Server Virtualization Creates Silos of IT Hidden From Security Tools
Security tools such as perimeter firewalls and IDS/IPS sensors are commonly deployed at the perimeter of the network, where they inspect network traffic between untrusted zones like the Internet and trusted zones such as the core data center or end-user networks. However, today’s security threat mitigation can no longer be accomplished with just a firewall and IPS sensor.
Comprehensive security must encompass all threat vectors including but not limited to, e-mail scanning, web application security, malware detection, and granular application control. These tools rely on live packet streams on the wire. They also rely on end-to-end packet flows between network segments, servers, and end-users. As the infrastructure is virtualized and the traffic migrates inside the virtual switch, tools examining that traffic can go dark—the virtual network becomes a hidden silo of IT.
Fill out the short form to download this solution brief today.
oops! It appears you have an ad blocker enabled. To register, please disable your ad blocker.