Browse by year:

Securing Your Network with the New IP

George Chacko, Principal Systems Engineer & Lead Technical Consultant, Brocade India
Monday, March 14, 2016
George Chacko, Principal Systems Engineer & Lead Technical Consultant, Brocade India
Headquartered in San Jose, California, Brocade specializes in providing high quality networking solutions in the areas of storage networking, data center & ethernet fabric routing, and software & campus networking.

The New IP is a modern approach to networking that emphasizes on open, automated, software-defined elements to increase agility and reduce costs while meeting the challenges of the Third Platform. And the great news is that the New IP provides a new way to architect networks that accelerate business changes and growth while maintaining or increasing high levels of security. Old IP networks are highly vulnerable to security attacks due to their relatively static nature as well as the cost and inefficiencies of hardware only-based security. Layered security for defense-in-depth is significantly enhanced with a New IP architecture because security is designed in, not bolted on.

Security Is Designed In, Not Bolted On

Part of the problem with old IP networks is that security is infrastructure-bound, implemented by devices that are deployed at the edge. In fact, security might have been a separate deployment bolted on at the edge of the network (i.e. perimeter security) representing a single point of failure intended to secure the entire network. But in the cloud era in which the data center and networks converge and the lines of demarcation blur (and access becomes increasingly mobile), the concept of the perimeter disappears. There are no boundaries. In theory, all parts of the network need to be security enabled and need to play a role in defending the network against attacks. The New IP allows you to deploy security in this manner so that the network itself can be pervasively vigilant, ensuring the security of both data-at-rest and data-in-flight.

Improve Security with Network Virtualization while Lowering Costs

Share on Twitter
Share on LinkedIn
Share on facebook