Virtualisation and other next-generation technologies are the new norm for both traditional and cloud-based applications, but they expand the role of the network, and as such require some rethinking on securing that network.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Network security choices affect ongoing operational costs and uptime, but also the data passed over that network, and therefore the organisation’s reputation. As you rethink network security, consider the following.
Read more about securing virtual environments
- Security Think Tank: Hypervisor is key to securing virtual servers
- Security Think Tank: Security in virtual world requires special considerations
- Security Think Tank: Security in the virtual world still not 100%
- Security Think Tank: Virtual security more than just technology
- Security Think Tank: Configuration is key to virtual security
- Security Think Tank: Virtualisation raises three main security issues
- How flexible and scalable will your network security infrastructure be? It needs to be agile enough to allow for incremental and cost-effective expansion over time. Since the shift from physical servers to multiple virtual machines enables application workloads to be agile, applications can potentially move transparently from one physical server to another as user access peaks and subsides. Handling these peaks requires agile security for the intra-server traffic.
- Will the network security solution support your business uptime goals? Interruptions to firewall and other security appliances typically require manual efforts to rectify problems. When evaluating network security solutions, it is key to understand how different types of failures affect service availability and how much effort it would take to fully restore them.
- What level of protection will your firewall provide? Security products vary in their effectiveness against threats depending on the vector – application, file, web, email, or network. To achieve the highest level of assurance, security products across these vectors should be integrated.
- How beneficial would it be to further consolidate your security services? With the pressure to maximise resources and fulfil cost constraints, larger datacentres have become the norm. The concentration of computing, storage and networking increases the criticality of network availability and adequate performance. Consolidating all security services onto a single platform affords you the opportunity to add additional security inspections to the traffic flow very cost-effectively.
- How quickly will your firewall rules and security policies become outdated? A static set of firewall rules is not sufficient in today’s perpetually morphing threat environment. Security capabilities should be driven by up-to-the-minute information for reputation-based filtering.
- How easy will it be to manage? You need to centrally manage which users can access what applications. Having an automated mechanism to identify, set up, and manage a particular user’s access to particular portions of different applications reduces operational expenditure.
However consolidated your network security infrastructure is today, further virtualisation and adoption of cloud-based applications presents an opportunity to reduce operational expense and risk if you rethink your network security.
Gail Ferreira is product marketing manager at Crossbeam Systems