Cisco Cisco ASA for Nexus 1000V Series Switch Libro blanco
Lippis Report 158: Next Generation Network Security for Data Center Protections
lippis.com
4
consuming footprint, energy and cooling resources. Expect security appliances to start delivering on the
above performance metrics at up to an 8th of their size or 2 RU high if not smaller.
above performance metrics at up to an 8th of their size or 2 RU high if not smaller.
Threat Protection
To assure this security infrastructure protects IT assets at the rate in which cybercriminals and hackers
wish to penetrate it, the industry is serving up cloud-based threat protection. A few suppliers have
launched cloud-based security services, which collect anomalistic data throughout the internet and
corporate networks via sensors, analyze/correlate the anomalies with reputation scores and when a
new exploit’s signature is detected, the cloud transmits mitigation code/signature updates to corporate
IPSs. The speed in which this process takes place is a competitive differentiation. Those that send
updates every five or so minutes have the best chance of mitigating exploits from cybercriminals which
tend to change IP address every hour to avoid detection. IT business leaders will know when cloud-
based threat protection becomes highly reliable. It’s at that point that suppliers will start offering
“guaranteed protection” that incorporate penalties to suppliers if protection is penetrated.
Policy and enforcement of mobile devices creates a virtual perimeter while true scale performance
enables security appliances to keep up with application demand and new traffic flow realities. Smaller
security appliance footprint allows IT executives to maximize data center space while minimizing energy
and cooling. Cloud-based threat protection keeps the security infrastructure updated in near real time
with signatures to mitigate threats throughout the corporate and virtual perimeter. In short, IT business
leaders gain control and manage mobile security vulnerabilities while delivering applications to users
securely at speed with small footprint consumption. Mobile, data center consolidation and virtualization
plus cloud computing are powerful trends rooted in economic efficiency and increased information
demand. To maximize the value of these investments, a new security model is needed.
wish to penetrate it, the industry is serving up cloud-based threat protection. A few suppliers have
launched cloud-based security services, which collect anomalistic data throughout the internet and
corporate networks via sensors, analyze/correlate the anomalies with reputation scores and when a
new exploit’s signature is detected, the cloud transmits mitigation code/signature updates to corporate
IPSs. The speed in which this process takes place is a competitive differentiation. Those that send
updates every five or so minutes have the best chance of mitigating exploits from cybercriminals which
tend to change IP address every hour to avoid detection. IT business leaders will know when cloud-
based threat protection becomes highly reliable. It’s at that point that suppliers will start offering
“guaranteed protection” that incorporate penalties to suppliers if protection is penetrated.
Policy and enforcement of mobile devices creates a virtual perimeter while true scale performance
enables security appliances to keep up with application demand and new traffic flow realities. Smaller
security appliance footprint allows IT executives to maximize data center space while minimizing energy
and cooling. Cloud-based threat protection keeps the security infrastructure updated in near real time
with signatures to mitigate threats throughout the corporate and virtual perimeter. In short, IT business
leaders gain control and manage mobile security vulnerabilities while delivering applications to users
securely at speed with small footprint consumption. Mobile, data center consolidation and virtualization
plus cloud computing are powerful trends rooted in economic efficiency and increased information
demand. To maximize the value of these investments, a new security model is needed.