Real Security for Virtual Networks & Data Centers
This white paper from H3C discusses how virtualization of hardware resources can improve the availability of network services and create a resilient network fabric.
March 23, 2010
Virtual networks provide an enormous capability to design more efficient networks that are easier to manage and more cost effective. In conjunction with network security devices that support virtualized environments, organizations can implement better security and more sophisticated policies in the fabric of the network with a minimum number of devices. This is becoming increasingly important in large data center design where virtualization is expanding the most rapidly and security concerns are most pronounced. This white paper from H3C describes how to design a more efficient virtual network and data center
Most enterprises have by now at least started to take advantage of data center virtualization to drive down the cost of application deployment and more efficiently use server resources. While the first step of virtualization usually happens in the application server, enterprises should also be thinking about ways to reduce hardware costs and management complexity by taking advantage of the same virtualization concepts in the design of their data center.
The same general benefits that enterprises derive from server and application virtualization - including more efficient resource utilization; driving down deployment and management costs; and reducing network complexity - can also be realized through virtual networks. Additionally, network security components such as Intrusion Prevention Systems (IPSs) and firewalls can provide more sophisticated policy enforcement in the fabric of the network.
Learn how virtualization of hardware resources can improve availability of network services and create a resilient network fabric. Security services deployed in the fabric of the network are also critical to maintaining availability of mission-critical network services by mitigating threats, eliminating malware and blocking inappropriate and non-compliant access attempts. Click here to down load this white paper.
About the Author
You May Also Like