eBooks/eGuides

Next-gen HCI for Dummies

Issue link: https://insights.oneneck.com/i/1450344

Contents of this Issue

Navigation

Page 53 of 62

50 Next-Generation Hyperconverged Infrastructure For Dummies, Nutanix Special Edition These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. You can learn more about how Nutanix helps to secure your next-generation HCI by downloading the Security with Nutanix: A Defense in Depth Strategy e-book, available at www.nutanix.com/ viewer?type=pdf&path=/content/dam/nutanix/resources/ solution-briefs/sb-security-first-with-nutanix.pdf. Nutanix Beam provides continuous cloud security and compliance for multi-cloud (which includes your on-premises Nutanix deployment) environments with configuration audits, compliance reporting, and remediation for vulnerabilities. Beam provides insights into security vulnerabilities in real time so that you can resolve potential threats before they turn into business challenges. With Beam you can audit and maintain security compliance for HIPAA, International Organization for Standardization (ISO), PCI-DSS, Center for Internet Security (CIS), NIST, and Service Organization Control (SOC-2), enforce custom policies and audits or leverage more than 250 built-in security checks based on industry best practices. Delivering Application-Centric Security with Micro-segmentation You may have heard that with the advent of cloud computing and the proliferation of mobile devices, the traditional network perimeter has all but disappeared. But that's not entirely correct. More accurately, the perimeter has just gotten a lot more complex and rather than a single perimeter around an entire datacenter, it now consists of hundreds or thousands of perimeters around individual applications and workloads. These "micro" perimeters are constantly moving — within and across the datacenter, and within and across clouds. Micro-segmentation (sometimes called east-west firewalling) cre- ates granular network policies between applications and services. Micro-segmentation is a key part of a modern defense-in-depth strategy against advanced datacenter threats, providing the next layer of defense beyond perimeter firewalls that traditionally protected north-south traffic between the "trusted" corporate network and the "untrusted" Internet.

Articles in this issue

Links on this page

Archives of this issue

view archives of eBooks/eGuides - Next-gen HCI for Dummies