Access "Virtualization security plan: Replacing physical separation"
This article is part of the November 2010 Vol. 1, No. 1 issue of Building the infrastructure to enable flat Data Center network architecture
As virtualization takes off in the data center, network and server managers must implement a virtualization security plan that ensures stability of core applications running on virtual machines. That may require the use of a combination of security tools. When the New Mexico Human Services Department implemented VMware-powered virtualization across 80% of its 160 Dell servers, the IT team knew it could no longer depend on physical separation as a means of securing each server. That approach would only limit virtual machine (VM) movement in the data center, diminishing the overall benefits of virtualization. Another complication was that existing network firewalls and intrusion detection or prevention systems (IDS/IPS) didn’t work within the virtualized setting. So Gurusimran Khalsa, systems administrations bureau supervisor for the department, began seeking a virtualization security plan that would enable centralized access control, logging and firewalling within a virtualized setting. He developed a strategy that combined the HyTrust Appliance for ... Access >>>
Premium Content for Free.
ATA over Ethernet for converged data center networks? No way
ATA over Ethernet is pitched as a solution for converged data center networks, but ATAoE has a host of technology shortcomings, including a lack of packet loss recovery and shaky security, according to Fast Packet blogger Ivan Pepelnjak. So why bother?
Virtual cluster switching: Finding management in a flat network
by Michael Brandenburg, Technical Editor
Using virtual cluster switching, the UCLA Laboratory of Neuro Imaging manages dozens of switches as one switch in a flat Layer 2 network for high-performance computing.
- ATA over Ethernet for converged data center networks? No way
Navigating the road to flatter, converged data center networks
by Shamus McGillicuddy
IT professionals explore the process of building converged data center networks based on expectations of vendors’ promises, as well as their reservations, the benefits and technicalities of this technology.
- Navigating the road to flatter, converged data center networks by Shamus McGillicuddy
Virtualization security plan: Replacing physical separation
by Rivka Gewirtz Little, Senior Site Editor
The New Mexico Human Services Department implemented a virtualization security plan that ensures security of core applications running on virtual machines.
- Virtualization security plan: Replacing physical separation by Rivka Gewirtz Little, Senior Site Editor
More Premium Content Accessible For Free
More -- and more complex -- mobile devices are jumping on your enterprise network, gobbling up bandwidth from the WLAN infrastructure. This technical...
Whenever users complain about an application being slow, the network is always first to be blamed. And yet network engineers often have limited ...
Just five years ago, no one would have described Wi-Fi as a primary access technology but now, as Wi-Fi and cellular architectures deliver security, ...