| |||||||||
| |||||||||
Current Filter: >>>>>> The Network Computing Masterclass series... Editorial Type: Masterclass Date: 11-2015 Views: 2056 | |||
| ... going beyond technology and product.
This Network Management Masterclass series is in association with Certes network. In this edition they consider how to create agile and independent security for modern network infrastructures It seems that everything is threatened with becoming software-defined nowadays. No doubt inspired by the tidal wave of data breaches, the concept of software-defined security has thankfully moved rapidly from hype to reality. Hitherto, enterprise IT security has been highly infrastructure and network-centric, meaning that the primary means of protecting IT resources, including data, has been to create a strong perimeter using firewalls. But continuing data breaches have rendered firewalls largely ineffective at defeating the hacking techniques favoured by cybercriminals; this is in some part because of the evolved nature of enterprise applications themselves. Previously sensitive business data resided under lock and key, on paper, in a filing cabinet. Today, this same data has been digitised onto a server, making it easy to share and access remotely and automating processing, along with a range of operational efficiencies. Essentially, this means that business data is now software-defined and liberated from physical infrastructure. Routinely crossing the borders between the enterprise and the outside world, the firewalled perimeter can no longer contain business applications and is routinely crossed by outsiders using enterprise applications in the course of their daily work. Hackers know this, and their methods of attack now target the gaps and weak spots that modern application environments present. In response, security must also become software-defined and decoupled from the infrastructure. As data breach after data breach proves, relying on a firewall, router, or switch to cope with the fluid, borderless and shared nature of modern applications is a data breach in the making. To adopt software-defined security, organisations must view security independently from the network infrastructure by:
• Creating a single point of control across all applications, networks and IT silos.
SINGLE POINT OF CONTROL
APPLICATION AND USER SPECIFIC SECURITY
SECURITY FROM END-TO-END These three principles form the core of an effective software-defined security strategy - one that is highly flexible, highly effective and better able to cope with borderless applications and modern user behaviour. NC This next Certes Networks Masterclass in Network Computing will explain how to contain the inevitable breaches, those that threat prevention systems simply take too long to find. Reader comments and questions relating to this series are invited by email to: Ray.Smyth@BTC.co.uk | ||
Like this article? Click here to get the Newsletter and Magazine Free! | |||
Email The Editor! OR Forward Article | Go Top | ||
PREVIOUS | NEXT |