Issue link: https://insights.oneneck.com/i/1458399
Introduction 1 These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. Introduction F or decades, traditional data centers have been the most pre- dictable and controlled infrastructure to house high-risk and proprietary assets, such as personal information, medical records, and financial information. Today, data is everywhere. Modern application workloads are moving across multiple data centers as well as private, public, and hybrid clouds, anywhere around the globe, based on busi- ness requirements. These highly distributed applications need to dynamically grow, shrink, and move, and be rewritten and rede- ployed according to business needs. The data center is also evolving to allow fast and flexible appli- cation deployment. To support this level of application elasticity and mobility, enterprises are transforming their data centers with a modern architecture. A modern data center utilizes technologies such as virtualization, cloud, and software-defined networking to deliver application workloads everywhere across physical data centers as well as hybrid and multi-cloud environments. A modern infrastructure allows your organization to extend data centers into cloud services. This evolution of the data cen- ter enables flexible scaling for network, storage, and compute demand surges. A modern data center offers the best of both worlds: security, performance, and reliability with agility, scal- ability, and cost savings across on-premises data centers and multiple public, private, and hybrid clouds. The modern data center helps IT organizations deliver greater business opportunities but also introduces new risks. Data centers that span multi-cloud environments offer a larger attack surface, which can translate to increased complexity in networking and cybersecurity. It is critical to maintain full visibility and precise control of your data center regardless of the architecture. It is also important to implement a best practice methodology and adopt an approach to data center security that is independent of the individual environments you're utilizing.