Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre
|
|
|
- Vincent Booker
- 10 years ago
- Views:
Transcription
1 Unlock the full potential of data centre virtualisation with micro-segmentation Making software-defined security (SDS) work for your data centre
2 Contents 1 Making software-defined security (SDS) work for your data centre 2 The barriers to implementing micro-segmentation 2 Managing distributed services: the key to micro-segmentation is automation 3 Micro-segmentation in action 4 Delivering a successful micro-segmentation programme 4 Summary: putting network risk in context with micro-segmentation 2
3 Making software-defined security (SDS) work for your data centre It s time to unlock the full potential of virtualisation. Almost every organisation we talk to relies upon virtualised environments somewhere in the business to increase efficiency, flexibility and scalability. Whether these virtualised environments are used to spin up development environments, add more computing power to meet processing spikes or to replicate production systems for testing or disaster recovery virtualisation gives organisations the agility to respond to user demands without the constraints and associated costs of traditional hardware. Data centre infrastructure design has evolved in order to accommodate a never ending list of new business requirements (such as cloud computing, the consumerisation of IT, mobile working and an explosion of critical business software applications). However, data centre security architectures have not evolved at the same pace. In many organisations, existing data centre security architectures are actually a barrier to the flexible provisioning, application workload management and free network flows that virtualisation promises. Data centre networks were originally designed to operate from client to server, or north-south traffic. In line with this model, perimeter defences and network segments were constructed to control traffic by department or function (east-west) in order to manage the risk of external threats. By combining these perimeter controls and segmenting machines and networks, organisations created distinct security zones. Firewalling is used extensively to establish security zones for particular applications, and network zoning plays a key role in a data centre security architecture. These security zones are essential particularly in organisations that have to comply with standards such as PCI-DSS which require clear separation of data within the network. To comply with PCI- DSS regulations for example, cardholder data must be isolated from other areas of the network that contain less sensitive information. Point-of-Sale (PoS) systems and databases must be completely separated from certain areas of the network, including those accessed by third parties, creating a PCI Zone with stringent constraints that limit connectivity to as few servers and applications as possible. This is not only good practice for network segmentation, but also for a PCI environment. But security professionals have discovered, as the number of these security zones increases so does the complexity of managing them. This not only creates DMZ App DB Perimeter firewall Finance HR Engineering DMZ Inside firewall App DB Services AD NTP DHCP DNS CERT Figure 1: How a traditional security infrastructure compares with micro-segmentation architecture 1
4 new security risks, but also the potential for misconfiguration. This approach also makes it nearly impossible to enforce the consistent security policies an organisation needs to embrace and benefit from a fully visualised environment. So, in an attempt to maintain an element of visibility and control, organisations have attempted to limit the number of security zones. In today s data centre, up to 80 percent of traffic stays within the data centre (referred to as east-west traffic). As we have seen in many high profile attacks, this means that once the perimeter firewall is breached, an attacker can operate at will within the network. And the reality is that the current mix of data centre security controls is insufficient to prevent the spread of attacks from server to server. This is even more challenging in the virtualised world, as multiple servers are hosted on the same physical hardware the result is that traditional security controls have zero visibility to these potential threats. In NTT Com Security s experience, organisations that want to evolve network and security segmentation should take full advantage of virtualisation by: 1. Managing risk in context with security policies that are configured and applied for logical groups, not physical ones 2. Establishing granular visibility and control of network traffic for both zero trust defence and faster incident response 3. Introducing automation of provisioning and other changes that would typically be resource intensive Our customers want micro-segmentation to help them solve critical security breaches by stopping attackers from moving laterally within the data centre. The barriers to implementing micro-segmentation The concept of software-defined networking (SDN) presents exciting possibilities as networking evolves from being controlled exclusively by boxes with flashing lights, to being driven by software stacks. SDN provides, separation of control, the ability to pragmatically manage all the datapath state in the network and centralised management. This change in approach makes the concept of micro-segmentation a reality. It gives us a scalable, operationally feasible, and cost-effective solution whereby isolation and segmentation of traffic between any two endpoints can be analysed and filtered based on a security policy. These security policies are coordinated, automated and orchestrated centrally. Firewalls, both traditional and next generation, work by implementing controls as physical or virtual choke points on the network. Firewall rules are enforced and packets are either blocked or allowed to pass through when application workload traffic is directed through these control points. If organisations tried to implement micro-segmentation using a traditional firewall approach, they would experience two operational barriers capacity and managing change. If budget is no object, an organisation can tackle capacity issues by adding enough physical or virtual firewalls to the network to deliver micro-segmentation. Even if an organisation has unlimited resources, manually adding, deleting and/or modifying firewall rules every time you add, move or decommission a new virtual machine can rapidly overwhelm even the most efficient data centre operations. For the organisations we talk to, this is the most common barrier to achieving a zero trust approach with micro-segmentation. Figure 2: Orchestration layer in action Managing distributed services: the key to micro-segmentation is automation The data centre functions of compute, storage, and networking are often treated as separate entities and are managed by separate teams. An organisation may be able to provision a virtual machine in a matter of seconds, but the value of this is diminished if it takes several days to provision the virtual machines on an organisation s VLAN. In high-performing virtualised data centres, network and security configuration changes happen automatically and immediately. Key to this is the adoption of a well-configured 2 automation (policy and orchestration) layer. Using an orchestration tool such as VMWare s NSX network and security virtualisation platform, when a new virtual machine is provisioned, the VLAN it belongs to is configured automatically. We have seen clear examples of how introducing an automation layer into an organisation s virtualised data centre can transform visibility, control and advanced protection and detection capabilities. It can also reduce operational costs, increase speedto-market of new products and services and enable easier migration to the cloud all with greater confidence. An automation layer enables the correct firewall policies to be automatically provisioned when a workload is programmatically created. These policies follow the workload as it moves within the data centre, between data centres or even into the cloud. And when an application is deleted, the associated security policies are removed with it, eliminating a key barrier to effective micro-segmentation. This layer can also help organisations to evaluate the impact of a breach by automating elements of incident response, manage vulnerability scanning, IPS policy or even load balancing during the day.
5 Micro-segmentation in action Technology innovations that have combined automation (policy and orchestration) and hypervisor capabilities mean that network and security services (routing, switching, firewalling and quality of service, for example) that are provisioned via a workload are automatically created and distributed. Micro-segmentation is achieved by applying the correct security policy at the virtual interface layer. All traffic, even traffic within the same subnet, is able to be centrally inspected and controlled. NTT Com Security has been working with a number of organisations to achieve this operational and compliance Nirvana. Operating System Machine Name Unique Tags Application Tier Regulatory Requirements Security Posture Advanced Services Built-in Services Firewall (North L7 and East to West L2) Data Security Server Activity Monitoring VPN (IPSEC, SSL, L2VPN) Third-party Services McAfee Palo Alto Networks Fortinet Check Point Trend Micro F5...and more in progress Advanced services: addition of NTT Com Security s strategic technology vendors, as required by policy Figure 3: How micro-segmentation creates intelligence and context, enhancing organisations detection and protection capabilities. Example shows VMWare s NSX network virtualisation platform 3
6 Delivering a successful micro-segmentation programme > Discovery our consultants work closely with you to understand your existing architecture and information security needs across your environment and identify your current risk exposure > Evaluation using the data from the Discovery phase, we define the relevant adaptive security architecture with the appropriate intelligence, context, policy and controls in order to meet your organisation s IS needs > Planning these activities are consolidated into solutions which are aligned to the security architecture and matched to your commercial goals > Implementation we execute a programme of delivery measured against the agreed controls, while managing the change within your organisation > Security Operations we deliver an agreed security operations model for continuous risk management Summary: putting network risk in context with micro-segmentation Micro-segmentation is a fundamental component of delivering the security required in today s threat landscape. This, along with the speed, flexibility and reduced complexity promised by virtualisation delivers to the bottom line by providing scale, but also drives governance and compliance by offering new levels of isolation, separation and protection for sensitive workloads. Micro-segmentation delivered via virtualisation has distinct advantages over the physical data centre network model that it will, in time, replace. For many organisations, traditional host-based and network perimeter-based security controls remain the only pillars of defence, each control responding with little or no common reference or context. Micro-segmentation delivered via virtualisation replaces hardware risk with an architecture solution that helps to address today s network and security concerns. Built in software provides unified coverage, control and context, unrestricted by agent function or confined to individual aggregation points on your network. Do not be misled by the name it may be called micro-segmentation, but the business benefits are enormous. 4
7 We see a more secure world NTT Com Security is in the business of information security and risk management. By choosing our WideAngle consulting, managed security and technology services, our customers are free to focus on business opportunities while we focus on managing risk. The breadth of our Governance, Risk and Compliance (GRC) engagements, innovative managed security services and pragmatic technology implementations, means we can share a unique perspective with our customers helping them to prioritise projects and drive standards. We want to give the right objective advice every time. To learn more about NTT Com Security and our unique WideAngle services for information security and risk management, please speak to your account representative or visit: for regional contact information. Our global approach is designed to drive out cost and complexity recognising the growing value of information security and risk management as a differentiator in high-performing businesses. Innovative and independent, NTT Com Security has offices spanning the Americas, Europe, and APAC (Asia Pacific) and is part of the NTT Communications Group, owned by NTT (Nippon Telegraph and Telephone Corporation), one of the largest telecommunications companies in the world. Copyright NTT Com Security
Business Values of Network and Security Virtualization
Business Values of Network and Security Virtualization VMware NSX in the context of the Software Defined Data Center Klaus Jansen Virtual Networks Sales Specialist VMware NSBU 2014 VMware Inc. All rights
VMware vcloud Networking and Security
VMware vcloud Networking and Security Efficient, Agile and Extensible Software-Defined Networks and Security BROCHURE Overview Organizations worldwide have gained significant efficiency and flexibility
Netzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
How Network Virtualization can improve your Data Center Security
How Network Virtualization can improve your Data Center Security Gilles Chekroun SDDC, NSX Team EMEA [email protected] 2014 VMware Inc. All rights reserved. Security IT spending Security spending is
VMware vcloud Networking and Security Overview
VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility
Limiting the Spread of Threats: A Data Center for Every User
SESSION ID: SPO1-R03 Limiting the Spread of Threats: A Data Center for Every User Geoff Huang Director Product Marketing VMware Tony Paikeday Senior Product Marketing Manager VMware Why do breaches still
STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION
REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION The modern data centre has ever-increasing demands for throughput and performance, and the security infrastructure required to protect and segment the network
Software defined networking. Your path to an agile hybrid cloud network
Software defined networking Your path to an agile hybrid cloud network Is your enterprise network ready for the latest business and consumer trends? Cloud How easily can your users connect to cloud resources?
Network Virtualization Solutions - A Practical Solution
SOLUTION GUIDE Deploying Advanced Firewalls in Dynamic Virtual Networks Enterprise-Ready Security for Network Virtualization 1 This solution guide describes how to simplify deploying virtualization security
Data Center Micro-Segmentation
Data Center Micro-Segmentation A Software Defined Data Center Approach for a Zero Trust Security Strategy W H I T E P A P E R Table of Contents Executive Summary... 3 The Software Defined Data Center is
Advancing Security with Software Defined Datacenter. Karen Law Senior Systems Consultant VMware Hong Kong Ltd
Advancing Security with Software Defined Datacenter Karen Law Senior Systems Consultant VMware Hong Kong Ltd AGENDA Why Micro-segmentation? Understanding SDDC Network Virtualization Why Network Hypervisor?
VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware
VM-Series for VMware The VM-Series for VMware supports VMware NSX, ESXI stand-alone and vcloud Air, allowing you to deploy next-generation firewall security and advanced threat prevention within your VMware-based
Software Defined Data Centers Network Virtualization & Security. Jeremy van Doorn Director of Systems Engineering EMEA, Network & Security
Software Defined Data Centers Network Virtualization & Security Jeremy van Doorn Director of Systems Engineering EMEA, Network & Security 1 My business and its IT organization are being engulfed by a torrent
Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.
Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security
Itex VMware NSX Network Virtualization Presentation
Itex VMware NSX Network Virtualization Presentation Gabriel Maciel VCP3, VCP4/5-DCV, Security+, Project+ Sr. Systems Engineer Canadian Federal Government @gmaciel_ca 2014 VMware Inc. All rights reserved.
Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. [email protected]
1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. [email protected] Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption
Softverski definirani data centri - 2. dio
Softverski definirani data centri - 2. dio Vmware NSX To Deliver a Software Defined Data Center Implementation Automated Operational Model Programmatically Create, Snapshot, Store, Move, Delete, Restore
A Look at the New Converged Data Center
Organizations around the world are choosing to move from traditional physical data centers to virtual infrastructure, affecting every layer in the data center stack. This change will not only yield a scalable
How To Protect A Data Center From A Hacker Attack
CHECK POINT & VMWARE NSX AUTOMATING ADVANCED SECURITY FOR THE SOFTWARE-DEFINED DATACENTER Micki Boland Virtual and Cloud Cyber Security Architect [email protected] 2015 Check Point Software Technologies
Orchestrating Software Defined Networks (SDN) to Disrupt the APT Kill Chain
SESSION ID: ANF-T08 Orchestrating Software Defined Networks (SDN) to Disrupt the APT Kill Chain Sean Doherty VP Technology Partnerships and Alliances Symantec @SeandDInfo Deb Banerjee Chief Architect,
ILLUMIO ADAPTIVE SECURITY PLATFORM TM
ILLUMIO ADAPTIVE SECURITY PLATFORM TM HIGHLIGHTS Security with Intelligence Illumio ASP is powered by the breakthrough PCE. The PCE contextualizes all traffic flows, services, and processes on application
Securing the Virtualized Data Center With Next-Generation Firewalls
Securing the Virtualized Data Center With Next-Generation Firewalls Data Center Evolution Page 2 Security Hasn t Kept Up with Rate Of Change Configuration of security policies are manual and slow Weeks
Tufin Orchestration Suite
Tufin Orchestration Suite Security Policy Orchestration across Physical Networks & Hybrid Cloud Environments The Network Security Challenge In today s world, enterprises face considerably more network
SOFTWARE DEFINED NETWORKING
SOFTWARE DEFINED NETWORKING Bringing Networks to the Cloud Brendan Hayes DIRECTOR, SDN MARKETING AGENDA Market trends and Juniper s SDN strategy Network virtualization evolution Juniper s SDN technology
SECURITY POLICY MANAGEMENT ACROSS THE NEXT GENERATION DATA CENTER
SECURITY POLICY MANAGEMENT ACROSS THE NEXT GENERATION DATA CENTER An AlgoSec Whitepaper MANAGE SECURITY AT THE SPEED OF BUSINESS AlgoSec Whitepaper Introduction Corporate networks today must deliver hundreds
Securing Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
2015 DevOps SECURITY GUIDE For continuous application delivery
2015 DevOps SECURITY GUIDE Presented by: THE NEED FOR ADAPTIVE SECURITY Information security is not keeping up with the speed of business and IT. The network- and perimeter-centric security model being
Virtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review
We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review The security threat landscape is constantly changing and it is important to periodically review a business
Software Defined Environments
November 2015 Software Defined Environments 2015 Cloud Lecture, University of Stuttgart Jochen Breh, Director Architecture & Consulting Cognizant Global Technology Office Agenda Introduction New Requirements
White Paper. Architecting the security of the next-generation data center. why security needs to be a key component early in the design phase
White Paper Architecting the security of the next-generation data center A White Paper by Bloor Research Author : Fran Howarth Publish date : August 2011 teams involved in modernization projects need to
Shifting Roles for Security in the Virtualized Data Center: Who Owns What?
Shifting Roles for Security in the Virtualized Data Center: Who Owns What? SESSION ID: CSV-T07 Rob Randell, CISSP Director Systems Engineering Principal Security Architect VMware / NSBU Malcolm Rieke Director
VMware NSX A Perspective for Service Providers part 2
VMware NSX A Perspective for Service Providers part 2 Using Software Defined Networking to harden DC security controls Trevor Gerdes Strategic Architect Security and Networks NSX for SPs Part 2 - Agenda
White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.
White Paper Juniper Networks Solutions for VMware NSX Enabling Businesses to Deploy Virtualized Data Center Environments Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3
How To Build A Software Defined Data Center
Delivering the Software Defined Data Center Georgina Schäfer Sr. Product Marketing Manager VMware Calvin Rowland, VP, Business Development F5 Networks 2014 VMware Inc. All rights reserved. F5 & Vmware
IT Security at the Speed of Business: Security Provisioning with Symantec Data Center Security
IT Security at the Speed of Business: Security Provisioning with Symantec Data Center Security Today s data centers are transitioning into software-defined data centers (SDDC). In the SDDC, the core elements
Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
Enterprise Data Center Networks
Enterprise Data Center Networks Isabelle Guis Big Switch Networks Vice President of Outbound Marketing ONF Market Education Committee Chair 1 This Session Objectives Leave with an understanding of Data
FROM A RIGID ECOSYSTEM TO A LOGICAL AND FLEXIBLE ENTITY: THE SOFTWARE- DEFINED DATA CENTRE
FROM A RIGID ECOSYSTEM TO A LOGICAL AND FLEXIBLE ENTITY: THE SOFTWARE- DEFINED DATA CENTRE The demand for cloud infrastructure is rapidly increasing, the world of information is becoming application and
VMware vshield App Design Guide TECHNICAL WHITE PAPER
ware vshield App Design Guide TECHNICAL WHITE PAPER ware vshield App Design Guide Overview ware vshield App is one of the security products in the ware vshield family that provides protection to applications
Brocade One Data Center Cloud-Optimized Networks
POSITION PAPER Brocade One Data Center Cloud-Optimized Networks Brocade s vision, captured in the Brocade One strategy, is a smooth transition to a world where information and applications reside anywhere
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Software-Defined Networks Powered by VellOS
WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible
Virtualization Essentials
Virtualization Essentials Table of Contents Introduction What is Virtualization?.... 3 How Does Virtualization Work?... 4 Chapter 1 Delivering Real Business Benefits.... 5 Reduced Complexity....5 Dramatically
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES
Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...
A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks
A Coordinated Virtual Infrastructure for SDN in Enterprise Networks Software Defined Networking (SDN), OpenFlow and Application Fluent Programmable Networks Strategic White Paper Increasing agility and
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP Principal Systems Engineer Security Specialist Agenda What is the Cloud? Virtualization Basics
ILLUMIO ADAPTIVE SECURITY PLATFORM TM
ILLUMIO ADAPTIVE SECURITY PLATFORM TM HIGHLIGHTS Security with Intelligence Illumio ASP is powered by the breakthrough PCE. The PCE contextualizes all traffic flows, services, and processes on application
VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic
VMware Software Defined Network Dejan Grubić VMware Systems Engineer for Adriatic The Transformation of Infrastructure Infrastructure Servers Clouds Be more responsive to business, change economics of
5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP
5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP With support for Cisco ACE load balancer ending, organizations need to find an alternative. Contents Introduction 3 Advanced Architecture 3 Ease of
Microsegmentation Using NSX Distributed Firewall: Getting Started
Microsegmentation Using NSX Distributed Firewall: VMware NSX for vsphere, release 6.0x REFERENCE PAPER Table of Contents Microsegmentation using NSX Distributed Firewall:...1 Introduction... 3 Use Case
How To Protect A Virtual Desktop From Attack
Endpoint Security: Become Aware of Virtual Desktop Infrastructures! An Ogren Group Special Report May 2011 Executive Summary Virtual desktops infrastructures, VDI, present IT with the unique opportunity
Network Virtualization Solutions
Network Virtualization Solutions An Analysis of Solutions, Use Cases and Vendor and Product Profiles October 2013 The Independent Community and #1 Resource for SDN and NFV Tables of Contents Introduction
HYBRID CLOUD SERVICES HYBRID CLOUD
SERVICES SOLUTION SUMMARY SEIZE THE ADVANTAGE From the workplace to the datacenter, the enterprise cloud footprint is growing. It delivers on-demand development resources. It accommodates new digital workloads.
Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera [email protected]. VERSION May, 2015
Simplify IT With Cisco Application Centric Infrastructure Roberto Barrera [email protected] VERSION May, 2015 Content Understanding Software Definded Network (SDN) Why SDN? What is SDN and Its Benefits?
Ensuring security the last barrier to Cloud adoption
Ensuring security the last barrier to Cloud adoption Publication date: March 2011 Ensuring security the last barrier to Cloud adoption Cloud computing has powerful attractions for the organisation. It
vcloud Air - Virtual Private Cloud OnDemand Networking Guide
vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific [email protected]. Developments in Web Application and Cloud Security
Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific [email protected] Developments in Web Application and Cloud Security Forces of Change Workforce and IT trends 2 Applications 3 Web Application
Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre
Introduction to Software Defined Networking (SDN) and how it will change the inside of your DataCentre Wilfried van Haeren CTO Edgeworx Solutions Inc. www.edgeworx.solutions Topics Intro Edgeworx Past-Present-Future
SOFTWARE-DEFINED NETWORKS
THE PROMISE OF SOFTWARE-DEFINED NETWORKS SDNs offer organizations a flexible solution capable of reimagining the enterprise network. The IT community is abuzz with discussions about software-defined networks
WHITE PAPER. Data Center Fabrics. Why the Right Choice is so Important to Your Business
WHITE PAPER Data Center Fabrics Why the Right Choice is so Important to Your Business Introduction Data center fabrics are emerging as the preferred architecture for next-generation virtualized data centers,
Mitigating Information Security Risks of Virtualization Technologies
Mitigating Information Security Risks of Virtualization Technologies Toon-Chwee, Wee VMWare (Hong Kong) 2009 VMware Inc. All rights reserved Agenda Virtualization Overview Key Components of Secure Virtualization
The State of Application Delivery in 2015
The State of Application Delivery in 2015 a report by F5 f5.com/soad 1 Introduction F5 surveyed customers from more than 300 organizations (of all sizes) across a broad spectrum of vertical markets such
Implementing Software- Defined Security with CloudPassage Halo
WHITE PAPER Implementing Software- Defined Security with CloudPassage Halo Introduction... 2 Implementing Software-Defined Security w/cloudpassage Halo... 3 Abstraction... 3 Automation... 4 Orchestration...
SINGLE-TOUCH ORCHESTRATION FOR PROVISIONING, END-TO-END VISIBILITY AND MORE CONTROL IN THE DATA CENTER
SINGLE-TOUCH ORCHESTRATION FOR PROVISIONING, END-TO-END VISIBILITY AND MORE CONTROL IN THE DATA CENTER JOINT SDN SOLUTION BY ALCATEL-LUCENT ENTERPRISE AND NEC APPLICATION NOTE EXECUTIVE SUMMARY Server
Virtualized Security: The Next Generation of Consolidation
Virtualization. Consolidation. Simplification. Choice. WHITE PAPER Virtualized Security: The Next Generation of Consolidation Virtualized Security: The Next Generation of Consolidation As we approach the
About the VM-Series Firewall
About the VM-Series Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/
VMware Hybrid Cloud. Accelerate Your Time to Value
VMware Hybrid Cloud Accelerate Your Time to Value Fulfilling the Promise of Hybrid Cloud Computing Through 2020, the most common use of cloud services will be a hybrid model combining on-premises and external
How the Software-Defined Data Center Is Transforming End User Computing
How the Software-Defined Data Center Is Transforming End User Computing The Essentials Series sponsored by David Davis SDDC Powered Virtual Desktops and Applications... 1 Three Pillars of SDDC and Desktop/Application
A Presentation at DGI 2014 Government Cloud Computing and Data Center Conference & Expo, Washington, DC. September 18, 2014.
A Presentation at DGI 2014 Government Cloud Computing and Data Center Conference & Expo, Washington, DC September 18, 2014 Charles Sun www.linkedin.com/in/charlessun @CharlesSun_ 1 What is SDN? Benefits
Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc. [email protected]
Secure Multi Tenancy In the Cloud Boris Strongin VP Engineering and Co-founder, Hytrust Inc. [email protected] At-a-Glance Trends Do MORE with LESS Increased Insider Threat Increasing IT spend on cloud
Enterprise Security Platform for Government
Enterprise Security Platform for Government Today s Cybersecurity Challenges in Government Governments are seeking greater efficiency and lower costs, adopting Shared Services models, consolidating data
Designing Virtual Network Security Architectures Dave Shackleford
SESSION ID: CSV R03 Designing Virtual Network Security Architectures Dave Shackleford Sr. Faculty and Analyst SANS @daveshackleford Introduction Much has been said about virtual networking and softwaredefined
SDDC: A New Architecture for a New Era of Ed IT
Welcome MEEC Members! SDDC: A New Architecture for a New Era of Ed IT PRESENTED BY Chuck Kiessling Data Networks Solutions Architect Dan Radke VMware Network and Security Specialist M E E C M E M B E R
Cloud and Data Center Security
solution brief Trend Micro Cloud and Data Center Security Secure virtual, cloud, physical, and hybrid environments easily and effectively introduction As you take advantage of the operational and economic
F5 PARTNERSHIP SOLUTION GUIDE. F5 and VMware. Virtualization solutions to tighten security, optimize performance and availability, and unify access
F5 PARTNERSHIP SOLUTION GUIDE F5 and VMware Virtualization solutions to tighten security, optimize performance and availability, and unify access 1 W H AT 'S INS I DE Data Center Virtualization 3 Enterprise
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
Horizontal Integration - Unlocking the Cloud Stack. A Technical White Paper by FusionLayer, Inc.
Horizontal Integration - Unlocking the Cloud Stack A Technical White Paper by FusionLayer, Inc. August 2013 Copyright 2015 FusionLayer, Inc. All rights reserved. No part of this publication may be reproduced,
Virtualization: The entire suite of communication services can be deployed in a virtualized environment 2.
Virtualization: The 5 Trends That Can Extend Its Value Now that virtualization is the enterprise IT norm, how can you make it work best for you? Virtualization has become the norm in today s business and
Use Case Brief CLOUD MANAGEMENT SOFTWARE AUTOMATION
Use Case Brief CLOUD MANAGEMENT SOFTWARE AUTOMATION Cloud Management Software can coordinate and automate server, network, and storage operations within the modern datacenter. This brief describes how
HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer
HAWAII TECH TALK SDN Paul Deakin Field Systems Engineer SDN What Is It? SDN stand for Software Defined Networking SDN is a fancy term for: Using a controller to tell switches where to send packets SDN
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Palo Alto Networks Cyber Security Platform for the Software Defined Data center. Zekeriya Eskiocak Security Consultant Palo Alto Networks
Palo Alto Networks Cyber Security Platform for the Software Defined Data center Zekeriya Eskiocak Security Consultant Palo Alto Networks Evolution towards a software defined data center Server Virtualiza-on
Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION
SOLUTION BRIEF Trend Micro CLOUD AND DATA CENTER SECURITY Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION As you take advantage of the operational and economic
Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard
Partner Addendum Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard The findings and recommendations contained in this document are provided by VMware-certified
Boosting Business Agility through Software-defined Networking
Executive Summary: Boosting Business Agility through Software-defined Networking Completing the last mile of virtualization Introduction Businesses have gained significant value from virtualizing server
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
Palo Alto Networks. Security Models in the Software Defined Data Center
Palo Alto Networks Security Models in the Software Defined Data Center Christer Swartz Palo Alto Networks CCIE #2894 Network Overlay Boundaries & Security Traditionally, all Network Overlay or Tunneling
How To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
VMware vcloud Air Networking Guide
vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
Secure networks are crucial for IT systems and their
ISSA The Global Voice of Information Security Network Security Architecture By Mariusz Stawowski ISSA member, Poland Chapter Secure networks are crucial for IT systems and their proper operation. Essential
F5 and VMware. Realize the Virtual Possibilities.
. Realize the Virtual Possibilities. Simplify. Accelerate. Manage. Secure. Discover how deliver a Software-Defined Data Center by providing simplified end-to-end networking through an application-centric
Injazat s Managed Services Portfolio
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud
The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery
