FM200, nowadays, software defined data center (SDDC) and hybrid infrastructure create opportunities for digital business, but also bring challenges to IT department for data center security and control, especially when trying to integrate and deploy traditional security solutions. Distributed IT infrastructure is widely applied in physical, virtual, internal deployment and cloud computing workloads. When establishing a comprehensive security system for enterprises, traditional security will fail in performance, scalability and manageability.
In view of the security and control mechanism designed for the super integrated infrastructure (HCIS), if we want to provide the visibility and scalability level of the digital business for IT security team, we need flexible design. Its security should be able to protect, rather than prevent these digital infrastructures, otherwise it will make the organization experience data leakage and security incidents caused by security risks.
Control of data center
Data center control can only be achieved through the unified management of internal deployment and public infrastructure, which is not provided by traditional security solutions. And the security debris that leads to the high maintenance cost caused by the IT overhead is usually the main problem of the traditional data center and infrastructure. Because of this, super fusion (the extra abstraction layer on its existing hardware and system) has realized the automation, flexible and programmable data center defined by software.
The traditional endpoint proxy of CPU, memory and input / output operation, which takes up the virtual workload seriously, reduces the virtualization density and the utilization of infrastructure, and hinder the performance. With limited scalability options, traditional security solutions can not provide the infrastructure of super convergence, and can not provide flexibility for enterprises to grow.
Security of data center
Any security solution to protect endpoints on the entire infrastructure should not only integrate with the key to the super integration infrastructure (HCIS) technology, but also be independent of the virtual machine management program and the operation system. Centralization of manageability and visibility should also ensure that IT administrators can deploy and implement all the infrastructure policies in time, even if new workloads are created. Cloud burst policy execution is the key to maintain compliance, control of performance and data location, because it can provide flexibility for a company to run workload from a financial and operational perspective without sacrificing safety.
In order to ensure the operation efficiency of data centers, organizations need to flexibly support the automatic configuration and deployment of security solutions, and provide a single pane view for the entire data center. Continuous security coverage ensures that virtual workloads are always protected, regardless of their location and functionality.
Adaptive security layer
The security and control of the data center should be based on an adaptive security layer that focuses on prevention, pre execution, execution, repair and visibility. In technology, the use of machine learning itself should not be implemented as a security layer, but as a tool to enhance the ability of the current security technology.
The security challenges faced by software defined data centers (SDDC) and super integrated infrastructures (HCIS) can only be overcome by providing continuous coverage in hybrid cloud to achieve data center transformation. It is highly efficient, flexible and extensible, which not only provides the security department with the required visibility level, but also enables them to focus on developing new security policies, rather than maintaining them.
沒有留言:
張貼留言