Access your Pro+ Content below.
Virtualization security plan: Replacing physical separation
This article is part of the November 2010 Vol. 1, No. 1 issue of Network Evolution
As virtualization takes off in the data center, network and server managers must implement a virtualization security plan that ensures stability of core applications running on virtual machines. That may require the use of a combination of security tools. When the New Mexico Human Services Department implemented VMware-powered virtualization across 80% of its 160 Dell servers, the IT team knew it could no longer depend on physical separation as a means of securing each server. That approach would only limit virtual machine (VM) movement in the data center, diminishing the overall benefits of virtualization. Another complication was that existing network firewalls and intrusion detection or prevention systems (IDS/IPS) didn’t work within the virtualized setting. So Gurusimran Khalsa, systems administrations bureau supervisor for the department, began seeking a virtualization security plan that would enable centralized access control, logging and firewalling within a virtualized setting. He developed a strategy that combined the ...
Features in this issue
ATA over Ethernet is pitched as a solution for converged data center networks, but ATAoE has a host of technology shortcomings, including a lack of packet loss recovery and shaky security, according to Fast Packet blogger Ivan Pepelnjak. So why bother?
IT professionals explore the process of building converged data center networks based on expectations of vendors’ promises, as well as their reservations, the benefits and technicalities of this technology.
Using virtual cluster switching, the UCLA Laboratory of Neuro Imaging manages dozens of switches as one switch in a flat Layer 2 network for high-performance computing.
News in this issue
The New Mexico Human Services Department implemented a virtualization security plan that ensures security of core applications running on virtual machines.