Scaling Network Security

Bildschirmfoto 2019 07 03 um 10.19.48

Young people today laugh at folks with a couple decades of experience when they rue about the good old days, when networks snaked along the floors of offices, and trusted users were on the corporate network, while untrusted users were not.

Suffice it to say the past 25 years have seen some rapid changes to technology infrastructure. First of all, in a lot of cases, there aren’t even any wires. That’s kind of a shocking concept to a former network admin who fixed a majority of problems by swapping out patch cords. On the plus side, with the advent of wireless and widespread network access, you can troubleshoot your network from the other side of the world.

We’ve also seen continuing insatiable demand for network bandwidth. Networks grow to address that demand every year, which stresses our ability to protect them. But network security solutions still need to inspect and enforce policies, regardless of how fast the network gets. Looking for attack patterns on today’s networks requires an entirely different amount of computing power than it did in the old days. So an essential requirement is to ensure that your network security controls can keep pace with network bandwidth, which may be Mission: Impossible. Something has to give at some point to keep the network secure.

In this “Scaling Network Security” paper, we will look at where secure networking started and why it needs to change. We’ll present requirements for today’s networks which will take you into the future. Finally we will wrap up with some architectural constructs we believe can help scale up your network security controls.

View Whitepaper
Download
Date: 3 July 2019, 10:12 am   |   Provider: Gigamon UK Ltd   |   Size: 1.75 MB   |   Language: English
Keep Reading:
Thumb original ibm hybrid cloud osnap final 033120  1   1

Hybrid Cloud Automation Accelerates Digital Transformation

Automated management helps: Automation drives faster updates, more efficient use of IT infrastructure, and easier compliance and control of resources. This ultimately leads to greater ROI and reduced operating expenses. ...

To access the study
Thumb original us46171820 red hat on ibm z april 20

Building the Open Enterprise: Leveraging Red Hat Enterprise Linux, OpenShift and Ansible on IBM Z and LinuxONE

Enterprises are waking up to a new reality; their existing application portfolio, which has successfully empowered the organization to this point, can also become a maintenance liability due to the inability of these applications to evolve and change as quickly as they now need them to. ...

To access the study
Thumb original flexible consumption solution guide 80025280usen

Capacity on Demand guide

As consumer demand for an on-demand economy grows, businesses are faced with a challenge in how they support a new and ever-changing set of requirements. Cloud has reset expectations as businesses look for the best way to leverage the benefits of cloud-based infrastructure to deliver better business results and customer experiences. ...

To access the Whitepaper
Thumb original power hmc finaldraft 91027691usen

A multi-layered approach to security with POWER9TM

The ideal course of action involves planning and assessment to identify risks across key areas related to security. IBM Power SystemsTM and the POWER9 processor offer a holistic, multilayered approach for your security strategy to ensure your organization is secure and compliant ...

To access the E-Book
Thumb original vmware ebook mtb how cloud can help cios close innovation execution gap  1

VMware Report: How the cloud can help CIOs close the innovation-execution gap

The role of the modern CIO is changing. The cloud is enabling innovation within the wider digital transformation agenda, with organisations using services from multiple providers to deploy a hybrid, multi-cloud model.

While this opens doors when it comes to the range of options open to IT departments, it also puts new demands on the CIO in terms of innovation. There is more pressure than ever on IT leaders to lead the way strategically, technologically and culturally, all while navigating the choppy waters of change; keeping the business ru ...

To access the E-Book