June 15, 2011

Securing the Data-Center Transformation

  • Aligning Security and Data-Center Dynamics
  • Nemertes Research on behalf of Cisco Systems
The data center is undergoing tectonic shifts with virtualization the primary cause. Everything is moving faster within the data center - moving at the speed of virtualization - putting centers into a state of transition from physical to virtual, which can be long, complex, and messy. At the same time, security models remain largely static, anchored by physical security devices. Not only does this put the organization at greater risk, it also puts in jeopardy the core benefits of virtualization. To address this, organizations need a security architecture delivering agile security and supporting the physical infrastructure, the virtual infrastructure, and all the transitional states in between the two. This requires a new security model seamlessly integrating existing security controls for physical infrastructure with comparable security controls for the virtual infrastructure. This new model requires virtualization security.

Download Paper
(Webtorials membership required. Click here to register or if you forgot your username/password.)

1 Comment

As data centers rapidly transform to a virtualized model, the tradition physical "perimeter defense" no longer makes sense. Instead, an entirely new model must be developed to ensure the security of virtual resources - wherever they may reside. (And this location may change on a rapid basis, making the issue even more difficult to address.)

This paper does a great job of both addressing the problem and suggesting architectural models for securing your virtual data center, regardless of your exact choice of vendor(s).

Highly recommended.

Search Webtorials

Get E-News and Notices via Email




I accept Webtorials' Terms and Conditions.

Trending Discussions

See more discussions...

Featured Sponsor Microsites



Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Continuing past this point indicates your acceptance of our terms of use as specified at Terms of Use.

Webtorial® is a registered servicemark of Distributed Networking Associates. The Webtorial logo is a servicemark of Distributed Networking Associates. Copyright 1999-2018, Distributed Networking Associates, Inc.