eBooks/eGuides

Data Center and Hybrid Cloud for Dummies

Issue link: https://insights.oneneck.com/i/1458399

Contents of this Issue

Navigation

Page 72 of 82

68 Data Center & Hybrid Cloud Security For Dummies, Palo Alto Networks Special Edition These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. However, when applications of different trust levels exist within the same virtual cluster (for example, VMware and Nutanix), full visibility of intra-host communications can be achieved only with virtual firewalls. Additionally, specific server-level or hypervisor attacks can only be addressed with firewalls protecting these servers — either virtual or physical. Finally, firewalls deployed to the public cloud may need to be virtualized if the responsible service providers don't allow cus- tomers to deploy their physical hardware in the cloud. Virtualized firewalls may also be appropriate in private clouds and hybrid data centers, where rack space is at a premium or where data center mobility (for example, a temporary data center in a remote region) is needed. Consume New Innovations Easily in a Broad Partner Ecosystem Consuming cybersecurity innovation is arduous. Organizations waste time deploying additional hardware or software every time they want to take advantage of a new security technology. They invest more resources managing their ever-expanding security infrastructure instead of improving their security controls to stay ahead of attackers and prevent threats. As the number of needed security functions increases, there are two options: Add more independent point products or use an existing device to support new capabilities. If your network security platform can act as a sensor and enforcement point for third-party technology, you can rapidly adopt new security inno- vations without deploying or managing endless new devices. Your network security platform should enable teams to quickly discover, evaluate, and use new security technologies. Security teams should be able to collaborate between different apps, share threat context and intelligence, and drive automated response and enforcement with deeply integrated applications. This way, they can solve the most challenging security use cases with the best technology available, and they can do so without the cost or operational burden of deploying new infrastructure for each new function.

Articles in this issue

Archives of this issue

view archives of eBooks/eGuides - Data Center and Hybrid Cloud for Dummies