based on this API. Security Domains While identifying the potential points of vulnerability in their networks, organizations should fully define their security requirements for a SAN fabric by establishing a set of security domains.these domains typically define different categories of communications that must be protected by the fabric security architecture.these domains, described in detail below, include: Host-to-switch domain: between host servers and their Host Bus Adapters (HBAs), and the connected switches Administrator-to-security management domain: between administrators and their management applications Security management-to-fabric domain: between management applications and the switch fabric Switch-to-switch domain: between interconnected switches 4
6 Host-to-Switch Domain In host-to-switch communications, individual device ports are bound to a set of one or more switch ports using ACLs. Device ports are specified by WWN and typically represent HBAs. Special Secure Fabric OS Device Connection Controls enable binding by WWN (port) and ACL to secure the host-to-switch connection for both normal operations and management functions. Administrator-to-Security Management Domain Because security management impacts the security policy and configuration of the entire SAN fabric, administrator access controls work in conjunction with security management functions. In addition, administrator-level fabric password access provides primary control over security configurations. Security Management-to-Fabric Domain Secure Fabric OS secures certain elements of the management communications such as passwords on some interfaces between the security management function and a switch fabric.the security management function encrypts appropriate data elements (along with a random number) with the switch s public key.the switch then decrypts the data element with its private key. Switch-to-Switch Domain In secure switch-to-switch communications, the switches enforce security policy.the security management function initializes switches by using digital certificates and ACLs. Prior to establishing any communications, switches exchange these credentials during mutual authentication.this practice is designed to allow only authenticated and authorized switches to join as members of the SAN fabric or a specific fabric zone. This authentication process helps prevent an unauthorized switch (for example, a switch in a co-location scenario) from attaching to the fabric through an E_Port. Basic inter-fabric switch-to-switch security includes, but is not limited to: Mutual authentication performed between two switches using public key technology and digital certificates Switch alarms such as Simple Network Management Protocol (SNMP) trap notifications for authorized security management or other system managers 5
7 Secure Fabric OS Components Secure Fabric OS enables organizations to build highly secure SAN infrastructures through a set of powerful yet flexible security components (see Figure 2).This bestin-class solution includes the following security components: Fabric Configuration Servers: One or more switches act as trusted devices in charge of zoning changes and other security-related functions. Management Access Controls: Management policies and ACLs control access to the switch from different management services. WHITE PAPER Secure Management Communications: Secure management communications interface to the fabric by encrypting certain data elements, such as passwords. Switch Connection Controls: ACLs and digital certificates within the switch authenticate new switches and ensure that they can join the fabric. Device Connection Controls: Port-level ACLs lock particular WWNs to specific ports. Switch Connection Controls, Digital Certificates + ACLs Security Policy Flow Fabric Configuration Server (Trusted Switch) Figure 2. Secure Fabric OS components that protect the fabric against a variety of threats Management ACLs Port ACLs WAN (or Internet) Hard/Soft Zoning Zone Network Manager Secure Management Communications 6
8 The switch connection controls utilize the basis of PKI technology to provide the most comprehensive security solution available for SAN environments.table 2 compares PKI capabilities to other types of security solutions. Table 2. PKI compared to other electronic security options Firewalls X X Authentication Confidentiality Integrity Non-repudiation Access control X X Encryption X X Public Key Infrastructure X X X X Fabric Configuration Servers Management access from unsecured and unauthorized sources represents a major threat to fabric security.to address this threat, Fabric Configuration Servers enable sensitive administrative operations to be performed only from specified, trusted switches.these designated switches are responsible for managing the configuration and security parameters of all other switches in the fabric. Any number of switches within a fabric can be designated as Fabric Configuration Servers (as specified by WWN), and the list of designated switches is known fabric-wide. In this way, Fabric Configuration Servers secure the manager-to-fabric connection in-band as well as out-of-band. Within the set of Fabric Configuration Servers is the concept of a primary Fabric Configuration Server. Only the primary Fabric Configuration Server can initiate fabric-wide management changes.this capability helps eliminate unidentified local management requests initiated from untrusted switches. To increase administrator access control, a fabric-wide login name and password database replaces the previous model of switch-specific login names and passwords.this facility applies the same semantics to the SNMP community strings (which constitute a password-type facility to control access to SNMP functions). Organizations can disable this facility through two options, one for SNMP community strings and the other for the standard login name database. Disabling this new security policy results in a reversion to the original policy of unique logins and community strings on each switch. If the fabric-wide password and community string policies are enabled, any change in login name and/or password or SNMP community string is reflected on all switches in the fabric. In addition, when a new switch joins the fabric, its login/password database is changed to reflect the fabric view. 7
9 Secure Management Communications Brocade switches enable standard IP-based management communications between a switch and a manager. Certain elements of the manager-to-switch communications process such as passwords are encrypted to increase security. Management Access Controls Because certain management services such as SNMP, SES, API, and Telnet represent a potential threat of unauthorized access, Management Access Controls restrict their access to the fabric based on policy. If enabled, these policies control access by either IP addresses or WWNs, and the policies are known fabric-wide. WHITE PAPER Management Access Controls secure the in-band manager-to-fabric connection by controlling the HBA-to-fabric connections as well.these HBA-to-fabric controls apply to in-band access only.they can also turn off serial ports either individually or fabric-wide to limit access to trusted access points within the fabric. Organizations can use these controls to selectively disable management access and restrict facility access to a specified set of end points. For example, an end point might be a specific IP address for SNMP,Telnet, or API access or a specific port WWN for an HBA in a management service used for in-band methods such as SES or Management Server. In this way, Management Access Controls provide additional control beyond the secure management channels by restricting access to trusted access points within the network.these restrictions and any ACLs are known fabric-wide and are automatically installed in new switches that join the fabric.this capability helps prevent unauthorized users from manually changing fabric settings. 8
10 Device Connection Controls Because access control methods deployed in today s SANs use a requestor s WWN to verify access rights,wwn spoofing is a potential threat to SAN security. Secure Fabric OS addresses this vulnerability with port-level ACL controls known as Device Connection Controls.These controls secure the server (HBA)-to-fabric connection for both normal operations and management functions. Device Connection Controls enable organizations to bind a particular WWN to a specific switch port or set of ports preventing ports in another physical location from assuming the identity of an actual WWN.This capability enables better control over shared switch environments by allowing only a set of predefined WWNs to access particular ports in the fabric. Switch Connection Controls Switch Connection Controls enable organizations to restrict fabric connections to a designated set of switches, as identified by WWN.When a new switch is connected to a switch that is already part of the fabric, the new switch must be authenticated before it can join the fabric. Each switch has a digital certificate and a unique private key to enable secure switch-to-switch authentication. Switch Connection Controls address this security need by authenticating switches and providing specifications for an authorized switch list.the digital certificate authentication process ensures that an entity professing to be a switch is, in fact, a switch and that its WWN is correct. Each E_port connection between switches invokes a mutual authentication process by using digital certificates and private keys to enable a cryptographically secure multiphase authentication protocol. If the authentication process fails, the E_port is set to the segmented state, logically disconnecting the two switches.this authentication process validates that a specific E_port connects two legitimate switches, so it must be used on all E_ports even if many of them connect to the same pair of switches. 9
11 The authorized switch list (as specified by switch WWN) is used during fabric initialization and when a new switch attempts to join a fabric. New switches are configured with certificates and private keys at the time of manufacture. However, organizations with existing switches will need to upgrade them with certificate and key information at the installed location. Switch-to-switch operations are managed in-band, so no IP communications are required.this practice prevents users from arbitrarily adding switches to a fabric. WHITE PAPER A Strategic Framework for a More Secure SAN Environment Because a SAN fabric is only as secure as its weakest link, either the entire fabric is secure or none of the fabric is secure. As a result, all switches in the fabric must support Secure Fabric OS in order to achieve the highest level of security fabric-wide. Secure Fabric OS is the initial component of a comprehensive Brocade security framework designed to help ensure a secure fabric-wide enterprise without requiring redundant dual fabrics.this approach supports the need to centralize management tasks while helping to accelerate SAN growth and reduce the total cost of ownership. By implementing Brocade Secure Fabric OS throughout their SAN fabric infrastructures, organizations can achieve the high levels of data and system security that today s mission-critical business applications require. For more information about the advantages of Brocade SAN fabrics, visit 10
12 Corporate Headquarters 1745 Technology Drive San Jose, CA T: (408) F: (408) European Headquarters 29, route de l Aéroport Case Postale 105 Geneva 15, Switzerland 1215 T: F: [email protected] Asia Pacific Headquarters The Imperial Tower 15th Fl Uchisaiwaicho, Chiyoda-ku,Tokyo Japan T: F: [email protected] 2002 Brocade Communications Systems, Inc.All Rights Reserved. 03/02 GA-WP Brocade, the Brocade B weave logo, and SilkWorm are registered trademarks of Brocade Communications Systems, Inc., in the United States and/or in other countries. All other brands, products, or service names are or may be trademarks or service marks of, and are used to identify, products or services of their respective owners. Notice:This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning any equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to this document at any time, without notice, and assumes no responsibility for its use.this informational document describes features that may not be currently available. Contact a Brocade sales office for information on feature and product availability. Export of technical data contained in this document may require an export license from the United States government.
COMPARING STORAGE AREA NETWORKS AND NETWORK ATTACHED STORAGE
COMPARING STORAGE AREA NETWORKS AND NETWORK ATTACHED STORAGE Complementary technologies provide unique advantages over traditional storage architectures Often seen as competing technologies, Storage Area
THE ESSENTIAL ELEMENTS OF A STORAGE NETWORKING ARCHITECTURE. The Brocade Intelligent Fabric. Services Architecture provides. a flexible framework for
THE ESSENTIAL ELEMENTS OF A STORAGE NETWORKING ARCHITECTURE The Brocade Intelligent Fabric Services Architecture provides a flexible framework for continued SAN growth As organizations increasingly need
Facilitating a Holistic Virtualization Solution for the Data Center
WHITE PAPER DATA CENTER Facilitating a Holistic Virtualization Solution for the Data Center Brocade solutions provide a scalable, reliable, and highperformance foundation that enables IT organizations
Data-at-Rest Encryption Addresses SAN Security Requirements
Data-at-Rest Encryption Addresses SAN Security Requirements QLogic 2500 Series Fibre Channel Adapters Meet Enterprise Security Needs Key Findings SAN security via encryption is necessary for protecting
How To Secure A Storage Area Network (San) Network Security
SAN WHITE PAPER STORAGE AREA NETWORK The Growing Need for Security in Storage Area Networks New features in Brocade Fabric OS 5.2 help increase SAN security in enterprise environments to better protect
NETWORK FUNCTIONS VIRTUALIZATION. The Top Five Virtualization Mistakes
WHITE PAPER www.brocade.com NETWORK FUNCTIONS VIRTUALIZATION The Top Five Virtualization Mistakes Virtualization is taking the IT world by storm. After years of IT build-out, virtualization suddenly fixes
How To Use The Cisco Mds F Bladecenter Switch For Ibi Bladecenter (Ibi) For Aaa2 (Ibib) With A 4G) And 4G (Ibb) Network (Ibm) For Anaa
Cisco MDS FC Bladeswitch for IBM BladeCenter Technical Overview Extending Cisco MDS 9000 Family Intelligent Storage Area Network Services to the Server Edge Cisco MDS FC Bladeswitch for IBM BladeCenter
Ten Ways to Optimize Your Microsoft Hyper-V Environment with Brocade
WHITE PAPER Server Connectivity Ten Ways to Optimize Your Microsoft Hyper-V Environment with Brocade To maximize the benefits of network connectivity in a virtualized server environment, Brocade works
HBA Virtualization Technologies for Windows OS Environments
HBA Virtualization Technologies for Windows OS Environments FC HBA Virtualization Keeping Pace with Virtualized Data Centers Executive Summary Today, Microsoft offers Virtual Server 2005 R2, a software
Scalable Approaches for Multitenant Cloud Data Centers
WHITE PAPER www.brocade.com DATA CENTER Scalable Approaches for Multitenant Cloud Data Centers Brocade VCS Fabric technology is the ideal Ethernet infrastructure for cloud computing. It is manageable,
Storage Security. Presenter: Himanshu Dwivedi. BlackHat 2003
Storage Security Presenter: Himanshu Dwivedi BlackHat 2003 Agenda Introduction Fibre Channel Overview Attacks on Fibre Channel SANs Conclusion Introduction Overview What are SANs? What is Storage Security?
8Gb Delivers Enhanced Storage Area Network (SAN) Data Security
W H I T E P a pe r Third party information brought to you courtesy of Dell. 8Gb Delivers Enhanced Storage Area Network (SAN) Data Security QLogic s Better 8Gb is Security Optimized Expanded Access Control
Brocade Fabric Vision Technology Frequently Asked Questions
Brocade Fabric Vision Technology Frequently Asked Questions Introduction This document answers frequently asked questions about Brocade Fabric Vision technology. For more information about Fabric Vision
Brocade and McAfee Change the Secure Networking Landscape with High Performance at Lowest TCO
WHITE PAPER www.brocade.com IP NETWORK SECURITY Brocade and McAfee Change the Secure Networking Landscape with High Performance at Lowest TCO The Non-Stop Secure Network, a Brocade and McAfee joint solution,
IBM TotalStorage SAN Switch F16
Intelligent fabric switch with enterprise performance for midrange and large storage networks IBM TotalStorage SAN Switch F16 High port density packaging helps save rack space Highlights Can be used as
Data Center Evolution without Revolution
WHITE PAPER www.brocade.com DATA CENTER Data Center Evolution without Revolution Brocade networking solutions help organizations transition smoothly to a world where information and applications can reside
Fibre Channel over Ethernet: Enabling Server I/O Consolidation
WHITE PAPER Fibre Channel over Ethernet: Enabling Server I/O Consolidation Brocade is delivering industry-leading oe solutions for the data center with CNAs, top-of-rack switches, and end-of-row oe blades
Brocade Monitoring Services Security White Paper
WHITE PAPER Monitoring Services Security White Paper In today s globally connected world, the enterprise network is a strategic platform, a platform that demands deep and instantaneous integration between
IBM BladeCenter H with Cisco VFrame Software A Comparison with HP Virtual Connect
IBM BladeCenter H with Cisco VFrame Software A Comparison with HP Connect Executive Overview This white paper describes how Cisco VFrame Server Fabric ization Software works with IBM BladeCenter H to provide
CLE202 Introduction to ServerIron ADX Application Switching and Load Balancing
Introduction to ServerIron ADX Application Switching and Load Balancing Student Guide Revision : Introduction to ServerIron ADX Application Switching and Load Balancing Corporate Headquarters - San
WHITE PAPER. Enhancing Application Delivery and Load Balancing on Amazon Web Services with Brocade Virtual Traffic Manager
WHITE PAPER Enhancing Application Delivery and Load Balancing on Amazon Web Services with Brocade Virtual Traffic Manager ALREADY USING AMAZON ELASTIC LOAD BALANCER? As an abstracted service, Amazon ELB
Cloud Optimized Performance: I/O-Intensive Workloads Using Flash-Based Storage
WHITE PAPER Cloud Optimized Performance: I/O-Intensive Workloads Using Flash-Based Storage Brocade continues to innovate by delivering the industry s first 16 Gbps switches for low latency and high transaction
Brocade SAN Scalability Guidelines: Brocade Fabric OS v7.x
Brocade SAN Scalability Guidelines: Brocade Fabric OS v7.x Version 7.2, update 1 Dated: February 5, 2014 This document provides scalability guidelines that can be used to design and deploy extremely stable
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
Key Management Best Practices
White Paper Key Management Best Practices Data encryption is a fundamental component of strategies to address security threats and satisfy regulatory mandates. While encryption is not in itself difficult
WHITE PAPER. Cloud Networking: Scaling Data Centers and Connecting Users
WHITE PAPER Cloud Networking: Scaling Data Centers and Connecting Users While the business promise of cloud computing is broad, there are a few basic enabling themes underlying an effective cloud design:
N_Port ID Virtualization
A Detailed Review Abstract This white paper provides a consolidated study on the (NPIV) feature and usage in different platforms and on NPIV integration with the EMC PowerPath on AIX platform. February
Avaya G700 Media Gateway Security - Issue 1.0
Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional Enterprise
The Brocade SDN Controller in Modern Service Provider Networks
WHITE PAPER The Controller in Modern Service Provider Networks The OpenDaylight-based Controller combines innovations with modular software engineering and model-driven network management for a cost-effective,
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD 18 October 2007 Systems and Network Analysis Center Best Practices for Storage Networks This document contains 30 sheets. Table of Contents 1. Executive
The Road to SDN: Software-Based Networking and Security from Brocade
WHITE PAPER www.brocade.com SOFTWARE NETWORKING The Road to SDN: Software-Based Networking and Security from Brocade Software-Defined Networking (SDN) presents a new approach to rapidly introducing network
Network Security Guidelines. e-governance
Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type
Brocade Network Monitoring Service (NMS) Helps Maximize Network Uptime and Efficiency
WHITE PAPER SERVICES Brocade Network Monitoring Service (NMS) Helps Maximize Network Uptime and Efficiency Brocade monitoring service delivers business intelligence to help IT organizations meet SLAs,
ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
Overcoming Security Challenges to Virtualize Internet-facing Applications
Intel IT IT Best Practices Cloud Security and Secure ization November 2011 Overcoming Security Challenges to ize Internet-facing Applications Executive Overview To enable virtualization of Internet-facing
Securing an IP SAN. Application Brief
Securing an IP SAN Application Brief All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc., which are subject to change from time to time.
The Business Case for Software-Defined Networking
WHITE PAPER The Business Case for Software-Defined Networking Brocade enables customers a means of reducing costs of service delivery through Software-Defined Networking (SDN) technologies. In addition,
BASCS in a Nutshell Study Guide for Exam 160-020 Brocade University Revision 03-2012
BASCS in a Nutshell Study Guide for Exam 160-020 Brocade University Revision 03-2012 2013 Brocade Communications Corporate Headquarters - San Jose, CA USA T: (408) 333-8000 [email protected] European Headquarters
Ethernet Fabrics: An Architecture for Cloud Networking
WHITE PAPER www.brocade.com Data Center Ethernet Fabrics: An Architecture for Cloud Networking As data centers evolve to a world where information and applications can move anywhere in the cloud, classic
Windows Web Based VPN Connectivity Details & Instructions
VPN Client Overview UMDNJ s Web based VPN utilizes an SSL (Secure Socket Layer) Based Cisco Application that provides VPN functionality without having to install a full client for end users running Microsoft
Potential Targets - Field Devices
Potential Targets - Field Devices Motorola Field Devices: Remote Terminal Units ACE 3600 Front End Devices ACE IP Gateway ACE Field Interface Unit (ACE FIU) 2 Credential Cracking Repeated attempts to
Diagnostics and Troubleshooting Using Event Policies and Actions
Diagnostics and Troubleshooting Using Event Policies and Actions Brocade Network Advisor logs events and alerts generated by managed devices and the management server and presents them through the master
How To Protect Your Network From Attack
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Internet (In)Security Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail: [email protected]
BROCADE PERFORMANCE MANAGEMENT SOLUTIONS
Data Sheet BROCADE PERFORMANCE MANAGEMENT SOLUTIONS SOLUTIONS Managing and Optimizing the Performance of Mainframe Storage Environments HIGHLIGHTs Manage and optimize mainframe storage performance, while
Multitenancy Options in Brocade VCS Fabrics
WHITE PAPER DATA CENTER Multitenancy Options in Brocade VCS Fabrics As cloud environments reach mainstream adoption, achieving scalable network segmentation takes on new urgency to support multitenancy.
Introducing Brocade VCS Technology
WHITE PAPER www.brocade.com Data Center Introducing Brocade VCS Technology Brocade VCS technology is designed to revolutionize the way data center networks are architected and how they function. Not that
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...
Choosing the Best Open Standards Network Strategy
WHITE PAPER IP network Choosing the Best Open Standards Network Strategy In order to truly align the enterprise infrastructure strategy with business requirements, organizations must be free to choose
SECURING A STORAGE AREA NETWORKS
RESEARCH ARTICLE OPEN ACCESS SECURING A STORAGE AREA NETWORKS R.Sumangali *1, Dr.B.Srinivasan #2 Assistant Professor, Department of Information Technology Gobi Arts & Science College, Gobichettipalayam,
EPICenter Network Management Software
EPICenter Network Management Software EPICenter management suite is a scalable full-featured network management tool that simplifies configuring, troubleshooting and status monitoring of IP-based networks.
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
Chapter 10. Cloud Security Mechanisms
Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Ensuring a Smooth Transition to Internet Protocol Version 6 (IPv6)
WHITE PAPER www.brocade.com APPLICATION DELIVERY Ensuring a Smooth Transition to Internet Protocol Version 6 (IPv6) As IPv4 addresses dwindle, companies face the reality of a dual-protocol world The transition
CyberSource Payment Security. with PCI DSS Tokenization Guidelines
CyberSource Payment Security Compliance The PCI Security Standards Council has published guidelines on tokenization, providing all merchants who store, process, or transmit cardholder data with guidance
How To Connect Virtual Fibre Channel To A Virtual Box On A Hyperv Virtual Machine
Virtual Fibre Channel for Hyper-V Virtual Fibre Channel for Hyper-V, a new technology available in Microsoft Windows Server 2012, allows direct access to Fibre Channel (FC) shared storage by multiple guest
How To Secure An Rsa Authentication Agent
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
PrivyLink Cryptographic Key Server *
WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology
THE PATH TO A GREEN DATA CENTER. Hitachi Data Systems and Brocade. Joint Solution Brief
THE PATH TO A GREEN DATA CENTER Hitachi Data Systems and Brocade Joint Solution Brief Hitachi Data Systems The Growing Need for Green Data Center Solutions 50 percent of data centers worldwide will have
Brocade Premier and Premier-Plus Support
DATA SHEET Brocade Premier and Premier-Plus Support HIGHLIGHTS Streamlines communication and accelerates problem resolution with a single point of contact into Brocade Technical Support Provides priority
MAC Web Based VPN Connectivity Details and Instructions
MAC Web Based VPN Connectivity Details and Instructions UMDNJ s Web-based VPN utilizes an SSL Based Cisco Application that provides VPN functionality without having to install a full client for end users
Dionseq Uatummy Odolorem Vel Layered Security Approach
A P P L I C A T I O N B R I E F Aciduisismodo Hitachi Content Dolore Platform Eolore Dionseq Uatummy Odolorem Vel Layered Security Approach Highly Scalable, Cloud-enabled Platform Ensures Data Safety with
A POLYCOM WHITEPAPER Polycom. Recommended Best Security Practices for Unified Communications
Polycom Recommended Best Security Practices for Unified Communications March 2012 Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective,
EMC ViPR Controller. User Interface Virtual Data Center Configuration Guide. Version 2.4 302-002-416 REV 01
EMC ViPR Controller Version 2.4 User Interface Virtual Data Center Configuration Guide 302-002-416 REV 01 Copyright 2014-2015 EMC Corporation. All rights reserved. Published in USA. Published November,
Thales e-security Key Isolation for Enterprises and Managed Service Providers
Thales e-security Key Isolation for Enterprises and Managed Service Providers Technical White Paper May 2015 Contents 1. Introduction 1. Introduction... 2 2. Business Models.... 3 3. Security World...
IT Security. Securing Your Business Investments
Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information
Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance
White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
Brocade VCS Fabrics: The Foundation for Software-Defined Networks
WHITE PAPER DATA CENTER Brocade VCS Fabrics: The Foundation for Software-Defined Networks Software-Defined Networking (SDN) offers significant new opportunities to centralize management and implement network
Brocade Telemetry Solutions
WHITE PAPER www.brocade.com Service provider Brocade Telemetry Solutions telemetry applications such as Monitoring and Lawful Intercept are important to Service Providers and impose unique requirements
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
Multi-Chassis Trunking for Resilient and High-Performance Network Architectures
WHITE PAPER www.brocade.com IP Network Multi-Chassis Trunking for Resilient and High-Performance Network Architectures Multi-Chassis Trunking is a key Brocade technology in the Brocade One architecture
Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption
THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has
1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network
WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What
Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com
Wireless VPN White Paper WIALAN Technologies, Inc. http://www.wialan.com 2014 WIALAN Technologies, Inc. all rights reserved. All company and product names are registered trademarks of their owners. Abstract
White Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions Security and Encryption Overview... 2 1. What is encryption?... 2 2. What is the AES encryption standard?... 2 3. What is key management?...
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
NETWORK FUNCTIONS VIRTUALIZATION. Segmenting Virtual Network with Virtual Routers
WHITE PAPER www.brocade.com NETWORK FUNCTIONS VIRTUALIZATION Segmenting Virtual Network with Virtual Routers INTRODUCTION For the past 20 years, network architects have used segmentation strategies to
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
State of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
Learn the essentials of virtualization security
Learn the essentials of virtualization security White Paper Table of Contents 3 Introduction 4 Hypervisor connectivity and risks 4 Multi-tenancy risks 5 Management and operational network risks 5 Storage
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
In-Band Security Solution // Solutions Overview
Introduction The strategy and architecture to establish and maintain infrastructure and network security is in a rapid state of change new tools, greater intelligence and managed services are being used
Brocade Network Advisor High Availability Using Microsoft Cluster Service
Brocade Network Advisor High Availability Using Microsoft Cluster Service This paper discusses how installing Brocade Network Advisor on a pair of Microsoft Cluster Service nodes provides automatic failover
Licensing VeriSign Certificates
Licensing VeriSign Certificates Securing Multiple Web Server and Domain Configurations CONTENTS + Introduction 3 + VeriSign Licensing 3 SSL-Certificate Use Restrictions 4 Best Practices for Ensuring Trust
Zone Labs Integrity Smarter Enterprise Security
Zone Labs Integrity Smarter Enterprise Security Every day: There are approximately 650 successful hacker attacks against enterprise and government locations. 1 Every year: Data security breaches at the
RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2
RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
A Strategic Approach to Enterprise Key Management
Ingrian - Enterprise Key Management. A Strategic Approach to Enterprise Key Management Executive Summary: In response to security threats and regulatory mandates, enterprises have adopted a range of encryption
Solution Guide: Brocade Server Application Optimization for a Scalable Oracle Environment
Solution Guide: Brocade Server lication Optimization for a Scalable Oracle Environment Optimize the performance and scalability of Oracle applications and databases running Oracle Enterprise Linux (OEL)
