fbpx

Network Security

Why you need a new approach to enterprise security

The applications of today use the network in ways we never thought or planned for. Often distributed across multiple compute, storage and database layers, modern applications have come to reflect the characteristics of the network itself. Add to this, the challenge of identifying the true enterprise perimeter and we can see that an architectural gap has emerged between the policies that can protect the application layer – and the controls that secure the infrastructure upon which it relies. Enter, a new foundation for enterprise security.


Work in education?

Switch to our Network Security for education page.

“Virtualisation provides the fundamental requirement allowing us to architect for security, by allowing precise and dynamic binding of security services to applications, data and users.”

Pat Gelsinger, Chief Executive Office, VMware

Can you trust what you cannot control?

Today, the architecture of enterprise IT is far removed from the days of client/server. Where it was once relatively easy to align IT security controls within the stack to the apps and data that required protection, a typical app is now likely to be distributed across multiple compute, storage and database layers. Alternatively, it could be a composed service comprised of a host of containers, spread across a mix of on-premises and Cloud infrastructure.


Neighbourhood Watch

When thinking of the relationship between infrastructure and data, it is useful to consider the various distributed networks of enterprise IT as a sort of neighbourhood. In this analogy, data centres are the buildings and the network links are the roads. From a security perspective, we have long sought to secure our networks by placing stronger locks on the doors of those buildings.


The problem with encryption

In a typical enterprise IT environment, with distributed applications or composed services sharing enormous amounts of traffic between multiple data centres and databases, one of the greatest challenges to network security has become protecting the confidentiality and integrity of the data itself as it flows through the network – the “east-west” traffic.


VMware’s NSX, and its Promise of a New Standard

By leveraging the existing benefits of virtualisation, and extending the same ease and flexibility to the network, VMware’s NSX promises to allow users to spin up a network easily as one might spin up a VM – complete, multi-tier virtual networks that can be saved, deleted, and restored as simply as virtual machines.

VMware NSX eBook
Learn how virtualisation can transform your security.

Contact us

Related

K-12 Video Period
Securing the school network amidst escalating threats

Security threats are now a routine problem for increasingly connected education institutions. The good news is that a new generation…

The Southport School Revisited
The Southport School: Four Years On

How have their investments in wireless networking and security paid off after four years? Download Customer…

Blog - Network Visibility and Authentication
Network visibility and authentication: Your school’s cyber security superpowers

When it comes to cyber security, schools need to be as vigilant as any business. After all, they deal with…

Aruba EdgeConnect SD-WAN Security
Evolving your SD-WAN security for a cloud-first world

Traditional SD-WAN security has consisted of encryption and IPsec tunnels with support for VPNs and stateful firewalls – but…